metasploitable
by andrea pantaleo
1. TCP 23 Linux telnetd
2. TCP 25 Postfix smtpd
3. TCP 53 ISC BIND 9.4.2
4. TCP 111 2 (RPC #100000)
5. TCP 445 Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
5.1. auxiliary/scanner/smb/smb_version
5.2. auxiliary/scanner/smb/smb_login
6. TCP 513
7. TCP 1099 GNU Classpath grmiregistry
8. TCP 2049 2-4 (RPC #100003)
9. TCP 3306 MySQL 5.0.51a-3ubuntu5
10. TCP 5432 PostgreSQL DB 8.3.0 - 8.3.7
11. TCP 6000 (access denied)
12. TCP 6697 UnrealIRCd
13. TCP 8180 Apache Tomcat/Coyote JSP engine 1.1
14. TCP 46328 1 (RPC #100024)
15. TCP 59645 GNU Classpath grmiregistry
16. TCP 21 vsftpd 2.3.4
16.1. auxiliary/scanner/ftp/ftp_version
17. TCP 22 OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0)
17.1. auxiliary/scanner/ssh/ssh_version
18. TCP 80 Apache httpd 2.2.8 ((Ubuntu) DAV/2)
19. TCP 139 Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
20. TCP 512 netkit-rsh rexecd
21. TCP 514 Netkit rshd
22. TCP 1524 Metasploitable root shell
23. TCP 2121 ProFTPD 1.3.1
24. TCP 3632 distccd v1 ((GNU) 4.2.4 (Ubuntu 4.2.4-1ubuntu4))
25. TCP 5900 VNC (protocol 3.3)
25.1. auxiliary/scanner/vnc/vnc_none_auth
26. TCP 6667 UnrealIRCd
27. TCP 8009 Apache Jserv (Protocol v1.3)
28. TCP 8787 Ruby DRb RMI (Ruby 1.8; path /usr/lib/ruby/1.8/drb)
29. TCP 54937 1-3 (RPC #100005)
30. TCP 60976 1-4 (RPC #100021)