These Are ports open on the target machine. Now I use which Port For exploit the target
Not shown: 978 filtered ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
26/tcp closed rsftp
80/tcp open http
110/tcp open pop3
143/tcp open imap
443/tcp open https
465/tcp open smtps
587/tcp open submission
993/tcp open imaps
995/tcp open pop3s
3306/tcp open mysql
50000/tcp closed ibm-db2
50001/tcp closed unknown
50002/tcp closed iiimsf
50003/tcp closed unknown
50006/tcp closed unknown
50300/tcp closed unknown
50389/tcp closed unknown
50636/tcp closed unknown
50800/tcp closed unknown
Forum Thread: Help Regarding Port based Attacks
- Hot
- Active
-
Forum Thread: Hacking Facebook,Twitter,Instagram Account Passwords with BruteForce 161 Replies
1 hr ago -
Forum Thread: How to Edit Some Specific Part of an Apk File 1 Replies
1 hr ago -
Forum Thread: I Need Help in Hacking a Gmail Account. 26 Replies
3 hrs ago -
Forum Thread: Kali linux command error. Kindly help 1 Replies
22 hrs ago -
Forum Thread: Hack Instagram Account Using BruteForce 200 Replies
23 hrs ago -
Forum Thread: When to Use Reverse Shell and Bind Shell? 5 Replies
2 days ago -
Forum Thread: Fluxion Not Working 6 Replies
2 days ago -
Forum Thread: Hacking Stream (LIVE) 10 Replies
3 days ago -
Forum Thread: Blind SQL Injection 6 Replies
3 days ago -
Forum Thread: Can C Programming Help Me for Hacking or Pen Testing. 10 Replies
1 wk ago -
Forum Thread: I Want to Hack in to My Friends System Through his wifi router i am controlling 7 Replies
1 wk ago -
Forum Thread: How to Use the Exploits Found in Vega Scan 3 Replies
1 wk ago -
Forum Thread: Can I Send a File to a Computer Using Ip Address 5 Replies
2 wks ago -
Forum Thread: How to Use NGROK in a Reverse_Tcp Attack? 20 Replies
2 wks ago -
Forum Thread: Problem with Hacking Webserver with Armitage 11 Replies
2 wks ago -
Forum Thread: Metasploit - Embedding an Android Payload into a PDF? 7 Replies
2 wks ago -
Forum Thread: Creating an Completely Undetectable Executable in Under 15 Minutes! 35 Replies
2 wks ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 43 Replies
2 wks ago -
Forum Thread: Metasploit Use Domain Name as RHOST 4 Replies
2 wks ago -
Forum Thread: Make a Phishing Page for Harvesting Credentials Yourself 4 Replies
2 wks ago
-
How To: Automate Remote SSH Control of Computers with Expect Scripts
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How To: Hack Android Using Kali (Remotely)
-
How To: Phish for Social Media & Other Account Passwords with BlackEye
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: Crack Password-Protected ZIP Files, PDFs & More with Zydra
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
Hack Like a Pro: How to Crack Passwords, Part 4 (Creating a Custom Wordlist with Crunch)
-
How To: Create a Persistent Back Door in Android Using Kali Linux:
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Write an XSS Cookie Stealer in JavaScript to Steal Passwords
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
Android for Hackers: How to Turn an Android Phone into a Hacking Device Without Root
-
How To: Buy the Best Wireless Network Adapter for Wi-Fi Hacking in 2019
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Use Ettercap to Intercept Passwords with ARP Spoofing
5 Responses
I think you misunderstood. Ports are only one small part recon. You need the OS, services, applications, etc to determine an attack. When you have gathered all that info, you can go to www.securityfocus.com or other vulnerability database to find the appropriate vulnerability and exploit.
In addition, if this is a Windows machine, Microsoft just released eleven new vulnerabilities on their TechNet Security Bulletin. It looks like three of them are remote code execution vulnerabilities. You could definitely use some of those.
To add to OTW's comment, Be careful, this looks like a honeypot to me
( Its just my opinion )
# Sergeant
Thanks for the reply.
"looks like a honeypot to me"
Right, because you can tell a honeypot by which ports are open. LOL
Share Your Thoughts