|
(view this code in a separate window) crackerbox# raccess -o 10.10.164.74 Remote Access Session v0.7 - Code by Angel Ramos <seamus@salix.org> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --Detecting Remote OS... 10.10.164.74:21 * Standard: Solaris 2.x, Linux 2.2.??? 2.4.???, MacOS --Service ftp Port 21: Opened!!-- Banner Info: 220 ProFTPD 1.2.2 Server --Service ssh Port 22: Opened!!-- Banner Info: SSH-1.99-OpenSSH_3.1p1 --Service smtp Port 25: Opened!!-- Banner Info: 220 Blarney.example.com ESMTP Postfix --Checking named version... Named version: 9.1.3 --Service www Port 80: Opened!!-- Server: Apache/1.3.24 (Unix) PHP/4.1.2 mod_ssl/2.8.8 OpenSSL/0.9.6b --Service pop3 Port 110: Opened!!-- Banner Info: +OK Qpopper (version 4.0.3) at blarney starting. --Service imap2 Port 143: Opened!!-- Banner Info: * OK [CAPABILITY IMAP4REV1 LOGIN-REFERRALS STARTTLS AUTH=LOGIN] blarney IMAP4rev1 2001.313 at Tue, 19 Apr 2002 11:17:51 -0700 (PDT) --Service https Port 443: Opened!!-- Server: Apache/1.3.24 (Unix) PHP/4.1.2 mod_ssl/2.8.8 OpenSSL/0.9.6b ---------------- Scan Completed!! Starting attack session... ------------------------------- Do you want to check if there are exploits that match with the vendor, version and OS of the remote host's services (y/n)? y Checking if any exploit matches with vendor, version and OS of the services... ------------------------------- Do you want to check if there are exploits that only match with the vendor and version of the remote host's services (y/n)? y Checking if any exploit matches with vendor, version of the services... None exploit or exploits match with vendor and version.
|