FTP
Nmap discovered a FTP server on the target port 21
The running service is ProFTPD 1.3.5b
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/roquefort]
└─$ ftp ftp@$IP
Connected to 192.168.206.67.
220 ProFTPD 1.3.5b Server (Debian) [::ffff:192.168.206.67]
331 Password required for ftp
Password:
530 Login incorrect.
ftp: Login failed
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/roquefort]
└─$ ftp anonymous@$IP
Connected to 192.168.206.67.
220 ProFTPD 1.3.5b Server (Debian) [::ffff:192.168.206.67]
331 Password required for anonymous
Password:
530 Login incorrect.
ftp: Login failed
The target FTP server does not allow anonymous access
Vulnerabilities
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/roquefort]
└─$ searchsploit ProFTPD 1.3.5
----------------------------------------------------------- ---------------------------------
Exploit Title | Path
----------------------------------------------------------- ---------------------------------
ProFTPd 1.3.5 - 'mod_copy' Command Execution (Metasploit) | linux/remote/37262.rb
ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution | linux/remote/36803.py
ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution (2) | linux/remote/49908.py
ProFTPd 1.3.5 - File Copy | linux/remote/36742.txt
----------------------------------------------------------- ---------------------------------
Shellcodes: No Results
Papers: No Results
The target FTP server appear to suffer from the known mod_copy vulnerability; CVE-2015-3306
However, it would require authentication and no credential is known at this time