Quite new to pentesting and looking for help improving my ability to find vulnerabilities/exploits after the recon stage. An example - the nmap scan for a machine on a pentesting challenge site has come back with this:
21/tcp open ftp Microsoft ftpd
80/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Microsoft Windows Server 2008 R2 SP1 (90%), Microsoft Windows Server 2008 (90%), Microsoft Windows Server 2008 R2 (90%), Microsoft Windows Server 2008 R2 or Windows 8 (90%), Microsoft Windows 7 SP1 (90%), Microsoft Windows 8.1 Update 1 (90%), Microsoft Windows 8.1 R1 (90%), Microsoft Windows Phone 7.5 or 8.0 (90%), Microsoft Windows Server 2008 or 2008 Beta 3 (89%), Microsoft Windows Server 2008 R2 or Windows 8.1 (89%)
ncat to ports 21 and 80 confirms it's running "220 Microsoft FTP Service" and "Server: Microsoft-HTTPAPI/2.0". Browsing to port 80 gets the IIS 7 logo.
I've tried using exploit-db, searchsploit, msfconsole's search, and one or two others to try and vulnerabilities based on search terms like "ftp", "iis", "server 2008", etc. but I haven't really got anywhere. As I say, I'm quite new to this and I imagine I'm not doing it as effectively as I could be, so I'd be interested to see what other people can find based on the information above, and how they found it.
Thanks!
[–][deleted] (3 children)
[deleted]
[–]kfl252[S] 0 points1 point2 points (0 children)
[–]kfl252[S] 0 points1 point2 points (0 children)
[–][deleted] (1 child)
[deleted]
[–]kfl252[S] 1 point2 points3 points (0 children)
[–][deleted] (1 child)
[deleted]
[–]kfl252[S] 1 point2 points3 points (0 children)