Author Topic: how can i get access to the server by this services?  (Read 1181 times)

0 Members and 1 Guest are viewing this topic.

Offline firekernel

  • NULL
  • Posts: 3
  • Cookies: -2
  • If You Are Thinking I am Doing
    • View Profile
how can i get access to the server by this services?
« on: August 19, 2013, 12:23:23 pm »
Dear members and masters
i have a problem , i scanned a server by the SuperScan and the result of open ports is:

Code: [Select]
|___    21  File Transfer Protocol [Control]
        |___ 220 Microsoft FTP Service..
    |___    25  Simple Mail Transfer
        |___ 220 WIN-JOPOPIJTO6T.home ESMTP MailEnable Service, Version: 6.57-- ready at 08/19/13 14:32:39..
    |___    53  Domain Name Server
    |___    80  World Wide Web HTTP
        |___ HTTP/1.1 200 OK..Cache-Control: private..Content-Length: 1074608..Content-Type: text/html; charset=utf-8..Server: Microsoft-IIS
    |___   110  Post Office Protocol - Version 3
        |___ +OK Welcome to MailEnable POP3 Server..
    |___   143  Internet Message Access Protocol
        |___ * OK IMAP4rev1 server ready at 08/19/13 14:32:46..

i scanned  it by nmap and it gave me a same result , i tried to exploit server by this services but it didn't work . i tried an exploit to get access by MailEnable service , the result of exploit was :

Code: [Select]
try by nc "target" 1337

but when i tried to connect by nc on port 1337 connection was refused , why?

and i tried all of them , but i couldn't exploit any services that run on the server.

help me please , i have to find any places to get access from the server.

i tried web application too.
the server is windows server 2003 and IIS run on it.the app developed by ASP.net

what should i do ? help me please.have anyone any private exploit ?
I will try , try and try more to be a best hacker

Offline proxx

  • Avatarception
  • Global Moderator
  • Titan
  • *
  • Posts: 2803
  • Cookies: 256
  • ФФФ
    • View Profile
Re: how can i get access to the server by this services?
« Reply #1 on: August 19, 2013, 01:49:33 pm »
This community is not your personal "how do I hack" helpdesk.
You think posting this in a public place is smart?
And if you have to ask these questions your not ready.

1337 port.. what... haha :) :)
« Last Edit: August 19, 2013, 01:50:50 pm by proxx »
Wtf where you thinking with that signature? - Phage.
This was another little experiment *evillaughter - Proxx.
Evilception... - Phage

Offline WirelessDesert

  • Knight
  • **
  • Posts: 356
  • Cookies: 10
  • I think...
    • View Profile
Re: how can i get access to the server by this services?
« Reply #2 on: August 19, 2013, 03:02:29 pm »
First thing to do is to be available for help, as you don't seem very open with your problem.
Next thing is too use google.

What exploit did you try for MailEnable? How did it give you the error.
Check out my arduino project: Moving car - School project!
"I'm like current, I always take the easiest route."

Offline Kulverstukas

  • Administrator
  • Zeus
  • *
  • Posts: 6627
  • Cookies: 542
  • Fascist dictator
    • View Profile
    • My blog
Re: how can i get access to the server by this services?
« Reply #3 on: August 19, 2013, 04:36:18 pm »
OP doesn't seem to have much knowledge about what he's doing, being a desperate skid, but...

That 1337 port of probably a honey pot :D I also don't see any 1337 port in the report you provided, so the connection gets refused because no one is listening on that port (doesn't accept connections)... you seriously need to do your homework.

Offline firekernel

  • NULL
  • Posts: 3
  • Cookies: -2
  • If You Are Thinking I am Doing
    • View Profile
Re: how can i get access to the server by this services?
« Reply #4 on: August 19, 2013, 06:06:36 pm »
Quote
First thing to do is to be available for help, as you don't seem very open with your problem.
Next thing is too use google.

What exploit did you try for MailEnable? How did it give you the error.

thanks a lot for your replay.
i test this exploit about MailEnable and i changed the port (8080) to 25,143,110 because the MailEnable Service Listen on those ports,not 8080 on the server.
Quote
http://www.exploit-db.com/exploits/952/

and the result was:
Quote
Connect to target Using User (hack) Pass (hack)

but didn't work and i could not connect to server by this user and pass

Quote
OP doesn't seem to have much knowledge about what he's doing, being a desperate skid, but...

That 1337 port of probably a honey pot :D I also don't see any 1337 port in the report you provided, so the connection gets refused because no one is listening on that port (doesn't accept connections)... you seriously need to do your homework.

:
No , You are in mistake , the port 1337 was created when i run the exploit to reverse shell.

Quote
This community is not your personal "how do I hack" helpdesk.
You think posting this in a public place is smart?
And if you have to ask these questions your not ready.

:
Hi Dear Friend I am very sorry about my post, this post is 3'th post on this community and i am not good in English and i think Cause misunderstanding,i am so sorry about this subject that i posted it on a public place , and i want you to guide me that where can i ask my question on this community place,please? :'(

thanks again for other users that replied.




I will try , try and try more to be a best hacker

Offline s0uthboy

  • /dev/null
  • *
  • Posts: 12
  • Cookies: 1
    • View Profile
Re: how can i get access to the server by this services?
« Reply #5 on: August 27, 2013, 03:03:56 am »
are you sure that your target is vulnerable to your exploit?? you should know that many times the bug you pretend to use is just patched..
______
< sup? >
   ------
        \   ^__^
          \  (oo)\_______
             (__)\              )\/\
                       ||----w |
                       ||       ||

Spacecow

  • Guest
Re: how can i get access to the server by this services?
« Reply #6 on: August 31, 2013, 11:48:02 pm »
The best recommendation  have for you is too read more post less. It's clear you're a little lacking in knowledge about what you're doing.