rustscan -a 10.10.11.60 --range 1-65535 -- -sV [!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers [!] Your file limit is very small, which negatively impacts RustScan's speed. Use the Docker image, or up the Ulimit with '--ulimit 5000'. Open 10.10.11.60:22 Open 10.10.11.60:53 Open 10.10.11.60:80 Open 10.10.11.60:88 Open 10.10.11.60:135 Open 10.10.11.60:139 Open 10.10.11.60:389 Open 10.10.11.60:445 Open 10.10.11.60:464 Open 10.10.11.60:593 Open 10.10.11.60:636 Open 10.10.11.60:3268 Open 10.10.11.60:3269 Open 10.10.11.60:9389 Open 10.10.11.60:49664 Open 10.10.11.60:49668 Open 10.10.11.60:49670 Open 10.10.11.60:56427 Open 10.10.11.60:56418 Open 10.10.11.60:56414 [~] Starting Nmap [>] The Nmap command to be run is nmap -sV -vvv -p 22,53,80,88,135,139,389,445,464,593,636,3268,3269,9389,49664,49668,49670,56427,56418,56414 10.10.11.60
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-04-12 04:01 UTC NSE: Loaded 46 scripts for scanning. Initiating Ping Scan at 04:01 Scanning 10.10.11.60 [4 ports] Completed Ping Scan at 04:01, 1.78s elapsed (1 total hosts) Initiating SYN Stealth Scan at 04:01 Scanning frizzdc.frizz.htb (10.10.11.60) [20 ports] Discovered open port 53/tcp on10.10.11.60 Discovered open port 139/tcp on10.10.11.60 Discovered open port 22/tcp on10.10.11.60 Discovered open port 56427/tcp on10.10.11.60 Discovered open port 445/tcp on10.10.11.60 Discovered open port 80/tcp on10.10.11.60 Discovered open port 135/tcp on10.10.11.60 Discovered open port 389/tcp on10.10.11.60 Discovered open port 593/tcp on10.10.11.60 Discovered open port 636/tcp on10.10.11.60 Discovered open port 56414/tcp on10.10.11.60 Discovered open port 49670/tcp on10.10.11.60 Discovered open port 464/tcp on10.10.11.60 Discovered open port 49668/tcp on10.10.11.60 Discovered open port 9389/tcp on10.10.11.60 Discovered open port 3269/tcp on10.10.11.60 Discovered open port 56418/tcp on10.10.11.60 Discovered open port 3268/tcp on10.10.11.60 Discovered open port 49664/tcp on10.10.11.60 Discovered open port 88/tcp on10.10.11.60 Completed SYN Stealth Scan at 04:01, 0.61s elapsed (20 total ports) Initiating Service scan at 04:01 Scanning20 services on frizzdc.frizz.htb (10.10.11.60) Completed Service scan at 04:02, 57.89s elapsed (20 services on1 host) NSE: Script scanning 10.10.11.60. NSE: Starting runlevel 1 (of 2) scan. Initiating NSE at 04:02 Completed NSE at 04:02, 1.21s elapsed NSE: Starting runlevel 2 (of 2) scan. Initiating NSE at 04:02 Completed NSE at 04:02, 1.08s elapsed Nmap scan report for frizzdc.frizz.htb (10.10.11.60) Host is up, received echo-reply ttl 127 (0.42s latency). Scanned at 2025-04-1204:01:39 UTC for 61s
PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 127 OpenSSH for_Windows_9.5 (protocol 2.0) 53/tcp open domain syn-ack ttl 127 Simple DNS Plus 80/tcp open http syn-ack ttl 127 Apache httpd 2.4.58 (OpenSSL/3.1.3 PHP/8.2.12) 88/tcp open kerberos-sec syn-ack ttl 127 Microsoft Windows Kerberos (server time: 2025-04-1210:42:29Z) 135/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 139/tcp open netbios-ssn syn-ack ttl 127 Microsoft Windows netbios-ssn 389/tcp open ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: frizz.htb0., Site: Default-First-Site-Name) 445/tcp open microsoft-ds? syn-ack ttl 127 464/tcp open kpasswd5? syn-ack ttl 127 593/tcp open ncacn_http syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0 636/tcp open tcpwrapped syn-ack ttl 127 3268/tcp open ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: frizz.htb0., Site: Default-First-Site-Name) 3269/tcp open tcpwrapped syn-ack ttl 127 9389/tcp open mc-nmf syn-ack ttl 127 .NET Message Framing 49664/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 49668/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 49670/tcp open ncacn_http syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0 56414/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 56418/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 56427/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC Service Info: Hosts: localhost, FRIZZDC; OS: Windows; CPE: cpe:/o:microsoft:windows
Read data files from: /usr/bin/../share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 63.41 seconds Raw packets sent: 24 (1.032KB) | Rcvd: 21 (908B)
<?php /* Gibbon, Flexible & Open School System Copyright (C) 2010, Ross Parker
This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program. If not, see <http://www.gnu.org/licenses/>. */
/** * Sets the database connection information. * You can supply an optional $databasePort if your server requires one. */ $databaseServer = 'localhost'; $databaseUsername = 'MrGibbonsDB'; $databasePassword = 'MisterGibbs!Parrot!?1'; $databaseName = 'gibbon';
/** * Sets a globally unique id, to allow multiple installs on a single server. */ $guid = '7y59n5xz-uym-ei9p-7mmq-83vifmtyey2';
/** * Sets system-wide caching factor, used to balance performance and freshness. * Value represents number of page loads between cache refresh. * Must be positive integer. 1 means no caching. */ $caching = 10;