Cyber With KT
search
⌘Ctrlk
Cyber With KT
  • user-helmet-safetyAbout Me
  • 🗃️Courses
    • TCM
      • Practical Ethical Hacking (TCM)
        • Intro
        • Networking Refresher
        • Setting Up Our Lab
        • Introduction to Linux
        • Introduction to Python
        • Information Gathering (Reconnaissance)
        • Scanning & Enumeration
          • Installing Kioptrix
          • Scanning with Nmap
          • Enumerating HTTP and HTTPS I
          • Enumerating HTTP and HTTPS II
          • Enumerating SMB
          • Enumerating SSH
          • Researching Potential Vulnerabilities
            • Vulnerabilities
        • Vulnerability Scanning with Nessus
        • Exploitation Basics
      • Practical Security Fundamentals
    • Cybrary
    • HackingLK
    • Hackviser
    • CWL
  • 📚Concepts
  • 🏁Challenges/CTFs
  • 🚩Walkthrough/Writeups
  • 🛠️Tools & Commands
  • 💎Projects
  • 📱Content Creation
  • 📝Cheat Sheets
  • 🔍OSINT Tools & Notes
  • 🐞Bug Bounty
  • 💡Research & Experiments
  • Templates & Reporting
  • Interview & Certification Prep
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 🗃️Courseschevron-right
  2. TCMchevron-right
  3. Practical Ethical Hacking (TCM)chevron-right
  4. Scanning & Enumerationchevron-right
  5. Researching Potential Vulnerabilities

Vulnerabilities

  • 80/443 - Potentially vulnerable to OpenLuck

(https://www.exploit-db.com/exploits/47080arrow-up-right),(https://github.com/heltonWernik/OpenLuckarrow-up-right)

  • 139 - Potentially vulnerable to trans2open (https://www.rapid7.com/db/modules/exploit/linux/samba/trans2open/arrow-up-right)

PreviousResearching Potential Vulnerabilitieschevron-leftNextVulnerability Scanning with Nessuschevron-right

Last updated 8 months ago