Hacking Linux Exposed

About
Authors
Contents
Reviews
Foreword
Purchase

Articles
Books
Sourcecode
Tools
Errata

Home

 


(view this code in a separate window)


crackerbox# raccess -o 10.10.164.74
Remote Access Session v0.7 - Code by Angel Ramos <seamus@salix.org>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

--Detecting Remote OS...
10.10.164.74:21 * Standard: Solaris 2.x, Linux 2.2.??? 2.4.???, MacOS

--Service ftp Port 21: Opened!!--
Banner Info: 220 ProFTPD 1.2.2 Server

--Service ssh Port 22: Opened!!--
Banner Info: SSH-1.99-OpenSSH_3.1p1

--Service smtp Port 25: Opened!!--
Banner Info: 220 Blarney.example.com ESMTP Postfix

--Checking named version...
Named version: 9.1.3

--Service www Port 80: Opened!!--
Server: Apache/1.3.24 (Unix) PHP/4.1.2 mod_ssl/2.8.8 OpenSSL/0.9.6b

--Service pop3 Port 110: Opened!!--
Banner Info: +OK Qpopper (version 4.0.3) at blarney starting.

--Service imap2 Port 143: Opened!!--
Banner Info: * OK [CAPABILITY IMAP4REV1 LOGIN-REFERRALS STARTTLS
AUTH=LOGIN] blarney IMAP4rev1 2001.313 at Tue, 19 Apr 2002 11:17:51 -0700 (PDT)

--Service https Port 443: Opened!!--
Server: Apache/1.3.24 (Unix) PHP/4.1.2 mod_ssl/2.8.8 OpenSSL/0.9.6b

----------------
Scan Completed!!
Starting attack session...
-------------------------------
Do you want to check if there are exploits that match with the vendor,
version and OS of the remote host's services (y/n)? y
Checking if any exploit matches with vendor, version and OS of the services...
-------------------------------
Do you want to check if there are exploits that only match with the
vendor and version of the remote host's services (y/n)? y
Checking if any exploit matches with vendor, version of the services...
None exploit or exploits match with vendor and version.