Vulnerabilities (original) (raw)

GlassFish

Ports

Credentials

Access

Start/Stop

Vulnerability IDs

Modules

Apache Struts

Ports

Credentials

Access

Start/Stop

Vulnerability IDs

Modules

Tomcat

Ports

Credentials

Access

Start/Stop

Vulnerability IDs

Modules

Jenkins

Ports

Credentials

Access

Start/Stop

Modules

IIS - FTP

Ports

Credentials

Windows credentials

Access

Any FTP client should work

Start/Stop

Modules

IIS - HTTP

Ports

Credentials

Access

Start/Stop

Vulnerability IDs

Modules

psexec

Ports

Credentials

Access

Start/Stop

Vulnerabilities

Modules

SSH

Ports

Credentials

Access

Start/Stop

Vulnerabilities

Modules

WinRM

Ports

Credentials

Access

Start/Stop

Vulnerabilities

Modules

chinese caidao

Ports

Credentials

Access

Start/Stop

Modules

ManageEngine

Ports

8020 - HTTP

Credentials

Username: admin Password: admin

Access

On Metasploitable3, point your browser to http://localhost:8020. Login with the above credentials.

Start/Stop

Vulnerability IDs

Modules

ElasticSearch

Ports

9200 - HTTP

Credentials

No credentials needed

Access

On Metasploitable3, point your browser to http://localhost:9200.

Start/Stop

Vulnerability IDs

Modules

Apache Axis2

Ports

8282 - HTTP

Credentials

No credentials needed

Access

On Metasploitable3, point your browser to http://localhost:8282/axis2.

Start/Stop

Log into Apache Tomcat, and start or stop from the application manager.

Vulnerability IDs

Modules

WebDAV

Ports

8585 - HTTP

Credentials

No credentials needed

Access

See the PR here: https://github.com/rapid7/metasploitable3/pull/16

Start/Stop

Modules

SNMP

Ports

161 - UDP

Credentials

Community String: public

Access

Load the auxiliary/scanner/snmp/snmp_enum module in Metasploit and to parse the SNMP data.

Start/Stop

Modules

MySQL

Ports

3306 - TCP

Credentials

U: root P:

Access

Use the mysql client to connect to port 3306 on Metasploitable3.

Start/Stop

Modules

JMX

Ports

1617 - TCP

Credentials

No credentials needed

Access

Download the connector client and use the instructions found here: http://docs.oracle.com/javase/tutorial/jmx/remote/index.html

Start/Stop

Vulnerability IDs

Modules

Wordpress

Ports

8585 - HTTP

Credentials

No credentials needed

Access

On Metasploitable3, point your browser to http://localhost:8585/wordpress.

Start/Stop

Vulnerable Plugins

Modules

Remote Desktop

Ports

3389 - RDP

Credentials

Any Windows credentials

Access

Use a remote desktop client. Either your OS already has one, or download a 3rd party.

Start/Stop

Modules

N/A

PHPMyAdmin

Ports

8585 - HTTP

Credentials

U: root P:

Access

On Metasploitable3, point your browser to http://localhost:8585/phpmyadmin.

Start/Stop

Vulnerability IDs

Modules

Ruby on Rails

Ports

Credentials

N/A

Access

Start/Stop

Vulnerability IDs

Modules