Apache 2.4.6
tcp/8080
PHP 5.4.16
tcp/8080
Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c37aa5d05dc442b4772a05823fb97199a45ec92dff
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON netlogon sysvol publico AvMateriaPrima Controle_Producao backup$ Compras Iso9001 PCP Custos_Manutencao RH programacao_cnc IPC$
Open service 189.48.188.204:445
2024-12-22 00:59
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 189.48.188.204:445
2024-12-20 00:34
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 189.48.188.204:445
2024-12-18 01:43
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 189.48.188.204:8080
2024-12-17 19:16
HTTP/1.1 403 Forbidden Date: Tue, 17 Dec 2024 19:16:58 GMT Server: Apache/2.4.6 (CentOS) PHP/5.4.16 Last-Modified: Thu, 16 Oct 2014 13:20:58 GMT ETag: "1321-5058a1e728280" Accept-Ranges: bytes Content-Length: 4897 Connection: close Content-Type: text/html; charset=UTF-8 Page title: Apache HTTP Server Test Page powered by CentOS <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html><head> <meta http-equiv="content-type" content="text/html; charset=UTF-8"> <title>Apache HTTP Server Test Page powered by CentOS</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <!-- Bootstrap --> <link href="/noindex/css/bootstrap.min.css" rel="stylesheet"> <link rel="stylesheet" href="noindex/css/open-sans.css" type="text/css" /> <style type="text/css"><!-- body { font-family: "Open Sans", Helvetica, sans-serif; font-weight: 100; color: #ccc; background: rgba(10, 24, 55, 1); font-size: 16px; } h2, h3, h4 { font-weight: 200; } h2 { font-size: 28px; } .jumbotron { margin-bottom: 0; color: #333; background: rgb(212,212,221); /* Old browsers */ background: radial-gradient(ellipse at center top, rgba(255,255,255,1) 0%,rgba(174,174,183,1) 100%); /* W3C */ } .jumbotron h1 { font-size: 128px; font-weight: 700; color: white; text-shadow: 0px 2px 0px #abc, 0px 4px 10px rgba(0,0,0,0.15), 0px 5px 2px rgba(0,0,0,0.1), 0px 6px 30px rgba(0,0,0,0.1); } .jumbotron p { font-size: 28px; font-weight: 100; } .main { background: white; color: #234; border-top: 1px solid rgba(0,0,0,0.12); padding-top: 30px; padding-bottom: 40px; } .footer { border-top: 1px solid rgba(255,255,255,0.2); padding-top: 30px; } --></style> </head> <body> <div class="jumbotron text-center"> <div class="container"> <h1>Testing 123..</h1> <p class="lead">This page is used to test the proper operation of the <a href="http://apache.org">Apache HTTP server</a> after it has been installed. If you can read this page it means that this site is working properly. This server is powered by <a href="http://centos.org">CentOS</a>.</p> </div> </div> <div class="main"> <div class="container"> <div class="row"> <div class="col-sm-6"> <h2>Just visiting?</h2> <p class="lead">The website you just visited is either experiencing problems or is undergoing routine maintenance.</p> <p>If you would like to let the administrators of this website know that you've seen this page instead of the page you expected, you should send them e-mail. In general, mail sent to the name "webmaster" and directed to the website's domain should reach the appropriate person.</p> <p>For example, if you experienced problems while visiting www.example.com, you should send e-mail to "webmaster@example.com".</p> </div> <div class="col-sm-6"> <h2>Are you the Administrator?</h2> <p>You should add your website content to the directory <tt>/var/www/html/</tt>.</p> <p>To prevent this page from ever being used, follow the instructions in the file <tt>/etc/httpd/conf.d/welcome.conf</tt>.</p> <h2>Promoting Apache and CentOS</h2> <p>You are free to use the images below on Apache and CentOS Linux powered HTTP servers. Thanks for using Apache and CentOS!</p> <p><a href="http://httpd.apache.org/"><img src="images/apache_pb.gif" alt="[ Powered by Apache ]"></a> <a href="http://www.centos.org/"><img src="images/poweredby.png" alt="[ Powered by CentOS Linux ]" height="31" width="88"></a></p> </div> </div> </div> </div> </div> <div class="footer"> <div class="container"> <div class="row"> <div class="col-sm-6"> <h2>Important note:</h2> <p class="lead">The CentOS Project has nothing to do with this website or its content, it just provides the software that makes the website run.</p> <p>If you have issues with the content of this site, contact the owner of the domain, not the CentOS project. Unless you intended to visit CentOS.org, the CentOS Project does not have anything to do with this website, the content or the lack of it.</p> <p>For example, if this website is www.example.com, you would find the
Open service 189.48.188.204:445
2024-12-15 23:49
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 189.48.188.204:445
2024-12-14 00:05
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 189.48.188.204:445
2024-12-12 01:05
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 189.48.188.204:445
2024-12-02 01:30
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 189.48.188.204:445
2024-11-30 00:41
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 189.48.188.204:445
2024-11-28 01:01
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 189.48.188.204:445
2024-11-20 17:21
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 189.48.188.204:9000
2024-11-20 11:17
HTTP/1.1 307 Temporary Redirect Content-Type: text/html; charset=utf-8 Location: /minio/ Vary: Origin Date: Wed, 20 Nov 2024 11:17:31 GMT Content-Length: 43 Connection: close