Penetration Testing mailing list archives
Re: Port 4662 exploitation
From: "Jorge L. Vazquez" <jlvazquez825 () gmail com>
Date: Sat, 13 Dec 2008 01:50:23 -0500
when you telnet into an unknown port you are not doing it to get a shell, but to get a tcp header and know what services might be running on that port.. -j0rg3 blog: www.pctechtips.org Mohamad M wrote:
Hi again, I agree it looks very weird; I simply started a Syn scan with nmap, and got that tcp 4662 is open; when I telneted to 4662, I got shell, but then did not know how to proceed, hence my email. Thanks, -----Original Message----- From: ArcSighter Elite [mailto:arcsighter () gmail com] Sent: Friday, December 12, 2008 11:43 PM To: Mohamad M Cc: pen-test () securityfocus com Subject: Re: Port 4662 exploitation Mohamad M wrote:Hello All,I'm doing a vulnerability assessment for my company, and saw that port4662(edonkey) is open on 1 device facing the internet. I telneted to4662, and Igot connected; since I'm new to this domain, what are the stepsneeded inorder to exploit this vulnerability?Thanks,./Lgpmsec------------------------------------------------------------------------ This list is sponsored by: CenzicSecurity Trends Report from Cenzic Stay Ahead of the Hacker Curve! Get the latest Q2 2008 Trends Report nowwww.cenzic.com/landing/trends-report ------------------------------------------------------------------------An open port is never a vulnerability, only if the running service that binds to that port is actually vulnerable. What makes me ask, have you actually done a service fingerprint to determine is e-donkey?, cause that looks pretty weird to me. Sincerely.
------------------------------------------------------------------------ This list is sponsored by: Cenzic Security Trends Report from Cenzic Stay Ahead of the Hacker Curve! Get the latest Q2 2008 Trends Report now www.cenzic.com/landing/trends-report ------------------------------------------------------------------------ ------------------------------------------------------------------------ This list is sponsored by: Cenzic Security Trends Report from Cenzic Stay Ahead of the Hacker Curve! Get the latest Q2 2008 Trends Report now www.cenzic.com/landing/trends-report ------------------------------------------------------------------------
Current thread:
- Port 4662 exploitation Mohamad M (Dec 12)
- Re: Port 4662 exploitation ArcSighter Elite (Dec 12)
- RE: Port 4662 exploitation Mohamad M (Dec 12)
- Re: Port 4662 exploitation Jorge L. Vazquez (Dec 13)
- Re: Port 4662 exploitation James Bensley (Dec 13)
- RE: Port 4662 exploitation Jeremi Gosney (Dec 14)
- Re: Port 4662 exploitation ArcSighter Elite (Dec 15)
- Message not available
- Message not available
- Re: Port 4662 exploitation ArcSighter Elite (Dec 15)
- Re: Port 4662 exploitation James Bensley (Dec 15)
- RE: Port 4662 exploitation Mohamad M (Dec 12)
- Re: Port 4662 exploitation ArcSighter Elite (Dec 12)
- <Possible follow-ups>
- FW: Port 4662 exploitation lgpmsec (Dec 15)
- RE: Port 4662 exploitation Shenk, Jerry A (Dec 15)
- Re: FW: Port 4662 exploitation ArcSighter Elite (Dec 15)
- Re: FW: Port 4662 exploitation Todd Haverkos (Dec 15)