nginx
tcp/443 tcp/80
Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c3c499236a5e83a2d06688a0ecaec804790d707d86
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON ActiveBackupforBusiness BD docker Films homebridge homes music photo Sauvegarde Téléchargement video IPC$
Open service 82.66.249.101:445
2025-01-01 00:23
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.66.249.101:445
2024-12-24 00:40
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.66.249.101:80 · damienmarechal02.direct.quickconnect.to
2024-12-23 09:17
HTTP/1.1 200 OK Server: nginx Date: Mon, 23 Dec 2024 09:17:11 GMT Content-Type: text/html Content-Length: 494 Last-Modified: Sun, 01 Dec 2024 00:22:26 GMT Connection: close ETag: "674bac42-1ee" Cache-Control: no-cache Accept-Ranges: bytes <!DOCTYPE html> <html> <body> <input type="hidden" id="http" name="http" value="5000"> <input type="hidden" id="https" name="https" value="5001"> <input type="hidden" id="prefer_https" name="prefer_https" value="true"> </body> <script type="text/javascript"> var protocol="https:"; var port=5001; var URL=protocol+"//"+location.hostname+":"+port+location.pathname+location.search; location.replace(URL); </script> </html>
Open service 82.66.249.101:443 · damienmarechal02.direct.quickconnect.to
2024-12-23 09:17
HTTP/1.1 200 OK Server: nginx Date: Mon, 23 Dec 2024 09:17:11 GMT Content-Type: text/html Content-Length: 494 Last-Modified: Sun, 01 Dec 2024 00:22:26 GMT Connection: close ETag: "674bac42-1ee" Cache-Control: no-cache Accept-Ranges: bytes <!DOCTYPE html> <html> <body> <input type="hidden" id="http" name="http" value="5000"> <input type="hidden" id="https" name="https" value="5001"> <input type="hidden" id="prefer_https" name="prefer_https" value="true"> </body> <script type="text/javascript"> var protocol="https:"; var port=5001; var URL=protocol+"//"+location.hostname+":"+port+location.pathname+location.search; location.replace(URL); </script> </html>
Open service 82.66.249.101:445
2024-12-22 00:59
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.66.249.101:445
2024-12-20 00:34
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.66.249.101:445
2024-12-18 01:45
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.66.249.101:445
2024-12-15 23:50
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.66.249.101:445
2024-12-14 00:04
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.66.249.101:445
2024-12-12 00:59
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0