Cyber With KT
Ctrlk
  • About Me
  • 🗃️Courses
    • TCM
      • Practical Ethical Hacking (TCM)
        • Intro
        • Networking Refresher
        • Setting Up Our Lab
        • Introduction to Linux
        • Introduction to Python
        • Information Gathering (Reconnaissance)
        • Scanning & Enumeration
          • Installing Kioptrix
          • Scanning with Nmap
          • Enumerating HTTP and HTTPS I
          • Enumerating HTTP and HTTPS II
          • Enumerating SMB
          • Enumerating SSH
          • Researching Potential Vulnerabilities
            • Vulnerabilities
        • Vulnerability Scanning with Nessus
        • Exploitation Basics
      • Practical Security Fundamentals
    • Cybrary
    • HackingLK
    • Hackviser
    • CWL
  • 📚Concepts
  • 🏁Challenges/CTFs
  • 🚩Walkthrough/Writeups
  • 🛠️Tools & Commands
  • 💎Projects
  • 📱Content Creation
  • 📝Cheat Sheets
  • 🔍OSINT Tools & Notes
  • 🐞Bug Bounty
  • 💡Research & Experiments
  • Templates & Reporting
  • Interview & Certification Prep
Powered by GitBook
On this page
  1. 🗃️Courses
  2. TCM
  3. Practical Ethical Hacking (TCM)
  4. Scanning & Enumeration
  5. Researching Potential Vulnerabilities

Vulnerabilities

  • 80/443 - Potentially vulnerable to OpenLuck

(https://www.exploit-db.com/exploits/47080),(https://github.com/heltonWernik/OpenLuck)

  • 139 - Potentially vulnerable to trans2open (https://www.rapid7.com/db/modules/exploit/linux/samba/trans2open/)

PreviousResearching Potential VulnerabilitiesNextVulnerability Scanning with Nessus

Last updated 5 months ago