┌──(kali㉿kali)-[~/archive/htb/labs/solidstate]└─$ rustscan -a $IP --ulimit=5000The Modern Day Port Scanner.________________________________________: https://discord.gg/GFrQsGy :: https://github.com/RustScan/RustScan : --------------------------------------😵 https://admin.tryhackme.com[~] The config file is expected to be at "/home/kali/.rustscan.toml"[~] Automatically increasing ulimit value to 5000.open 10.10.10.51:25open 10.10.10.51:22open 10.10.10.51:80open 10.10.10.51:110open 10.10.10.51:119open 10.10.10.51:4555
Nmap
┌──(kali㉿kali)-[~/archive/htb/labs/solidstate]└─$ sudo nmap -AO -p22,25,80,110,119,4555 $IP Starting Nmap 7.93 ( https://nmap.org ) at 2023-01-18 19:05 CESTNmap scan report for 10.10.10.51Host is up (0.029s latency).PORT STATE SERVICE VERSION22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u1 (protocol 2.0)| ssh-hostkey:| 2048 770084f578b9c7d354cf712e0d526d8b (RSA)| 256 78b83af660190691f553921d3f48ed53 (ECDSA)|_ 256 e445e9ed074d7369435a12709dc4af76 (ED25519)25/tcp open smtp JAMES smtpd 2.3.2|_smtp-commands: solidstate Hello nmap.scanme.org (10.10.14.7 [10.10.14.7])| smtp-open-relay: Server is an open relay (2/16 tests)| MAIL FROM:<> -> RCPT TO:<relaytest@nmap.scanme.org>|_ SMTP: RSET 550 5.7.1 Requested action not taken: relaying denied\x0D80/tcp open http Apache httpd 2.4.25 ((Debian))|_http-title: Home - Solid State Security|_http-server-header: Apache/2.4.25 (Debian)110/tcp open pop3 JAMES pop3d 2.3.2Service Info: Host: solidstate119/tcp open nntp JAMES nntpd (posting ok)4555/tcp open rsip?| fingerprint-strings:| GenericLines:| JAMES Remote Administration Tool 2.3.2| Please enter your login and password| Login id:| Password:| Login failed for|_ Login id:Network Distance: 2 hopsService Info: Host: solidstate; OS: Linux; CPE: cpe:/o:linux:linux_kernelTRACEROUTE (using port 25/tcp)HOP RTT ADDRESS1 29.05 ms 10.10.14.12 29.17 ms 10.10.10.51OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in 264.43 seconds