Forum Thread: Server Penetration (Ubuntu

Hi,
I need help with penetrating a Ubuntu Server and I am kinda new in this, so I would need help!
Here are some information about the server.

TCP Sequence Prediction: Difficulty=255.
IP ID Sequence Generation: All zeros.
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel.

22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0).
| ssh-hostkey:
| 2048 60:61:e8:78:e7:55:60:d3:49:bd:06:40:81:6f:c5:19 (RSA)
| 256 ac:7d:da:49:90:97:99:17:e8:4e:97:71:f4:c3:cd:e7 (ECDSA)
|_ 256 08:96:7e:bb:51:ac:89:ab:81:68:f1:f7:19:26:13:24 (EdDSA)
25/tcp filtered smtp
111/tcp filtered rpcbind
135/tcp filtered msrpc
136/tcp filtered profile
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
19132/tcp open unknown
44084/tcp open fmproduct 1-4 (RPC #1073741824)
Port 22, 19132 and 44084 are open. The others seems to be close.
Here is the IP of the machine : 207.246.122.247.vultr.com (207.246.122.247)
This is a simple scan, I don't know how to get more informations about the server. If someone can help.
Basically, I don't want to have access to commands or anything else, I need to have access to the files. Thank you.

2 Responses

Is this server running off of ubuntu 4? If it is, then you could probably search on exploit-db.com or securityfocus.com for an exploit. If you know the owner/are comfortable with open-source information gathering, then a dictionary attack with CUPP on ssh might be a solution. Again, this site is mainly for educational purposes only, so please don't try posting for help with blackhat activities on here that often.

Share Your Thoughts

  • Hot
  • Active