2022-12-05 07:42:28 +00:00
|
|
|
id: rpcbind-portmapper-detect
|
|
|
|
|
|
|
|
info:
|
2023-02-06 15:29:04 +00:00
|
|
|
name: Rpcbind Portmapper - Detect
|
2022-12-05 07:42:28 +00:00
|
|
|
author: geeknik
|
|
|
|
severity: info
|
2023-02-06 15:29:04 +00:00
|
|
|
description: Rpcbind portmapper was detected.
|
2022-12-05 07:42:28 +00:00
|
|
|
reference: https://book.hacktricks.xyz/pentesting/pentesting-rpcbind
|
2023-02-06 15:29:04 +00:00
|
|
|
classification:
|
|
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
|
|
|
cwe-id: CWE-200
|
2022-12-09 04:36:04 +00:00
|
|
|
metadata:
|
2023-09-27 13:29:58 +00:00
|
|
|
max-request: 1
|
2022-12-09 04:36:04 +00:00
|
|
|
shodan-query: port:"111"
|
2024-04-08 11:34:33 +00:00
|
|
|
verified: true
|
|
|
|
tags: network,rpcbind,portmap,detect
|
|
|
|
|
2023-04-27 04:28:59 +00:00
|
|
|
tcp:
|
2022-12-05 07:42:28 +00:00
|
|
|
- inputs:
|
|
|
|
- data: 8000002836ed646d0000000000000002000186a0000000040000000400000000000000000000000000000000
|
|
|
|
type: hex
|
|
|
|
|
|
|
|
host:
|
|
|
|
- "{{Hostname}}"
|
2023-09-16 19:35:21 +00:00
|
|
|
port: 111
|
2022-12-05 07:42:28 +00:00
|
|
|
|
|
|
|
matchers:
|
|
|
|
- type: word
|
|
|
|
words:
|
|
|
|
- "/run/rpcbind.sock"
|
2023-10-19 13:13:52 +00:00
|
|
|
# digest: 4b0a00483046022100d9265d34f5765ac8f6f4716a9aaccb2c566c6276019a306ab138208d0c971d8f022100eefe6b25c11f23f989f9b7f09450ad8b9a335b2bef4419ce3315f62746443c51:922c64590222798bb761d5b6d8e72950
|