Httpd 1.0
tcp/8080
Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c3df372350ae0c0771fa25ef0ffa25ef0ffa25ef0f
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON print$ multimedia IPC$
Open service 211.170.18.9:445
2024-12-22 01:00
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 211.170.18.9:445
2024-12-20 00:36
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 211.170.18.9:445
2024-12-18 01:49
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 211.170.18.9:8080
2024-12-17 19:00
HTTP/1.0 200 OK Date: Tue, 17 Dec 2024 19:00:48 GMT Server: Httpd/1.0 Connection: close Content-Length: 112 Last-Modified: Tue, 07 Apr 2020 02:44:20 GMT Content-Type: text/html <html> <head> <meta http-equiv=refresh content="0; URL=login/login.cgi"> <title></title> <body> </body> </html>
Open service 211.170.18.9:445
2024-12-15 23:54
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 211.170.18.9:445
2024-12-14 00:07
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 211.170.18.9:445
2024-12-12 01:04
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 211.170.18.9:445
2024-12-02 01:07
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 211.170.18.9:445
2024-11-30 00:49
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 211.170.18.9:445
2024-11-28 00:32
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0