paris/i-0beab9edf67e40416
by SadServersMore by SadServers
tcp LISTEN 0 128 127.0.0.1:5000 0.0.0.0:* admin@i-0c8aeb0a6e13b348e:~$ nmap localhost -p 5000 Starting Nmap 7.80 ( https://nmap.org ) at 2023-12-27 11:24 UTC Nmap scan report for localhost (127.0.0.1) Host is up (0.000090s latency). PORT STATE SERVICE 5000/tcp open upnp Nmap done: 1 IP address (1 host up) scanned in 0.21 seconds admin@i-0c8aeb0a6e13b348e:~$ ps aux | grep upnp admin 704 0.0 0.1 5264 708 pts/1 S<+ 11:24 0:00 grep upnp admin@i-0c8aeb0a6e13b348e:~$ px aux | grep 5000 bash: px: command not found admin@i-0c8aeb0a6e13b348e:~$ ps aux | grep 5000
paris/i-0c8aeb0a6e13b348e 01:26
by SadServersusage: knock [options] <host> <port[:proto]> [port[:proto]] ... options: -u, --udp make all ports hits use UDP (default is TCP) -d, --delay <t> wait <t> milliseconds between port hits -v, --verbose be verbose -V, --version display version -h, --help this help example: knock myserver.example.com 123:tcp 456:udp 789:tcp admin@i-061b09841336bd6c6:~$ knock localhost 5000 admin@i-061b09841336bd6c6:~$ curl localhost curl: (7) Failed to connect to localhost port 80: Connection refused admin@i-061b09841336bd6c6:~$ nano enum.sh admin@i-061b09841336bd6c6:~$ chmod +x enum.sh nd
taipei/i-061b09841336bd6c6 04:44
by SadServersMISC: -6: Enable IPv6 scanning -A: Enable OS detection, version detection, script scanning, and traceroute --datadir <dirname>: Specify custom Nmap data file location --send-eth/--send-ip: Send using raw ethernet frames or IP packets --privileged: Assume that the user is fully privileged --unprivileged: Assume the user lacks raw socket privileges -V: Print version number -h: Print this help summary page. EXAMPLES: nmap -v -A scanme.nmap.org nmap -v -sn 192.168.0.0/16 10.0.0.0/8 nmap -v -iR 10000 -Pn -p 80 SEE THE MAN PAGE (https://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES admin@i-04b40f92bf972f881:~$ nmaop