Get Started. It's Free
or sign up with your email address
metasploitable by Mind Map: metasploitable

1. TCP 23 Linux telnetd

2. TCP 25 Postfix smtpd

3. TCP 53 ISC BIND 9.4.2

4. TCP 111 2 (RPC #100000)

5. TCP 445 Samba smbd 3.X - 4.X (workgroup: WORKGROUP)

5.1. auxiliary/scanner/smb/smb_version

5.2. auxiliary/scanner/smb/smb_login

6. TCP 513

7. TCP 1099 GNU Classpath grmiregistry

8. TCP 2049 2-4 (RPC #100003)

9. TCP 3306 MySQL 5.0.51a-3ubuntu5

10. TCP 5432 PostgreSQL DB 8.3.0 - 8.3.7

11. TCP 6000 (access denied)

12. TCP 6697 UnrealIRCd

13. TCP 8180 Apache Tomcat/Coyote JSP engine 1.1

14. TCP 46328 1 (RPC #100024)

15. TCP 59645 GNU Classpath grmiregistry

16. TCP 21 vsftpd 2.3.4

16.1. auxiliary/scanner/ftp/ftp_version

17. TCP 22 OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0)

17.1. auxiliary/scanner/ssh/ssh_version

18. TCP 80 Apache httpd 2.2.8 ((Ubuntu) DAV/2)

19. TCP 139 Samba smbd 3.X - 4.X (workgroup: WORKGROUP)

20. TCP 512 netkit-rsh rexecd

21. TCP 514 Netkit rshd

22. TCP 1524 Metasploitable root shell

23. TCP 2121 ProFTPD 1.3.1

24. TCP 3632 distccd v1 ((GNU) 4.2.4 (Ubuntu 4.2.4-1ubuntu4))

25. TCP 5900 VNC (protocol 3.3)

25.1. auxiliary/scanner/vnc/vnc_none_auth

26. TCP 6667 UnrealIRCd

27. TCP 8009 Apache Jserv (Protocol v1.3)

28. TCP 8787 Ruby DRb RMI (Ruby 1.8; path /usr/lib/ruby/1.8/drb)

29. TCP 54937 1-3 (RPC #100005)

30. TCP 60976 1-4 (RPC #100021)