Skip to content
Keith Lee edited this page Jul 23, 2019 · 4 revisions
$  sudo python msfHelper1.py 172.16.164.218 
[*] Launching Metasploit msfrpcd
[*] Reading from msfHelper.db
[*] Loaded 474 URI paths from msfHelper.db
[*] Loaded 2982 modules from Metasploit

[*] Running nmap against target: 172.16.164.218
Starting Nmap 7.70 ( https://nmap.org ) at 2019-07-23 21:13 +08
Nmap scan report for 172.16.164.218
Host is up (0.00047s latency).
Not shown: 304 filtered ports
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT     STATE SERVICE     VERSION
21/tcp   open  ftp         vsftpd 2.3.4
22/tcp   open  ssh         OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0)
23/tcp   open  telnet      Linux telnetd
25/tcp   open  smtp        Postfix smtpd
80/tcp   open  http        Apache httpd 2.2.8 ((Ubuntu) DAV/2)
110/tcp  open  tcpwrapped
111/tcp  open  rpcbind     2 (RPC #100000)
139/tcp  open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
143/tcp  open  tcpwrapped
445/tcp  open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
512/tcp  open  exec        netkit-rsh rexecd
513/tcp  open  login       OpenBSD or Solaris rlogind
514/tcp  open  tcpwrapped
1099/tcp open  rmiregistry GNU Classpath grmiregistry
2049/tcp open  nfs         2-4 (RPC #100003)
3306/tcp open  mysql       MySQL 5.0.51a-3ubuntu5
3632/tcp open  distccd     distccd v1 ((GNU) 4.2.4 (Ubuntu 4.2.4-1ubuntu4))
5432/tcp open  postgresql  PostgreSQL DB 8.3.0 - 8.3.7
5900/tcp open  vnc         VNC (protocol 3.3)
6000/tcp open  X11         (access denied)
6667/tcp open  irc         UnrealIRCd
8787/tcp open  drb         Ruby DRb RMI (Ruby 1.8; path /usr/lib/ruby/1.8/drb)
MAC Address: 00:0C:29:8F:8F:95 (VMware)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.9 - 2.6.33
Network Distance: 1 hop
Service Info: Hosts:  metasploitable.localdomain, localhost, irc.Metasploitable.LAN; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 15.68 seconds

[List of Unique Service Banners]
--------  ----------------------------------------------------------------------------
21/tcp    vsftpd version: 2.3.4 ostype: Unix
2049/tcp  version: 2-4 extrainfo: RPC #100003
512/tcp   netkit-rsh rexecd ostype: Linux
6000/tcp  extrainfo: access denied
3632/tcp  distccd version: v1 extrainfo: (GNU) 4.2.4 (Ubuntu 4.2.4-1ubuntu4)
5900/tcp  VNC extrainfo: protocol 3.3
6667/tcp  UnrealIRCd hostname: irc.Metasploitable.LAN
139/tcp   Samba smbd version: 3.X - 4.X extrainfo: workgroup: WORKGROUP
445/tcp   Samba smbd version: 3.X - 4.X extrainfo: workgroup: WORKGROUP
8787/tcp  Ruby DRb RMI extrainfo: Ruby 1.8; path /usr/lib/ruby/1.8/drb
5432/tcp  PostgreSQL DB version: 8.3.0 - 8.3.7
25/tcp    Postfix smtpd hostname:  metasploitable.localdomain
22/tcp    OpenSSH version: 4.7p1 Debian 8ubuntu1 extrainfo: protocol 2.0 ostype: Linux
3306/tcp  MySQL version: 5.0.51a-3ubuntu5
23/tcp    Linux telnetd ostype: Linux
53/tcp    ISC BIND version: 9.4.2
1099/tcp  GNU Classpath grmiregistry hostname: localhost
80/tcp    Apache httpd version: 2.2.8 extrainfo: (Ubuntu) DAV/2
--------  ----------------------------------------------------------------------------

[Matching Ports with Metasploit]
+---------------------+--------------------------------------------------------------------------+
| Targets             | Metasploit Module                                                        |
+=====================+==========================================================================+
| 172.16.164.218:512  | auxiliary/scanner/rservices/rexec_login                                  |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:513  | auxiliary/scanner/rservices/rlogin_login                                 |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:514  | auxiliary/scanner/rservices/rsh_login                                    |
|                     | exploit/windows/misc/windows_rsh                                         |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:1099 | auxiliary/gather/java_rmi_registry                                       |
|                     | auxiliary/scanner/misc/java_jmx_server                                   |
|                     | auxiliary/scanner/misc/java_rmi_server                                   |
|                     | exploit/linux/misc/opennms_java_serialize                                |
|                     | exploit/multi/misc/java_rmi_server                                       |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:6667 | exploit/multi/misc/legend_bot_exec                                       |
|                     | exploit/multi/misc/pbot_exec                                             |
|                     | exploit/multi/misc/ra1nx_pubcall_exec                                    |
|                     | exploit/multi/misc/w3tw0rk_exec                                          |
|                     | exploit/multi/misc/xdh_x_exec                                            |
|                     | exploit/unix/irc/unreal_ircd_3281_backdoor                               |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:2049 | exploit/windows/nfs/xlink_nfsd                                           |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:3306 | auxiliary/scanner/mysql/mysql_authbypass_hashdump                        |
|                     | auxiliary/scanner/mysql/mysql_file_enum                                  |
|                     | auxiliary/scanner/mysql/mysql_hashdump                                   |
|                     | auxiliary/scanner/mysql/mysql_login                                      |
|                     | auxiliary/scanner/mysql/mysql_schemadump                                 |
|                     | auxiliary/scanner/mysql/mysql_version                                    |
|                     | auxiliary/scanner/mysql/mysql_writable_dirs                              |
|                     | exploit/linux/mysql/mysql_yassl_getname                                  |
|                     | exploit/linux/mysql/mysql_yassl_hello                                    |
|                     | exploit/multi/mysql/mysql_udf_payload                                    |
|                     | exploit/windows/mysql/mysql_mof                                          |
|                     | exploit/windows/mysql/mysql_start_up                                     |
|                     | exploit/windows/mysql/mysql_yassl_hello                                  |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:139  | exploit/freebsd/samba/trans2open                                         |
|                     | exploit/linux/samba/chain_reply                                          |
|                     | exploit/linux/samba/trans2open                                           |
|                     | exploit/multi/ids/snort_dce_rpc                                          |
|                     | exploit/multi/samba/nttrans                                              |
|                     | exploit/multi/samba/usermap_script                                       |
|                     | exploit/osx/samba/trans2open                                             |
|                     | exploit/solaris/samba/trans2open                                         |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:5900 | auxiliary/scanner/vnc/ard_root_pw                                        |
|                     | auxiliary/scanner/vnc/vnc_login                                          |
|                     | auxiliary/scanner/vnc/vnc_none_auth                                      |
|                     | exploit/multi/vnc/vnc_keyboard_exec                                      |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:111  | auxiliary/gather/nis_bootparamd_domain                                   |
|                     | auxiliary/gather/nis_ypserv_map                                          |
|                     | auxiliary/scanner/misc/sunrpc_portmapper                                 |
|                     | auxiliary/scanner/nfs/nfsmount                                           |
|                     | auxiliary/scanner/portmap/portmap_amp                                    |
|                     | exploit/aix/rpc_cmsd_opcode21                                            |
|                     | exploit/aix/rpc_ttdbserverd_realpath                                     |
|                     | exploit/netware/sunrpc/pkernel_callit                                    |
|                     | exploit/solaris/sunrpc/sadmind_adm_build_path                            |
|                     | exploit/solaris/sunrpc/sadmind_exec                                      |
|                     | exploit/solaris/sunrpc/ypupdated_exec                                    |
|                     | exploit/windows/brightstor/mediasrv_sunrpc                               |
|                     | exploit/windows/emc/networker_format_string                              |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:80   | auxiliary/crawler/msfcrawler                                             |
|                     | auxiliary/gather/advantech_webaccess_creds                               |
|                     | auxiliary/gather/avtech744_dvr_accounts                                  |
|                     | auxiliary/gather/c2s_dvr_password_disclosure                             |
|                     | auxiliary/gather/cerberus_helpdesk_hash_disclosure                       |
|                     | auxiliary/gather/coldfusion_pwd_props                                    |
|                     | auxiliary/gather/dolibarr_creds_sqli                                     |
|                     | auxiliary/gather/doliwamp_traversal_creds                                |
|                     | auxiliary/gather/drupal_openid_xxe                                       |
|                     | auxiliary/gather/external_ip                                             |
|                     | auxiliary/gather/huawei_wifi_info                                        |
|                     | auxiliary/gather/ibm_bigfix_sites_packages_enum                          |
|                     | auxiliary/gather/ipcamera_password_disclosure                            |
|                     | auxiliary/gather/jenkins_cred_recovery                                   |
|                     | auxiliary/gather/joomla_com_realestatemanager_sqli                       |
|                     | auxiliary/gather/joomla_contenthistory_sqli                              |
|                     | auxiliary/gather/joomla_weblinks_sqli                                    |
|                     | auxiliary/gather/mantisbt_admin_sqli                                     |
|                     | auxiliary/gather/mongodb_js_inject_collection_enum                       |
|                     | auxiliary/gather/mybb_db_fingerprint                                     |
|                     | auxiliary/gather/netgear_password_disclosure                             |
|                     | auxiliary/gather/oats_downloadservlet_traversal                          |
|                     | auxiliary/gather/pimcore_creds_sqli                                      |
|                     | auxiliary/gather/rails_doubletap_file_read                               |
|                     | auxiliary/gather/vbulletin_vote_sqli                                     |
|                     | auxiliary/gather/wp_all_in_one_migration_export                          |
|                     | auxiliary/gather/wp_ultimate_csv_importer_user_extract                   |
|                     | auxiliary/gather/wp_w3_total_cache_hash_extract                          |
|                     | auxiliary/gather/xerox_pwd_extract                                       |
|                     | auxiliary/gather/xerox_workcentre_5xxx_ldap                              |
|                     | auxiliary/gather/zabbix_toggleids_sqli                                   |
|                     | auxiliary/scanner/http/a10networks_ax_directory_traversal                |
|                     | auxiliary/scanner/http/advantech_webaccess_login                         |
|                     | auxiliary/scanner/http/allegro_rompager_misfortune_cookie                |
|                     | auxiliary/scanner/http/apache_mod_cgi_bash_env                           |
|                     | auxiliary/scanner/http/apache_optionsbleed                               |
|                     | auxiliary/scanner/http/apache_userdir_enum                               |
|                     | auxiliary/scanner/http/appletv_login                                     |
|                     | auxiliary/scanner/http/backup_file                                       |
|                     | auxiliary/scanner/http/bavision_cam_login                                |
|                     | auxiliary/scanner/http/binom3_login_config_pass_dump                     |
|                     | auxiliary/scanner/http/bitweaver_overlay_type_traversal                  |
|                     | auxiliary/scanner/http/blind_sql_query                                   |
|                     | auxiliary/scanner/http/bmc_trackit_passwd_reset                          |
|                     | auxiliary/scanner/http/brute_dirs                                        |
|                     | auxiliary/scanner/http/buffalo_login                                     |
|                     | auxiliary/scanner/http/caidao_bruteforce_login                           |
|                     | auxiliary/scanner/http/canon_wireless                                    |
|                     | auxiliary/scanner/http/cgit_traversal                                    |
|                     | auxiliary/scanner/http/cisco_device_manager                              |
|                     | auxiliary/scanner/http/cisco_firepower_download                          |
|                     | auxiliary/scanner/http/cisco_firepower_login                             |
|                     | auxiliary/scanner/http/cisco_ios_auth_bypass                             |
|                     | auxiliary/scanner/http/clansphere_traversal                              |
|                     | auxiliary/scanner/http/cnpilot_r_web_login_loot                          |
|                     | auxiliary/scanner/http/coldfusion_locale_traversal                       |
|                     | auxiliary/scanner/http/coldfusion_version                                |
|                     | auxiliary/scanner/http/concrete5_member_list                             |
|                     | auxiliary/scanner/http/copy_of_file                                      |
|                     | auxiliary/scanner/http/crawler                                           |
|                     | auxiliary/scanner/http/dir_listing                                       |
|                     | auxiliary/scanner/http/dir_scanner                                       |
|                     | auxiliary/scanner/http/dir_webdav_unicode_bypass                         |
|                     | auxiliary/scanner/http/directadmin_login                                 |
|                     | auxiliary/scanner/http/dlink_dir_300_615_http_login                      |
|                     | auxiliary/scanner/http/dlink_dir_615h_http_login                         |
|                     | auxiliary/scanner/http/dlink_dir_session_cgi_http_login                  |
|                     | auxiliary/scanner/http/dlink_user_agent_backdoor                         |
|                     | auxiliary/scanner/http/dnalims_file_retrieve                             |
|                     | auxiliary/scanner/http/dolibarr_login                                    |
|                     | auxiliary/scanner/http/drupal_views_user_enum                            |
|                     | auxiliary/scanner/http/ektron_cms400net                                  |
|                     | auxiliary/scanner/http/enum_wayback                                      |
|                     | auxiliary/scanner/http/epmp1000_dump_config                              |
|                     | auxiliary/scanner/http/epmp1000_dump_hashes                              |
|                     | auxiliary/scanner/http/epmp1000_get_chart_cmd_exec                       |
|                     | auxiliary/scanner/http/epmp1000_ping_cmd_exec                            |
|                     | auxiliary/scanner/http/epmp1000_reset_pass                               |
|                     | auxiliary/scanner/http/epmp1000_web_login                                |
|                     | auxiliary/scanner/http/error_sql_injection                               |
|                     | auxiliary/scanner/http/etherpad_duo_login                                |
|                     | auxiliary/scanner/http/f5_bigip_virtual_server                           |
|                     | auxiliary/scanner/http/f5_mgmt_scanner                                   |
|                     | auxiliary/scanner/http/file_same_name_dir                                |
|                     | auxiliary/scanner/http/files_dir                                         |
|                     | auxiliary/scanner/http/fortinet_ssl_vpn                                  |
|                     | auxiliary/scanner/http/frontpage_credential_dump                         |
|                     | auxiliary/scanner/http/gavazzi_em_login_loot                             |
|                     | auxiliary/scanner/http/git_scanner                                       |
|                     | auxiliary/scanner/http/gitlab_login                                      |
|                     | auxiliary/scanner/http/gitlab_user_enum                                  |
|                     | auxiliary/scanner/http/goahead_traversal                                 |
|                     | auxiliary/scanner/http/host_header_injection                             |
|                     | auxiliary/scanner/http/hp_sys_mgmt_login                                 |
|                     | auxiliary/scanner/http/http_header                                       |
|                     | auxiliary/scanner/http/http_login                                        |
|                     | auxiliary/scanner/http/http_put                                          |
|                     | auxiliary/scanner/http/http_traversal                                    |
|                     | auxiliary/scanner/http/http_version                                      |
|                     | auxiliary/scanner/http/httpbl_lookup                                     |
|                     | auxiliary/scanner/http/httpdasm_directory_traversal                      |
|                     | auxiliary/scanner/http/iis_internal_ip                                   |
|                     | auxiliary/scanner/http/iis_shortname_scanner                             |
|                     | auxiliary/scanner/http/ipboard_login                                     |
|                     | auxiliary/scanner/http/jboss_vulnscan                                    |
|                     | auxiliary/scanner/http/jenkins_command                                   |
|                     | auxiliary/scanner/http/jenkins_enum                                      |
|                     | auxiliary/scanner/http/joomla_bruteforce_login                           |
|                     | auxiliary/scanner/http/joomla_ecommercewd_sqli_scanner                   |
|                     | auxiliary/scanner/http/joomla_gallerywd_sqli_scanner                     |
|                     | auxiliary/scanner/http/joomla_pages                                      |
|                     | auxiliary/scanner/http/joomla_plugins                                    |
|                     | auxiliary/scanner/http/joomla_version                                    |
|                     | auxiliary/scanner/http/kodi_traversal                                    |
|                     | auxiliary/scanner/http/linknat_vos_traversal                             |
|                     | auxiliary/scanner/http/linksys_e1500_traversal                           |
|                     | auxiliary/scanner/http/litespeed_source_disclosure                       |
|                     | auxiliary/scanner/http/lucky_punch                                       |
|                     | auxiliary/scanner/http/majordomo2_directory_traversal                    |
|                     | auxiliary/scanner/http/manageengine_desktop_central_login                |
|                     | auxiliary/scanner/http/mediawiki_svg_fileaccess                          |
|                     | auxiliary/scanner/http/mod_negotiation_brute                             |
|                     | auxiliary/scanner/http/mod_negotiation_scanner                           |
|                     | auxiliary/scanner/http/ms09_020_webdav_unicode_bypass                    |
|                     | auxiliary/scanner/http/ms15_034_http_sys_memory_dump                     |
|                     | auxiliary/scanner/http/mybook_live_login                                 |
|                     | auxiliary/scanner/http/netgear_sph200d_traversal                         |
|                     | auxiliary/scanner/http/nginx_source_disclosure                           |
|                     | auxiliary/scanner/http/novell_mdm_creds                                  |
|                     | auxiliary/scanner/http/ntlm_info_enumeration                             |
|                     | auxiliary/scanner/http/octopusdeploy_login                               |
|                     | auxiliary/scanner/http/onion_omega2_login                                |
|                     | auxiliary/scanner/http/options                                           |
|                     | auxiliary/scanner/http/phpmyadmin_login                                  |
|                     | auxiliary/scanner/http/pocketpad_login                                   |
|                     | auxiliary/scanner/http/prev_dir_same_name_file                           |
|                     | auxiliary/scanner/http/radware_appdirector_enum                          |
|                     | auxiliary/scanner/http/rails_json_yaml_scanner                           |
|                     | auxiliary/scanner/http/rails_mass_assignment                             |
|                     | auxiliary/scanner/http/rails_xml_yaml_scanner                            |
|                     | auxiliary/scanner/http/replace_ext                                       |
|                     | auxiliary/scanner/http/rewrite_proxy_bypass                              |
|                     | auxiliary/scanner/http/rfcode_reader_enum                                |
|                     | auxiliary/scanner/http/rips_traversal                                    |
|                     | auxiliary/scanner/http/riverbed_steelhead_vcx_file_read                  |
|                     | auxiliary/scanner/http/robots_txt                                        |
|                     | auxiliary/scanner/http/s40_traversal                                     |
|                     | auxiliary/scanner/http/scraper                                           |
|                     | auxiliary/scanner/http/sentry_cdu_enum                                   |
|                     | auxiliary/scanner/http/sevone_enum                                       |
|                     | auxiliary/scanner/http/simple_webserver_traversal                        |
|                     | auxiliary/scanner/http/smt_ipmi_cgi_scanner                              |
|                     | auxiliary/scanner/http/smt_ipmi_url_redirect_traversal                   |
|                     | auxiliary/scanner/http/soap_xml                                          |
|                     | auxiliary/scanner/http/squid_pivot_scanning                              |
|                     | auxiliary/scanner/http/squiz_matrix_user_enum                            |
|                     | auxiliary/scanner/http/ssl_version                                       |
|                     | auxiliary/scanner/http/svn_scanner                                       |
|                     | auxiliary/scanner/http/svn_wcdb_scanner                                  |
|                     | auxiliary/scanner/http/symantec_web_gateway_login                        |
|                     | auxiliary/scanner/http/title                                             |
|                     | auxiliary/scanner/http/totaljs_traversal                                 |
|                     | auxiliary/scanner/http/tplink_traversal_noauth                           |
|                     | auxiliary/scanner/http/trace                                             |
|                     | auxiliary/scanner/http/trace_axd                                         |
|                     | auxiliary/scanner/http/typo3_bruteforce                                  |
|                     | auxiliary/scanner/http/vcms_login                                        |
|                     | auxiliary/scanner/http/verb_auth_bypass                                  |
|                     | auxiliary/scanner/http/vhost_scanner                                     |
|                     | auxiliary/scanner/http/web_vulndb                                        |
|                     | auxiliary/scanner/http/webdav_internal_ip                                |
|                     | auxiliary/scanner/http/webdav_scanner                                    |
|                     | auxiliary/scanner/http/webdav_website_content                            |
|                     | auxiliary/scanner/http/webpagetest_traversal                             |
|                     | auxiliary/scanner/http/wordpress_content_injection                       |
|                     | auxiliary/scanner/http/wordpress_cp_calendar_sqli                        |
|                     | auxiliary/scanner/http/wordpress_ghost_scanner                           |
|                     | auxiliary/scanner/http/wordpress_login_enum                              |
|                     | auxiliary/scanner/http/wordpress_multicall_creds                         |
|                     | auxiliary/scanner/http/wordpress_pingback_access                         |
|                     | auxiliary/scanner/http/wordpress_scanner                                 |
|                     | auxiliary/scanner/http/wordpress_xmlrpc_login                            |
|                     | auxiliary/scanner/http/wp_arbitrary_file_deletion                        |
|                     | auxiliary/scanner/http/wp_contus_video_gallery_sqli                      |
|                     | auxiliary/scanner/http/wp_dukapress_file_read                            |
|                     | auxiliary/scanner/http/wp_gimedia_library_file_read                      |
|                     | auxiliary/scanner/http/wp_mobile_pack_info_disclosure                    |
|                     | auxiliary/scanner/http/wp_mobileedition_file_read                        |
|                     | auxiliary/scanner/http/wp_nextgen_galley_file_read                       |
|                     | auxiliary/scanner/http/wp_simple_backup_file_read                        |
|                     | auxiliary/scanner/http/wp_subscribe_comments_file_read                   |
|                     | auxiliary/scanner/http/xpath                                             |
|                     | auxiliary/scanner/http/zabbix_login                                      |
|                     | auxiliary/scanner/ip/ipidseq                                             |
|                     | auxiliary/scanner/lotus/lotus_domino_hashes                              |
|                     | auxiliary/scanner/lotus/lotus_domino_login                               |
|                     | auxiliary/scanner/lotus/lotus_domino_version                             |
|                     | auxiliary/scanner/misc/dvr_config_disclosure                             |
|                     | auxiliary/scanner/rogue/rogue_recv                                       |
|                     | auxiliary/scanner/rogue/rogue_send                                       |
|                     | auxiliary/scanner/sap/sap_icm_urlscan                                    |
|                     | auxiliary/scanner/sap/sap_soap_rfc_dbmcli_sxpg_call_system_command_exec  |
|                     | auxiliary/scanner/sap/sap_soap_rfc_pfl_check_os_file_existence           |
|                     | auxiliary/scanner/sap/sap_soap_rfc_rzl_read_dir                          |
|                     | auxiliary/scanner/scada/indusoft_ntwebserver_fileaccess                  |
|                     | auxiliary/voip/cisco_cucdm_call_forward                                  |
|                     | auxiliary/voip/cisco_cucdm_speed_dials                                   |
|                     | auxiliary/voip/telisca_ips_lock_control                                  |
|                     | exploit/bsdi/softcart/mercantec_softcart                                 |
|                     | exploit/linux/http/advantech_switch_bash_env_exec                        |
|                     | exploit/linux/http/astium_sqli_upload                                    |
|                     | exploit/linux/http/atutor_filemanager_traversal                          |
|                     | exploit/linux/http/axis_srv_parhand_rce                                  |
|                     | exploit/linux/http/centreon_sqli_exec                                    |
|                     | exploit/linux/http/centreon_useralias_exec                               |
|                     | exploit/linux/http/cisco_firepower_useradd                               |
|                     | exploit/linux/http/cisco_rv130_rmi_rce                                   |
|                     | exploit/linux/http/cpi_tararchive_upload                                 |
|                     | exploit/linux/http/crypttech_cryptolog_login_exec                        |
|                     | exploit/linux/http/ddwrt_cgibin_exec                                     |
|                     | exploit/linux/http/denyall_waf_exec                                      |
|                     | exploit/linux/http/dlink_command_php_exec_noauth                         |
|                     | exploit/linux/http/dlink_dcs931l_upload                                  |
|                     | exploit/linux/http/dlink_dcs_930l_authenticated_remote_command_execution |
|                     | exploit/linux/http/dlink_diagnostic_exec_noauth                          |
|                     | exploit/linux/http/dlink_dir300_exec_telnet                              |
|                     | exploit/linux/http/dlink_dir615_up_exec                                  |
|                     | exploit/linux/http/dlink_dir850l_unauth_exec                             |
|                     | exploit/linux/http/dlink_dsl2750b_exec_noauth                            |
|                     | exploit/linux/http/dlink_dspw110_cookie_noauth_exec                      |
|                     | exploit/linux/http/dlink_hnap_header_exec_noauth                         |
|                     | exploit/linux/http/dnalims_admin_exec                                    |
|                     | exploit/linux/http/dolibarr_cmd_exec                                     |
|                     | exploit/linux/http/dreambox_openpli_shell                                |
|                     | exploit/linux/http/efw_chpasswd_exec                                     |
|                     | exploit/linux/http/esva_exec                                             |
|                     | exploit/linux/http/fritzbox_echo_exec                                    |
|                     | exploit/linux/http/github_enterprise_secret                              |
|                     | exploit/linux/http/gitlist_exec                                          |
|                     | exploit/linux/http/goahead_ldpreload                                     |
|                     | exploit/linux/http/groundwork_monarch_cmd_exec                           |
|                     | exploit/linux/http/huawei_hg532n_cmdinject                               |
|                     | exploit/linux/http/kaltura_unserialize_cookie_rce                        |
|                     | exploit/linux/http/kaltura_unserialize_rce                               |
|                     | exploit/linux/http/librenms_addhost_cmd_inject                           |
|                     | exploit/linux/http/linksys_apply_cgi                                     |
|                     | exploit/linux/http/linksys_e1500_apply_exec                              |
|                     | exploit/linux/http/linksys_themoon_exec                                  |
|                     | exploit/linux/http/linksys_wrt110_cmd_exec                               |
|                     | exploit/linux/http/linksys_wrt160nv2_apply_exec                          |
|                     | exploit/linux/http/linksys_wrt54gl_apply_exec                            |
|                     | exploit/linux/http/linksys_wvbr0_user_agent_exec_noauth                  |
|                     | exploit/linux/http/logsign_exec                                          |
|                     | exploit/linux/http/microfocus_secure_messaging_gateway                   |
|                     | exploit/linux/http/multi_ncc_ping_exec                                   |
|                     | exploit/linux/http/mutiny_frontend_upload                                |
|                     | exploit/linux/http/mvpower_dvr_shell_exec                                |
|                     | exploit/linux/http/nagios_xi_chained_rce                                 |
|                     | exploit/linux/http/nagios_xi_chained_rce_2_electric_boogaloo             |
|                     | exploit/linux/http/nagios_xi_magpie_debug                                |
|                     | exploit/linux/http/netgear_dgn1000_setup_unauth_exec                     |
|                     | exploit/linux/http/netgear_dgn1000b_setup_exec                           |
|                     | exploit/linux/http/netgear_dgn2200b_pppoe_exec                           |
|                     | exploit/linux/http/netgear_dnslookup_cmd_exec                            |
|                     | exploit/linux/http/netgear_r7000_cgibin_exec                             |
|                     | exploit/linux/http/netgear_unauth_exec                                   |
|                     | exploit/linux/http/netgear_wnr2000_rce                                   |
|                     | exploit/linux/http/nginx_chunked_size                                    |
|                     | exploit/linux/http/pandora_fms_sqli                                      |
|                     | exploit/linux/http/php_imap_open_rce                                     |
|                     | exploit/linux/http/piranha_passwd_exec                                   |
|                     | exploit/linux/http/qnap_qcenter_change_passwd_exec                       |
|                     | exploit/linux/http/raidsonic_nas_ib5220_exec_noauth                      |
|                     | exploit/linux/http/railo_cfml_rfi                                        |
|                     | exploit/linux/http/samsung_srv_1670d_upload_exec                         |
|                     | exploit/linux/http/seagate_nas_php_exec_noauth                           |
|                     | exploit/linux/http/symantec_web_gateway_exec                             |
|                     | exploit/linux/http/symantec_web_gateway_file_upload                      |
|                     | exploit/linux/http/symantec_web_gateway_lfi                              |
|                     | exploit/linux/http/symantec_web_gateway_pbcontrol                        |
|                     | exploit/linux/http/symantec_web_gateway_restore                          |
|                     | exploit/linux/http/tiki_calendar_exec                                    |
|                     | exploit/linux/http/tp_link_sc2020n_authenticated_telnet_injection        |
|                     | exploit/linux/http/trendmicro_imsva_widget_exec                          |
|                     | exploit/linux/http/trendmicro_sps_exec                                   |
|                     | exploit/linux/http/trueonline_billion_5200w_rce                          |
|                     | exploit/linux/http/trueonline_p660hn_v1_rce                              |
|                     | exploit/linux/http/trueonline_p660hn_v2_rce                              |
|                     | exploit/linux/http/vap2500_tools_command_exec                            |
|                     | exploit/linux/http/vcms_upload                                           |
|                     | exploit/linux/http/wanem_exec                                            |
|                     | exploit/linux/http/wd_mycloud_multiupload_upload                         |
|                     | exploit/linux/http/webcalendar_settings_exec                             |
|                     | exploit/linux/http/webid_converter                                       |
|                     | exploit/linux/http/webmin_packageup_rce                                  |
|                     | exploit/linux/http/wipg1000_cmd_injection                                |
|                     | exploit/linux/http/xplico_exec                                           |
|                     | exploit/linux/http/zabbix_sqli                                           |
|                     | exploit/linux/http/zimbra_xxe_rce                                        |
|                     | exploit/multi/http/activecollab_chat                                     |
|                     | exploit/multi/http/ajaxplorer_checkinstall_exec                          |
|                     | exploit/multi/http/apache_mod_cgi_bash_env_exec                          |
|                     | exploit/multi/http/apprain_upload_exec                                   |
|                     | exploit/multi/http/atutor_sqli                                           |
|                     | exploit/multi/http/auxilium_upload_exec                                  |
|                     | exploit/multi/http/bolt_file_upload                                      |
|                     | exploit/multi/http/builderengine_upload_exec                             |
|                     | exploit/multi/http/caidao_php_backdoor_exec                              |
|                     | exploit/multi/http/cisco_dcnm_upload                                     |
|                     | exploit/multi/http/clipbucket_fileupload_exec                            |
|                     | exploit/multi/http/cmsms_showtime2_rce                                   |
|                     | exploit/multi/http/cmsms_upload_rename_rce                               |
|                     | exploit/multi/http/coldfusion_ckeditor_file_upload                       |
|                     | exploit/multi/http/coldfusion_rds                                        |
|                     | exploit/multi/http/confluence_widget_connector                           |
|                     | exploit/multi/http/cuteflow_upload_exec                                  |
|                     | exploit/multi/http/dexter_casinoloader_exec                              |
|                     | exploit/multi/http/drupal_drupageddon                                    |
|                     | exploit/multi/http/extplorer_upload_exec                                 |
|                     | exploit/multi/http/familycms_less_exec                                   |
|                     | exploit/multi/http/freenas_exec_raw                                      |
|                     | exploit/multi/http/gestioip_exec                                         |
|                     | exploit/multi/http/getsimplecms_unauth_code_exec                         |
|                     | exploit/multi/http/git_client_command_exec                               |
|                     | exploit/multi/http/git_submodule_command_exec                            |
|                     | exploit/multi/http/git_submodule_url_exec                                |
|                     | exploit/multi/http/gitlab_shell_exec                                     |
|                     | exploit/multi/http/gitlist_arg_injection                                 |
|                     | exploit/multi/http/gitorious_graph                                       |
|                     | exploit/multi/http/glossword_upload_exec                                 |
|                     | exploit/multi/http/glpi_install_rce                                      |
|                     | exploit/multi/http/horde_form_file_upload                                |
|                     | exploit/multi/http/horde_href_backdoor                                   |
|                     | exploit/multi/http/ibm_openadmin_tool_soap_welcomeserver_exec            |
|                     | exploit/multi/http/ispconfig_php_exec                                    |
|                     | exploit/multi/http/jenkins_script_console                                |
|                     | exploit/multi/http/jira_hipchat_template                                 |
|                     | exploit/multi/http/joomla_http_header_rce                                |
|                     | exploit/multi/http/kordil_edms_upload_exec                               |
|                     | exploit/multi/http/lcms_php_exec                                         |
|                     | exploit/multi/http/log1cms_ajax_create_folder                            |
|                     | exploit/multi/http/magento_unserialize                                   |
|                     | exploit/multi/http/makoserver_cmd_exec                                   |
|                     | exploit/multi/http/mantisbt_manage_proj_page_rce                         |
|                     | exploit/multi/http/mantisbt_php_exec                                     |
|                     | exploit/multi/http/mediawiki_syntaxhighlight                             |
|                     | exploit/multi/http/mediawiki_thumb                                       |
|                     | exploit/multi/http/mma_backdoor_upload                                   |
|                     | exploit/multi/http/mobilecartly_upload_exec                              |
|                     | exploit/multi/http/monstra_fileupload_exec                               |
|                     | exploit/multi/http/moodle_cmd_exec                                       |
|                     | exploit/multi/http/movabletype_upgrade_exec                              |
|                     | exploit/multi/http/mutiny_subnetmask_exec                                |
|                     | exploit/multi/http/nas4free_php_exec                                     |
|                     | exploit/multi/http/navigate_cms_rce                                      |
|                     | exploit/multi/http/nibbleblog_file_upload                                |
|                     | exploit/multi/http/novell_servicedesk_rce                                |
|                     | exploit/multi/http/nuuo_nvrmini_upgrade_rce                              |
|                     | exploit/multi/http/openmediavault_cmd_exec                               |
|                     | exploit/multi/http/openx_backdoor_php                                    |
|                     | exploit/multi/http/opmanager_socialit_file_upload                        |
|                     | exploit/multi/http/oracle_reports_rce                                    |
|                     | exploit/multi/http/oscommerce_installer_unauth_code_exec                 |
|                     | exploit/multi/http/pandora_upload_exec                                   |
|                     | exploit/multi/http/phoenix_exec                                          |
|                     | exploit/multi/http/php_cgi_arg_injection                                 |
|                     | exploit/multi/http/php_utility_belt_rce                                  |
|                     | exploit/multi/http/php_volunteer_upload_exec                             |
|                     | exploit/multi/http/phpfilemanager_rce                                    |
|                     | exploit/multi/http/phpldapadmin_query_engine                             |
|                     | exploit/multi/http/phpmailer_arg_injection                               |
|                     | exploit/multi/http/phpmoadmin_exec                                       |
|                     | exploit/multi/http/phpmyadmin_3522_backdoor                              |
|                     | exploit/multi/http/phpmyadmin_lfi_rce                                    |
|                     | exploit/multi/http/phpmyadmin_null_termination_exec                      |
|                     | exploit/multi/http/phpmyadmin_preg_replace                               |
|                     | exploit/multi/http/phpscheduleit_start_date                              |
|                     | exploit/multi/http/phptax_exec                                           |
|                     | exploit/multi/http/phpwiki_ploticus_exec                                 |
|                     | exploit/multi/http/pimcore_unserialize_rce                               |
|                     | exploit/multi/http/playsms_filename_exec                                 |
|                     | exploit/multi/http/playsms_uploadcsv_exec                                |
|                     | exploit/multi/http/pmwiki_pagelist                                       |
|                     | exploit/multi/http/polarcms_upload_exec                                  |
|                     | exploit/multi/http/processmaker_exec                                     |
|                     | exploit/multi/http/processmaker_plugin_upload                            |
|                     | exploit/multi/http/qdpm_upload_exec                                      |
|                     | exploit/multi/http/rails_actionpack_inline_exec                          |
|                     | exploit/multi/http/rails_double_tap                                      |
|                     | exploit/multi/http/rails_json_yaml_code_exec                             |
|                     | exploit/multi/http/rails_secret_deserialization                          |
|                     | exploit/multi/http/rails_xml_yaml_code_exec                              |
|                     | exploit/multi/http/sflog_upload_exec                                     |
|                     | exploit/multi/http/shopware_createinstancefromnamedarguments_rce         |
|                     | exploit/multi/http/simple_backdoors_exec                                 |
|                     | exploit/multi/http/sit_file_upload                                       |
|                     | exploit/multi/http/snortreport_exec                                      |
|                     | exploit/multi/http/sonicwall_gms_upload                                  |
|                     | exploit/multi/http/sonicwall_scrutinizer_methoddetail_sqli               |
|                     | exploit/multi/http/spree_search_exec                                     |
|                     | exploit/multi/http/spree_searchlogic_exec                                |
|                     | exploit/multi/http/stunshell_eval                                        |
|                     | exploit/multi/http/stunshell_exec                                        |
|                     | exploit/multi/http/sun_jsws_dav_options                                  |
|                     | exploit/multi/http/testlink_upload_exec                                  |
|                     | exploit/multi/http/tomcat_mgr_deploy                                     |
|                     | exploit/multi/http/tomcat_mgr_upload                                     |
|                     | exploit/multi/http/traq_plugin_exec                                      |
|                     | exploit/multi/http/v0pcr3w_exec                                          |
|                     | exploit/multi/http/vbseo_proc_deutf                                      |
|                     | exploit/multi/http/vbulletin_unserialize                                 |
|                     | exploit/multi/http/vtiger_install_rce                                    |
|                     | exploit/multi/http/vtiger_logo_upload_exec                               |
|                     | exploit/multi/http/vtiger_php_exec                                       |
|                     | exploit/multi/http/vtiger_soap_upload                                    |
|                     | exploit/multi/http/webpagetest_upload_exec                               |
|                     | exploit/multi/http/werkzeug_debug_rce                                    |
|                     | exploit/multi/http/wikka_spam_exec                                       |
|                     | exploit/multi/http/wp_crop_rce                                           |
|                     | exploit/multi/http/wp_ninja_forms_unauthenticated_file_upload            |
|                     | exploit/multi/http/wp_responsive_thumbnail_slider_upload                 |
|                     | exploit/multi/http/x7chat2_php_exec                                      |
|                     | exploit/multi/http/zabbix_script_exec                                    |
|                     | exploit/multi/http/zemra_panel_rce                                       |
|                     | exploit/multi/http/zpanel_information_disclosure_rce                     |
|                     | exploit/multi/php/php_unserialize_zval_cookie                            |
|                     | exploit/multi/php/wp_duplicator_code_inject                              |
|                     | exploit/multi/wyse/hagent_untrusted_hsdata                               |
|                     | exploit/unix/ftp/proftpd_modcopy_exec                                    |
|                     | exploit/unix/http/contentkeeperweb_mimencode                             |
|                     | exploit/unix/http/ctek_skyrouter                                         |
|                     | exploit/unix/http/dell_kace_k1000_upload                                 |
|                     | exploit/unix/http/epmp1000_get_chart_cmd_shell                           |
|                     | exploit/unix/http/epmp1000_ping_cmd_shell                                |
|                     | exploit/unix/http/freepbx_callmenum                                      |
|                     | exploit/unix/http/laravel_token_unserialize_exec                         |
|                     | exploit/unix/http/lifesize_room                                          |
|                     | exploit/unix/http/pfsense_clickjacking                                   |
|                     | exploit/unix/http/quest_kace_systems_management_rce                      |
|                     | exploit/unix/http/tnftp_savefile                                         |
|                     | exploit/unix/http/twiki_debug_plugins                                    |
|                     | exploit/unix/http/vmturbo_vmtadmin_exec_noauth                           |
|                     | exploit/unix/http/xdebug_unauth_exec                                     |
|                     | exploit/unix/sonicwall/sonicwall_xmlrpc_rce                              |
|                     | exploit/unix/webapp/actualanalyzer_ant_cookie_exec                       |
|                     | exploit/unix/webapp/arkeia_upload_exec                                   |
|                     | exploit/unix/webapp/awstats_configdir_exec                               |
|                     | exploit/unix/webapp/awstats_migrate_exec                                 |
|                     | exploit/unix/webapp/awstatstotals_multisort                              |
|                     | exploit/unix/webapp/barracuda_img_exec                                   |
|                     | exploit/unix/webapp/base_qry_common                                      |
|                     | exploit/unix/webapp/basilic_diff_exec                                    |
|                     | exploit/unix/webapp/cacti_graphimage_exec                                |
|                     | exploit/unix/webapp/cakephp_cache_corruption                             |
|                     | exploit/unix/webapp/carberp_backdoor_exec                                |
|                     | exploit/unix/webapp/clipbucket_upload_exec                               |
|                     | exploit/unix/webapp/coppermine_piceditor                                 |
|                     | exploit/unix/webapp/datalife_preview_exec                                |
|                     | exploit/unix/webapp/dogfood_spell_exec                                   |
|                     | exploit/unix/webapp/drupal_coder_exec                                    |
|                     | exploit/unix/webapp/drupal_drupalgeddon2                                 |
|                     | exploit/unix/webapp/drupal_restws_exec                                   |
|                     | exploit/unix/webapp/drupal_restws_unserialize                            |
|                     | exploit/unix/webapp/egallery_upload_exec                                 |
|                     | exploit/unix/webapp/elfinder_php_connector_exiftran_cmd_injection        |
|                     | exploit/unix/webapp/flashchat_upload_exec                                |
|                     | exploit/unix/webapp/foswiki_maketext                                     |
|                     | exploit/unix/webapp/freepbx_config_exec                                  |
|                     | exploit/unix/webapp/generic_exec                                         |
|                     | exploit/unix/webapp/get_simple_cms_upload_exec                           |
|                     | exploit/unix/webapp/google_proxystylesheet_exec                          |
|                     | exploit/unix/webapp/graphite_pickle_exec                                 |
|                     | exploit/unix/webapp/guestbook_ssi_exec                                   |
|                     | exploit/unix/webapp/hastymail_exec                                       |
|                     | exploit/unix/webapp/havalite_upload_exec                                 |
|                     | exploit/unix/webapp/horde_unserialize_exec                               |
|                     | exploit/unix/webapp/hybridauth_install_php_exec                          |
|                     | exploit/unix/webapp/instantcms_exec                                      |
|                     | exploit/unix/webapp/invision_pboard_unserialize_exec                     |
|                     | exploit/unix/webapp/joomla_akeeba_unserialize                            |
|                     | exploit/unix/webapp/joomla_comfields_sqli_rce                            |
|                     | exploit/unix/webapp/joomla_comjce_imgmanager                             |
|                     | exploit/unix/webapp/joomla_contenthistory_sqli_rce                       |
|                     | exploit/unix/webapp/joomla_media_upload_exec                             |
|                     | exploit/unix/webapp/joomla_tinybrowser                                   |
|                     | exploit/unix/webapp/jquery_file_upload                                   |
|                     | exploit/unix/webapp/kimai_sqli                                           |
|                     | exploit/unix/webapp/libretto_upload_exec                                 |
|                     | exploit/unix/webapp/maarch_letterbox_file_upload                         |
|                     | exploit/unix/webapp/mambo_cache_lite                                     |
|                     | exploit/unix/webapp/mitel_awc_exec                                       |
|                     | exploit/unix/webapp/moinmoin_twikidraw                                   |
|                     | exploit/unix/webapp/mybb_backdoor                                        |
|                     | exploit/unix/webapp/nagios3_history_cgi                                  |
|                     | exploit/unix/webapp/nagios3_statuswml_ping                               |
|                     | exploit/unix/webapp/nagios_graph_explorer                                |
|                     | exploit/unix/webapp/narcissus_backend_exec                               |
|                     | exploit/unix/webapp/open_flash_chart_upload_exec                         |
|                     | exploit/unix/webapp/openemr_sqli_privesc_upload                          |
|                     | exploit/unix/webapp/openemr_upload_exec                                  |
|                     | exploit/unix/webapp/opensis_modname_exec                                 |
|                     | exploit/unix/webapp/openview_connectednodes_exec                         |
|                     | exploit/unix/webapp/openx_banner_edit                                    |
|                     | exploit/unix/webapp/oscommerce_filemanager                               |
|                     | exploit/unix/webapp/pajax_remote_exec                                    |
|                     | exploit/unix/webapp/php_charts_exec                                      |
|                     | exploit/unix/webapp/php_eval                                             |
|                     | exploit/unix/webapp/php_include                                          |
|                     | exploit/unix/webapp/php_vbulletin_template                               |
|                     | exploit/unix/webapp/php_xmlrpc_eval                                      |
|                     | exploit/unix/webapp/phpbb_highlight                                      |
|                     | exploit/unix/webapp/phpcollab_upload_exec                                |
|                     | exploit/unix/webapp/phpmyadmin_config                                    |
|                     | exploit/unix/webapp/piwik_superuser_plugin_upload                        |
|                     | exploit/unix/webapp/projectpier_upload_exec                              |
|                     | exploit/unix/webapp/projectsend_upload_exec                              |
|                     | exploit/unix/webapp/redmine_scm_exec                                     |
|                     | exploit/unix/webapp/seportal_sqli_exec                                   |
|                     | exploit/unix/webapp/simple_e_document_upload_exec                        |
|                     | exploit/unix/webapp/sixapart_movabletype_storable_exec                   |
|                     | exploit/unix/webapp/skybluecanvas_exec                                   |
|                     | exploit/unix/webapp/sphpblog_file_upload                                 |
|                     | exploit/unix/webapp/spip_connect_exec                                    |
|                     | exploit/unix/webapp/squash_yaml_exec                                     |
|                     | exploit/unix/webapp/sugarcrm_rest_unserialize_exec                       |
|                     | exploit/unix/webapp/sugarcrm_unserialize_exec                            |
|                     | exploit/unix/webapp/tikiwiki_graph_formula_exec                          |
|                     | exploit/unix/webapp/tikiwiki_jhot_exec                                   |
|                     | exploit/unix/webapp/tikiwiki_unserialize_exec                            |
|                     | exploit/unix/webapp/tikiwiki_upload_exec                                 |
|                     | exploit/unix/webapp/trixbox_langchoice                                   |
|                     | exploit/unix/webapp/twiki_history                                        |
|                     | exploit/unix/webapp/twiki_maketext                                       |
|                     | exploit/unix/webapp/twiki_search                                         |
|                     | exploit/unix/webapp/vbulletin_vote_sqli_exec                             |
|                     | exploit/unix/webapp/vicidial_manager_send_cmd_exec                       |
|                     | exploit/unix/webapp/vicidial_user_authorization_unauth_cmd_exec          |
|                     | exploit/unix/webapp/webmin_upload_exec                                   |
|                     | exploit/unix/webapp/webtester_exec                                       |
|                     | exploit/unix/webapp/wp_admin_shell_upload                                |
|                     | exploit/unix/webapp/wp_advanced_custom_fields_exec                       |
|                     | exploit/unix/webapp/wp_ajax_load_more_file_upload                        |
|                     | exploit/unix/webapp/wp_asset_manager_upload_exec                         |
|                     | exploit/unix/webapp/wp_creativecontactform_file_upload                   |
|                     | exploit/unix/webapp/wp_downloadmanager_upload                            |
|                     | exploit/unix/webapp/wp_easycart_unrestricted_file_upload                 |
|                     | exploit/unix/webapp/wp_foxypress_upload                                  |
|                     | exploit/unix/webapp/wp_frontend_editor_file_upload                       |
|                     | exploit/unix/webapp/wp_google_document_embedder_exec                     |
|                     | exploit/unix/webapp/wp_holding_pattern_file_upload                       |
|                     | exploit/unix/webapp/wp_inboundio_marketing_file_upload                   |
|                     | exploit/unix/webapp/wp_infusionsoft_upload                               |
|                     | exploit/unix/webapp/wp_lastpost_exec                                     |
|                     | exploit/unix/webapp/wp_mobile_detector_upload_execute                    |
|                     | exploit/unix/webapp/wp_nmediawebsite_file_upload                         |
|                     | exploit/unix/webapp/wp_optimizepress_upload                              |
|                     | exploit/unix/webapp/wp_photo_gallery_unrestricted_file_upload            |
|                     | exploit/unix/webapp/wp_phpmailer_host_header                             |
|                     | exploit/unix/webapp/wp_pixabay_images_upload                             |
|                     | exploit/unix/webapp/wp_platform_exec                                     |
|                     | exploit/unix/webapp/wp_property_upload_exec                              |
|                     | exploit/unix/webapp/wp_reflexgallery_file_upload                         |
|                     | exploit/unix/webapp/wp_revslider_upload_execute                          |
|                     | exploit/unix/webapp/wp_slideshowgallery_upload                           |
|                     | exploit/unix/webapp/wp_symposium_shell_upload                            |
|                     | exploit/unix/webapp/wp_total_cache_exec                                  |
|                     | exploit/unix/webapp/wp_worktheflow_upload                                |
|                     | exploit/unix/webapp/wp_wpshop_ecommerce_file_upload                      |
|                     | exploit/unix/webapp/wp_wptouch_file_upload                               |
|                     | exploit/unix/webapp/wp_wysija_newsletters_upload                         |
|                     | exploit/unix/webapp/xoda_file_upload                                     |
|                     | exploit/unix/webapp/xymon_useradm_cmd_exec                               |
|                     | exploit/unix/webapp/zeroshell_exec                                       |
|                     | exploit/unix/webapp/zoneminder_packagecontrol_exec                       |
|                     | exploit/unix/webapp/zpanel_username_exec                                 |
|                     | exploit/windows/http/amlibweb_webquerydll_app                            |
|                     | exploit/windows/http/apache_chunked                                      |
|                     | exploit/windows/http/apache_mod_rewrite_ldap                             |
|                     | exploit/windows/http/apache_modjk_overflow                               |
|                     | exploit/windows/http/avaya_ccr_imageupload_exec                          |
|                     | exploit/windows/http/badblue_ext_overflow                                |
|                     | exploit/windows/http/badblue_passthru                                    |
|                     | exploit/windows/http/bea_weblogic_jsessionid                             |
|                     | exploit/windows/http/bea_weblogic_transfer_encoding                      |
|                     | exploit/windows/http/belkin_bulldog                                      |
|                     | exploit/windows/http/cogent_datahub_command                              |
|                     | exploit/windows/http/coldfusion_fckeditor                                |
|                     | exploit/windows/http/disk_pulse_enterprise_get                           |
|                     | exploit/windows/http/easychatserver_seh                                  |
|                     | exploit/windows/http/efs_easychatserver_username                         |
|                     | exploit/windows/http/ektron_xslt_exec                                    |
|                     | exploit/windows/http/ektron_xslt_exec_ws                                 |
|                     | exploit/windows/http/fdm_auth_header                                     |
|                     | exploit/windows/http/generic_http_dll_injection                          |
|                     | exploit/windows/http/gitstack_rce                                        |
|                     | exploit/windows/http/hp_mpa_job_acct                                     |
|                     | exploit/windows/http/hp_nnm_getnnmdata_hostname                          |
|                     | exploit/windows/http/hp_nnm_getnnmdata_icount                            |
|                     | exploit/windows/http/hp_nnm_getnnmdata_maxage                            |
|                     | exploit/windows/http/hp_nnm_nnmrptconfig_nameparams                      |
|                     | exploit/windows/http/hp_nnm_nnmrptconfig_schdparams                      |
|                     | exploit/windows/http/hp_nnm_openview5                                    |
|                     | exploit/windows/http/hp_nnm_ovalarm_lang                                 |
|                     | exploit/windows/http/hp_nnm_ovbuildpath_textfile                         |
|                     | exploit/windows/http/hp_nnm_ovwebhelp                                    |
|                     | exploit/windows/http/hp_nnm_ovwebsnmpsrv_main                            |
|                     | exploit/windows/http/hp_nnm_ovwebsnmpsrv_ovutil                          |
|                     | exploit/windows/http/hp_nnm_ovwebsnmpsrv_uro                             |
|                     | exploit/windows/http/hp_nnm_snmp                                         |
|                     | exploit/windows/http/hp_nnm_snmpviewer_actapp                            |
|                     | exploit/windows/http/hp_nnm_toolbar_01                                   |
|                     | exploit/windows/http/hp_nnm_toolbar_02                                   |
|                     | exploit/windows/http/hp_nnm_webappmon_execvp                             |
|                     | exploit/windows/http/hp_nnm_webappmon_ovjavalocale                       |
|                     | exploit/windows/http/hp_openview_insight_backdoor                        |
|                     | exploit/windows/http/hp_power_manager_filename                           |
|                     | exploit/windows/http/hp_power_manager_login                              |
|                     | exploit/windows/http/httpdx_handlepeer                                   |
|                     | exploit/windows/http/httpdx_tolog_format                                 |
|                     | exploit/windows/http/ia_webmail                                          |
|                     | exploit/windows/http/ipswitch_wug_maincfgret                             |
|                     | exploit/windows/http/kaseya_uploader                                     |
|                     | exploit/windows/http/kaseya_uploadimage_file_upload                      |
|                     | exploit/windows/http/kolibri_http                                        |
|                     | exploit/windows/http/landesk_thinkmanagement_upload_asp                  |
|                     | exploit/windows/http/mailenable_auth_header                              |
|                     | exploit/windows/http/manage_engine_opmanager_rce                         |
|                     | exploit/windows/http/manageengine_appmanager_exec                        |
|                     | exploit/windows/http/minishare_get_overflow                              |
|                     | exploit/windows/http/navicopa_get_overflow                               |
|                     | exploit/windows/http/novell_mdm_lfi                                      |
|                     | exploit/windows/http/oats_weblogic_console                               |
|                     | exploit/windows/http/octopusdeploy_deploy                                |
|                     | exploit/windows/http/oracle_beehive_evaluation                           |
|                     | exploit/windows/http/oracle_beehive_prepareaudiotoplay                   |
|                     | exploit/windows/http/privatewire_gateway                                 |
|                     | exploit/windows/http/rejetto_hfs_exec                                    |
|                     | exploit/windows/http/sambar6_search_results                              |
|                     | exploit/windows/http/savant_31_overflow                                  |
|                     | exploit/windows/http/servu_session_cookie                                |
|                     | exploit/windows/http/shttpd_post                                         |
|                     | exploit/windows/http/solarwinds_fsm_userlogin                            |
|                     | exploit/windows/http/sonicwall_scrutinizer_sqli                          |
|                     | exploit/windows/http/sysax_create_folder                                 |
|                     | exploit/windows/http/tomcat_cgi_cmdlineargs                              |
|                     | exploit/windows/http/trackit_file_upload                                 |
|                     | exploit/windows/http/trendmicro_officescan_widget_exec                   |
|                     | exploit/windows/http/umbraco_upload_aspx                                 |
|                     | exploit/windows/http/webster_http                                        |
|                     | exploit/windows/http/xampp_webdav_upload_php                             |
|                     | exploit/windows/http/xitami_if_mod_since                                 |
|                     | exploit/windows/http/zenworks_uploadservlet                              |
|                     | exploit/windows/iis/iis_webdav_scstoragepathfromurl                      |
|                     | exploit/windows/iis/iis_webdav_upload_asp                                |
|                     | exploit/windows/iis/ms01_023_printer                                     |
|                     | exploit/windows/iis/ms01_026_dbldecode                                   |
|                     | exploit/windows/iis/ms01_033_idq                                         |
|                     | exploit/windows/iis/ms02_018_htr                                         |
|                     | exploit/windows/iis/ms02_065_msadc                                       |
|                     | exploit/windows/iis/ms03_007_ntdll_webdav                                |
|                     | exploit/windows/iis/msadc                                                |
|                     | exploit/windows/isapi/ms00_094_pbserver                                  |
|                     | exploit/windows/isapi/ms03_022_nsiislog_post                             |
|                     | exploit/windows/isapi/ms03_051_fp30reg_chunked                           |
|                     | exploit/windows/isapi/rsa_webagent_redirect                              |
|                     | exploit/windows/isapi/w3who_query                                        |
|                     | exploit/windows/lotus/domino_http_accept_language                        |
|                     | exploit/windows/misc/gh0st                                               |
|                     | exploit/windows/mssql/ms09_004_sp_replwritetovarbin_sqli                 |
|                     | exploit/windows/mssql/mssql_payload_sqli                                 |
|                     | exploit/windows/proxy/bluecoat_winproxy_host                             |
|                     | exploit/windows/proxy/qbik_wingate_wwwproxy                              |
|                     | exploit/windows/scada/advantech_webaccess_dashboard_file_upload          |
|                     | exploit/windows/scada/ge_proficy_cimplicity_gefebt                       |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:8787 | auxiliary/gather/solarwinds_orion_sqli                                   |
|                     | exploit/linux/misc/drb_remote_codeexec                                   |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:3632 | exploit/unix/misc/distcc_exec                                            |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:53   | auxiliary/scanner/dns/dns_amp                                            |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:22   | auxiliary/scanner/ssh/cerberus_sftp_enumusers                            |
|                     | auxiliary/scanner/ssh/detect_kippo                                       |
|                     | auxiliary/scanner/ssh/eaton_xpert_backdoor                               |
|                     | auxiliary/scanner/ssh/fortinet_backdoor                                  |
|                     | auxiliary/scanner/ssh/juniper_backdoor                                   |
|                     | auxiliary/scanner/ssh/libssh_auth_bypass                                 |
|                     | auxiliary/scanner/ssh/ssh_enumusers                                      |
|                     | auxiliary/scanner/ssh/ssh_identify_pubkeys                               |
|                     | auxiliary/scanner/ssh/ssh_login                                          |
|                     | auxiliary/scanner/ssh/ssh_login_pubkey                                   |
|                     | auxiliary/scanner/ssh/ssh_version                                        |
|                     | exploit/apple_ios/ssh/cydia_default_ssh                                  |
|                     | exploit/linux/ssh/ceragon_fibeair_known_privkey                          |
|                     | exploit/linux/ssh/exagrid_known_privkey                                  |
|                     | exploit/linux/ssh/f5_bigip_known_privkey                                 |
|                     | exploit/linux/ssh/loadbalancerorg_enterprise_known_privkey               |
|                     | exploit/linux/ssh/mercurial_ssh_exec                                     |
|                     | exploit/linux/ssh/quantum_dxi_known_privkey                              |
|                     | exploit/linux/ssh/quantum_vmpro_backdoor                                 |
|                     | exploit/linux/ssh/symantec_smg_ssh                                       |
|                     | exploit/linux/ssh/vmware_vdp_known_privkey                               |
|                     | exploit/multi/ssh/sshexec                                                |
|                     | exploit/unix/ssh/array_vxag_vapv_privkey_privesc                         |
|                     | exploit/unix/ssh/tectia_passwd_changereq                                 |
|                     | exploit/windows/ssh/freeftpd_key_exchange                                |
|                     | exploit/windows/ssh/freesshd_authbypass                                  |
|                     | exploit/windows/ssh/freesshd_key_exchange                                |
|                     | exploit/windows/ssh/sysax_ssh_username                                   |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:23   | auxiliary/scanner/telnet/brocade_enable_login                            |
|                     | auxiliary/scanner/telnet/telnet_encrypt_overflow                         |
|                     | auxiliary/scanner/telnet/telnet_login                                    |
|                     | auxiliary/scanner/telnet/telnet_ruggedcom                                |
|                     | auxiliary/scanner/telnet/telnet_version                                  |
|                     | exploit/freebsd/telnet/telnet_encrypt_keyid                              |
|                     | exploit/linux/telnet/netgear_telnetenable                                |
|                     | exploit/linux/telnet/telnet_encrypt_keyid                                |
|                     | exploit/solaris/telnet/fuser                                             |
|                     | exploit/solaris/telnet/ttyprompt                                         |
|                     | exploit/unix/misc/polycom_hdx_auth_bypass                                |
|                     | exploit/unix/misc/polycom_hdx_traceroute_exec                            |
|                     | exploit/unix/polycom_hdx_auth_bypass                                     |
|                     | exploit/windows/proxy/ccproxy_telnet_ping                                |
|                     | exploit/windows/scada/procyon_core_server                                |
|                     | exploit/windows/telnet/gamsoft_telsrv_username                           |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:5432 | auxiliary/scanner/postgres/postgres_dbname_flag_injection                |
|                     | auxiliary/scanner/postgres/postgres_hashdump                             |
|                     | auxiliary/scanner/postgres/postgres_login                                |
|                     | auxiliary/scanner/postgres/postgres_schemadump                           |
|                     | auxiliary/scanner/postgres/postgres_version                              |
|                     | exploit/linux/postgres/postgres_payload                                  |
|                     | exploit/multi/postgres/postgres_copy_from_program_cmd_exec               |
|                     | exploit/multi/postgres/postgres_createlang                               |
|                     | exploit/windows/postgres/postgres_payload                                |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:25   | auxiliary/client/smtp/emailer                                            |
|                     | auxiliary/scanner/smtp/smtp_enum                                         |
|                     | auxiliary/scanner/smtp/smtp_ntlm_domain                                  |
|                     | auxiliary/scanner/smtp/smtp_relay                                        |
|                     | auxiliary/scanner/smtp/smtp_version                                      |
|                     | auxiliary/vsploit/pii/email_pii                                          |
|                     | exploit/apple_ios/email/mobilemail_libtiff                               |
|                     | exploit/linux/smtp/exim4_dovecot_exec                                    |
|                     | exploit/osx/email/mailapp_image_exec                                     |
|                     | exploit/unix/smtp/clamav_milter_blackhole                                |
|                     | exploit/unix/smtp/exim4_string_format                                    |
|                     | exploit/unix/smtp/morris_sendmail_debug                                  |
|                     | exploit/unix/smtp/qmail_bash_env_exec                                    |
|                     | exploit/unix/webapp/squirrelmail_pgp_plugin                              |
|                     | exploit/windows/email/ms07_017_ani_loadimage_chunksize                   |
|                     | exploit/windows/email/ms10_045_outlook_ref_only                          |
|                     | exploit/windows/email/ms10_045_outlook_ref_resolve                       |
|                     | exploit/windows/lotus/domino_icalendar_organizer                         |
|                     | exploit/windows/lotus/lotusnotes_lzh                                     |
|                     | exploit/windows/smtp/mailcarrier_smtp_ehlo                               |
|                     | exploit/windows/smtp/mercury_cram_md5                                    |
|                     | exploit/windows/smtp/ms03_046_exchange2000_xexch50                       |
|                     | exploit/windows/smtp/wmailserver                                         |
|                     | exploit/windows/smtp/ypops_overflow1                                     |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:445  | auxiliary/gather/windows_deployment_services_shares                      |
|                     | auxiliary/scanner/smb/psexec_loggedin_users                              |
|                     | auxiliary/scanner/smb/smb1                                               |
|                     | auxiliary/scanner/smb/smb2                                               |
|                     | auxiliary/scanner/smb/smb_enum_gpp                                       |
|                     | auxiliary/scanner/smb/smb_login                                          |
|                     | auxiliary/scanner/smb/smb_ms17_010                                       |
|                     | exploit/linux/samba/is_known_pipename                                    |
|                     | exploit/linux/samba/lsa_transnames_heap                                  |
|                     | exploit/linux/samba/setinfopolicy_heap                                   |
|                     | exploit/netware/smb/lsass_cifs                                           |
|                     | exploit/osx/samba/lsa_transnames_heap                                    |
|                     | exploit/solaris/samba/lsa_transnames_heap                                |
|                     | exploit/windows/brightstor/etrust_itm_alert                              |
|                     | exploit/windows/oracle/extjob                                            |
|                     | exploit/windows/smb/ipass_pipe_exec                                      |
|                     | exploit/windows/smb/ms03_049_netapi                                      |
|                     | exploit/windows/smb/ms04_007_killbill                                    |
|                     | exploit/windows/smb/ms04_011_lsass                                       |
|                     | exploit/windows/smb/ms04_031_netdde                                      |
|                     | exploit/windows/smb/ms05_039_pnp                                         |
|                     | exploit/windows/smb/ms06_025_rasmans_reg                                 |
|                     | exploit/windows/smb/ms06_025_rras                                        |
|                     | exploit/windows/smb/ms06_040_netapi                                      |
|                     | exploit/windows/smb/ms06_066_nwapi                                       |
|                     | exploit/windows/smb/ms06_066_nwwks                                       |
|                     | exploit/windows/smb/ms06_070_wkssvc                                      |
|                     | exploit/windows/smb/ms07_029_msdns_zonename                              |
|                     | exploit/windows/smb/ms08_067_netapi                                      |
|                     | exploit/windows/smb/ms09_050_smb2_negotiate_func_index                   |
|                     | exploit/windows/smb/ms10_061_spoolss                                     |
|                     | exploit/windows/smb/ms17_010_eternalblue                                 |
|                     | exploit/windows/smb/ms17_010_eternalblue_win8                            |
|                     | exploit/windows/smb/ms17_010_psexec                                      |
|                     | exploit/windows/smb/netidentity_xtierrpcpipe                             |
|                     | exploit/windows/smb/psexec                                               |
|                     | exploit/windows/smb/psexec_psh                                           |
|                     | exploit/windows/smb/webexec                                              |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:6000 | auxiliary/scanner/x11/open_x11                                           |
|                     | exploit/unix/x11/x11_keyboard_exec                                       |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:21   | auxiliary/scanner/ftp/anonymous                                          |
|                     | auxiliary/scanner/ftp/bison_ftp_traversal                                |
|                     | auxiliary/scanner/ftp/colorado_ftp_traversal                             |
|                     | auxiliary/scanner/ftp/easy_file_sharing_ftp                              |
|                     | auxiliary/scanner/ftp/ftp_login                                          |
|                     | auxiliary/scanner/ftp/ftp_version                                        |
|                     | auxiliary/scanner/ftp/konica_ftp_traversal                               |
|                     | auxiliary/scanner/ftp/pcman_ftp_traversal                                |
|                     | auxiliary/scanner/ftp/titanftp_xcrc_traversal                            |
|                     | exploit/freebsd/ftp/proftp_telnet_iac                                    |
|                     | exploit/linux/ftp/proftp_sreplace                                        |
|                     | exploit/linux/ftp/proftp_telnet_iac                                      |
|                     | exploit/mainframe/ftp/ftp_jcl_creds                                      |
|                     | exploit/multi/ftp/pureftpd_bash_env_exec                                 |
|                     | exploit/multi/ftp/wuftpd_site_exec_format                                |
|                     | exploit/osx/ftp/webstar_ftp_user                                         |
|                     | exploit/unix/ftp/proftpd_133c_backdoor                                   |
|                     | exploit/unix/ftp/vsftpd_234_backdoor                                     |
|                     | exploit/windows/ftp/3cdaemon_ftp_user                                    |
|                     | exploit/windows/ftp/ability_server_stor                                  |
|                     | exploit/windows/ftp/cesarftp_mkd                                         |
|                     | exploit/windows/ftp/comsnd_ftpd_fmtstr                                   |
|                     | exploit/windows/ftp/dreamftp_format                                      |
|                     | exploit/windows/ftp/easyfilesharing_pass                                 |
|                     | exploit/windows/ftp/easyftp_cwd_fixret                                   |
|                     | exploit/windows/ftp/easyftp_list_fixret                                  |
|                     | exploit/windows/ftp/easyftp_mkd_fixret                                   |
|                     | exploit/windows/ftp/filecopa_list_overflow                               |
|                     | exploit/windows/ftp/freefloatftp_user                                    |
|                     | exploit/windows/ftp/freefloatftp_wbem                                    |
|                     | exploit/windows/ftp/freeftpd_pass                                        |
|                     | exploit/windows/ftp/freeftpd_user                                        |
|                     | exploit/windows/ftp/globalscapeftp_input                                 |
|                     | exploit/windows/ftp/httpdx_tolog_format                                  |
|                     | exploit/windows/ftp/kmftp_utility_cwd                                    |
|                     | exploit/windows/ftp/ms09_053_ftpd_nlst                                   |
|                     | exploit/windows/ftp/netterm_netftpd_user                                 |
|                     | exploit/windows/ftp/open_ftpd_wbem                                       |
|                     | exploit/windows/ftp/pcman_put                                            |
|                     | exploit/windows/ftp/pcman_stor                                           |
|                     | exploit/windows/ftp/quickshare_traversal_write                           |
|                     | exploit/windows/ftp/sami_ftpd_list                                       |
|                     | exploit/windows/ftp/sami_ftpd_user                                       |
|                     | exploit/windows/ftp/servu_chmod                                          |
|                     | exploit/windows/ftp/servu_mdtm                                           |
|                     | exploit/windows/ftp/slimftpd_list_concat                                 |
|                     | exploit/windows/ftp/vermillion_ftpd_port                                 |
|                     | exploit/windows/ftp/warftpd_165_pass                                     |
|                     | exploit/windows/ftp/warftpd_165_user                                     |
|                     | exploit/windows/ftp/wftpd_size                                           |
|                     | exploit/windows/ftp/wsftp_server_503_mkd                                 |
|                     | exploit/windows/ftp/wsftp_server_505_xmd5                                |
|                     | exploit/windows/ftp/xlink_server                                         |
+---------------------+--------------------------------------------------------------------------+
[+] Running: exploit/mainframe/ftp/ftp_jcl_creds - 172.16.164.218:21
[+] Running: exploit/multi/ftp/wuftpd_site_exec_format - 172.16.164.218:21
[+] Running: exploit/aix/rpc_cmsd_opcode21 - 172.16.164.218:111
[+] Running: exploit/multi/ftp/pureftpd_bash_env_exec - 172.16.164.218:21
[+] Running: exploit/apple_ios/ssh/cydia_default_ssh - 172.16.164.218:22
[+] Running: exploit/aix/rpc_ttdbserverd_realpath - 172.16.164.218:111
[+] Running: exploit/multi/ids/snort_dce_rpc - 172.16.164.218:139
[+] Running: exploit/multi/samba/usermap_script - 172.16.164.218:139
[+] Running: exploit/multi/mysql/mysql_udf_payload - 172.16.164.218:3306
[+] Running: exploit/multi/samba/nttrans - 172.16.164.218:139
[+] Running: exploit/multi/misc/java_rmi_server - 172.16.164.218:1099
[+] Running: exploit/multi/postgres/postgres_copy_from_program_cmd_exec - 172.16.164.218:5432
[+] Running: exploit/multi/postgres/postgres_createlang - 172.16.164.218:5432
[+] Running: exploit/multi/misc/legend_bot_exec - 172.16.164.218:6667
[+] Running: exploit/multi/vnc/vnc_keyboard_exec - 172.16.164.218:5900
[WORKING] 172.16.164.218:139  exploit/multi/samba/usermap_script
[WORKING] 172.16.164.218:1099  exploit/multi/misc/java_rmi_server
[+] Running: exploit/multi/misc/ra1nx_pubcall_exec - 172.16.164.218:6667
[+] Running: exploit/multi/misc/pbot_exec - 172.16.164.218:6667
[+] Running: exploit/multi/misc/w3tw0rk_exec - 172.16.164.218:6667
[+] Running: exploit/multi/misc/xdh_x_exec - 172.16.164.218:6667
[+] Running: auxiliary/scanner/ftp/anonymous - 172.16.164.218:21
[+] Running: auxiliary/scanner/ftp/ftp_version - 172.16.164.218:21
[+] Running: auxiliary/scanner/ssh/eaton_xpert_backdoor - 172.16.164.218:22
[+] Running: auxiliary/scanner/ftp/bison_ftp_traversal - 172.16.164.218:21
[+] Running: auxiliary/scanner/ftp/konica_ftp_traversal - 172.16.164.218:21
[+] Running: auxiliary/scanner/ssh/fortinet_backdoor - 172.16.164.218:22
[+] Running: auxiliary/scanner/ftp/colorado_ftp_traversal - 172.16.164.218:21
[+] Running: auxiliary/scanner/ftp/pcman_ftp_traversal - 172.16.164.218:21
[+] Running: auxiliary/scanner/ssh/juniper_backdoor - 172.16.164.218:22
[+] Running: auxiliary/scanner/ftp/easy_file_sharing_ftp - 172.16.164.218:21
[+] Running: auxiliary/scanner/ftp/titanftp_xcrc_traversal - 172.16.164.218:21
[+] Running: auxiliary/scanner/ssh/libssh_auth_bypass - 172.16.164.218:22
[+] Running: auxiliary/scanner/ftp/ftp_login - 172.16.164.218:21
[+] Running: auxiliary/scanner/ssh/detect_kippo - 172.16.164.218:22
[+] Running: auxiliary/scanner/ssh/ssh_enumusers - 172.16.164.218:22
[+] Running: auxiliary/scanner/ssh/ssh_login - 172.16.164.218:22
[+] Running: auxiliary/scanner/telnet/telnet_ruggedcom - 172.16.164.218:23
[+] Running: auxiliary/scanner/smtp/smtp_relay - 172.16.164.218:25
[+] Running: auxiliary/scanner/ssh/ssh_version - 172.16.164.218:22
[+] Running: auxiliary/scanner/telnet/telnet_version - 172.16.164.218:23
[+] Running: auxiliary/scanner/smtp/smtp_version - 172.16.164.218:25
[+] Running: auxiliary/scanner/telnet/brocade_enable_login - 172.16.164.218:23
[+] Running: auxiliary/client/smtp/emailer - 172.16.164.218:25
[+] Running: auxiliary/scanner/dns/dns_amp - 172.16.164.218:53
[+] Running: auxiliary/scanner/telnet/telnet_encrypt_overflow - 172.16.164.218:23
[+] Running: auxiliary/scanner/smtp/smtp_enum - 172.16.164.218:25
[+] Running: auxiliary/scanner/misc/sunrpc_portmapper - 172.16.164.218:111
[+] Running: auxiliary/scanner/telnet/telnet_login - 172.16.164.218:23
[+] Running: auxiliary/scanner/smtp/smtp_ntlm_domain - 172.16.164.218:25
[+] Running: auxiliary/scanner/nfs/nfsmount - 172.16.164.218:111
[+] Running: auxiliary/scanner/portmap/portmap_amp - 172.16.164.218:111
[+] Running: auxiliary/scanner/smb/smb_login - 172.16.164.218:445
[+] Running: auxiliary/gather/java_rmi_registry - 172.16.164.218:1099
[+] Running: auxiliary/scanner/smb/psexec_loggedin_users - 172.16.164.218:445
[+] Running: auxiliary/scanner/smb/smb_ms17_010 - 172.16.164.218:445
[+] Running: auxiliary/scanner/misc/java_jmx_server - 172.16.164.218:1099
[+] Running: auxiliary/scanner/smb/smb1 - 172.16.164.218:445
[+] Running: auxiliary/scanner/rservices/rexec_login - 172.16.164.218:512
[+] Running: auxiliary/scanner/misc/java_rmi_server - 172.16.164.218:1099
[+] Running: auxiliary/scanner/smb/smb2 - 172.16.164.218:445
[+] Running: auxiliary/scanner/rservices/rlogin_login - 172.16.164.218:513
[+] Running: auxiliary/scanner/mysql/mysql_authbypass_hashdump - 172.16.164.218:3306
[+] Running: auxiliary/scanner/smb/smb_enum_gpp - 172.16.164.218:445
[+] Running: auxiliary/scanner/rservices/rsh_login - 172.16.164.218:514
[+] Running: auxiliary/scanner/mysql/mysql_hashdump - 172.16.164.218:3306
[+] Running: auxiliary/scanner/mysql/mysql_login - 172.16.164.218:3306
[+] Running: auxiliary/scanner/mysql/mysql_schemadump - 172.16.164.218:3306
[+] Running: auxiliary/scanner/mysql/mysql_version - 172.16.164.218:3306
[+] Running: auxiliary/scanner/postgres/postgres_dbname_flag_injection - 172.16.164.218:5432
[+] Running: auxiliary/scanner/postgres/postgres_hashdump - 172.16.164.218:5432
[+] Running: auxiliary/scanner/postgres/postgres_login - 172.16.164.218:5432
[+] Running: auxiliary/scanner/postgres/postgres_schemadump - 172.16.164.218:5432
[+] Running: auxiliary/scanner/postgres/postgres_version - 172.16.164.218:5432
[+] Running: auxiliary/scanner/vnc/ard_root_pw - 172.16.164.218:5900
[+] Running: auxiliary/scanner/vnc/vnc_login - 172.16.164.218:5900
[+] Running: auxiliary/scanner/vnc/vnc_none_auth - 172.16.164.218:5900
[+] Running: auxiliary/scanner/x11/open_x11 - 172.16.164.218:6000
[+] Running: auxiliary/gather/solarwinds_orion_sqli - 172.16.164.218:8787

[List of Modules to Run Manually]
+---------------------+-----------------------------------------------------------------+---------------------------+
| Targets             | Metasploit Module                                               | Module Parameters         |
+=====================+=================================================================+===========================+
| 172.16.164.218:25   | auxiliary/vsploit/pii/email_pii                                 | MAILTO|SUBJECT            |
|                     | auxiliary/apple_ios/email/mobilemail_libtiff                    | MAILTO|SUBJECT            |
|                     | auxiliary/osx/email/mailapp_image_exec                          | MAILTO|SUBJECT            |
|                     | auxiliary/unix/webapp/squirrelmail_pgp_plugin                   | MAILTO|SUBJECT            |
|                     | auxiliary/windows/email/ms07_017_ani_loadimage_chunksize        | MAILTO|SUBJECT            |
|                     | auxiliary/windows/email/ms10_045_outlook_ref_only               | MAILTO|SUBJECT            |
|                     | auxiliary/windows/email/ms10_045_outlook_ref_resolve            | MAILTO|SUBJECT            |
|                     | auxiliary/windows/lotus/domino_icalendar_organizer              | MAILFROM|MAILTO           |
|                     | auxiliary/windows/lotus/lotusnotes_lzh                          | MAILTO|SUBJECT            |
|                     | auxiliary/windows/smtp/mailcarrier_smtp_ehlo                    | LHOST                     |
+---------------------+-----------------------------------------------------------------+---------------------------+
| 172.16.164.218:22   | auxiliary/scanner/ssh/cerberus_sftp_enumusers                   | USER_FILE                 |
|                     | auxiliary/scanner/ssh/ssh_identify_pubkeys                      | KEY_FILE                  |
|                     | auxiliary/scanner/ssh/ssh_login_pubkey                          | KEY_PATH                  |
|                     | auxiliary/linux/ssh/mercurial_ssh_exec                          | SSH_PRIV_KEY_FILE         |
|                     | auxiliary/multi/ssh/sshexec                                     | PASSWORD                  |
+---------------------+-----------------------------------------------------------------+---------------------------+
| 172.16.164.218:445  | auxiliary/windows/smb/ms06_070_wkssvc                           | DOMAIN                    |
|                     | auxiliary/windows/smb/ms17_010_eternalblue                      | CheckScanner              |
|                     | auxiliary/windows/smb/ms17_010_psexec                           | CheckScanner              |
+---------------------+-----------------------------------------------------------------+---------------------------+
| 172.16.164.218:111  | auxiliary/gather/nis_bootparamd_domain                          | CLIENT                    |
|                     | auxiliary/gather/nis_ypserv_map                                 | DOMAIN                    |
+---------------------+-----------------------------------------------------------------+---------------------------+
| 172.16.164.218:3306 | auxiliary/scanner/mysql/mysql_file_enum                         | FILE_LIST                 |
|                     | auxiliary/scanner/mysql/mysql_writable_dirs                     | DIR_LIST                  |
|                     | auxiliary/windows/mysql/mysql_mof                               | USERNAME|PASSWORD         |
|                     | auxiliary/windows/mysql/mysql_start_up                          | USERNAME|PASSWORD         |
+---------------------+-----------------------------------------------------------------+---------------------------+
| 172.16.164.218:80   | auxiliary/gather/oats_downloadservlet_traversal                 | OATSPASSWORD              |
|                     | auxiliary/gather/pimcore_creds_sqli                             | APIKEY                    |
|                     | auxiliary/gather/xerox_workcentre_5xxx_ldap                     | NewLDAPServer             |
|                     | auxiliary/scanner/http/apache_mod_cgi_bash_env                  | TARGETURI                 |
|                     | auxiliary/scanner/http/cgit_traversal                           | REPO                      |
|                     | auxiliary/scanner/http/enum_wayback                             | DOMAIN                    |
|                     | auxiliary/scanner/http/httpbl_lookup                            | HTTPBL_APIKEY             |
|                     | auxiliary/scanner/http/litespeed_source_disclosure              | PATH_SAVE                 |
|                     | auxiliary/scanner/http/nginx_source_disclosure                  | PATH_SAVE                 |
|                     | auxiliary/scanner/http/squid_pivot_scanning                     | RANGE                     |
|                     | auxiliary/scanner/http/vhost_scanner                            | DOMAIN                    |
|                     | auxiliary/scanner/http/web_vulndb                               | VULNCSV                   |
|                     | auxiliary/scanner/http/wp_arbitrary_file_deletion               | USERNAME|PASSWORD         |
|                     | auxiliary/scanner/http/wp_nextgen_galley_file_read              | WP_USER|WP_PASS           |
|                     | auxiliary/scanner/http/wp_subscribe_comments_file_read          | WP_USER|WP_PASS           |
|                     | auxiliary/scanner/rogue/rogue_send                              | EHOST                     |
|                     | auxiliary/voip/telisca_ips_lock_control                         | PHONENAME                 |
|                     | auxiliary/linux/http/efw_chpasswd_exec                          | EFW_PASSWORD|EFW_USERNAME |
|                     | auxiliary/linux/http/kaltura_unserialize_cookie_rce             | ENTRYID                   |
|                     | auxiliary/linux/http/librenms_addhost_cmd_inject                | USERNAME|PASSWORD         |
|                     | auxiliary/linux/http/linksys_wrt160nv2_apply_exec               | LHOST                     |
|                     | auxiliary/linux/http/nagios_xi_magpie_debug                     | RSRVHOST                  |
|                     | auxiliary/linux/http/netgear_dnslookup_cmd_exec                 | USERNAME|PASSWORD         |
|                     | auxiliary/linux/http/symantec_web_gateway_restore               | USERNAME|PASSWORD         |
|                     | auxiliary/linux/http/trueonline_p660hn_v2_rce                   | LHOST                     |
|                     | auxiliary/linux/http/webmin_packageup_rce                       | USERNAME|PASSWORD         |
|                     | auxiliary/multi/http/activecollab_chat                          | PASS|USER                 |
|                     | auxiliary/multi/http/apache_mod_cgi_bash_env_exec               | TARGETURI                 |
|                     | auxiliary/multi/http/bolt_file_upload                           | PASSWORD|USERNAME         |
|                     | auxiliary/multi/http/cmsms_showtime2_rce                        | USERNAME                  |
|                     | auxiliary/multi/http/cmsms_upload_rename_rce                    | USERNAME|PASSWORD         |
|                     | auxiliary/multi/http/confluence_widget_connector                | SRVHOST                   |
|                     | auxiliary/multi/http/horde_form_file_upload                     | USERNAME|PASSWORD         |
|                     | auxiliary/multi/http/monstra_fileupload_exec                    | USERNAME|PASSWORD         |
|                     | auxiliary/multi/http/moodle_cmd_exec                            | PASSWORD                  |
|                     | auxiliary/multi/http/nibbleblog_file_upload                     | USERNAME|PASSWORD         |
|                     | auxiliary/multi/http/pimcore_unserialize_rce                    | USERNAME                  |
|                     | auxiliary/multi/http/qdpm_upload_exec                           | PASSWORD|USERNAME         |
|                     | auxiliary/multi/http/rails_secret_deserialization               | SECRET                    |
|                     | auxiliary/multi/http/sit_file_upload                            | USERNAME|PASSWORD         |
|                     | auxiliary/multi/http/vtiger_logo_upload_exec                    | PASSWORD                  |
|                     | auxiliary/multi/http/wikka_spam_exec                            | USERNAME|PASSWORD|PAGE    |
|                     | auxiliary/multi/http/wp_crop_rce                                | USERNAME|PASSWORD         |
|                     | auxiliary/multi/http/wp_ninja_forms_unauthenticated_file_upload | FORM_PATH                 |
|                     | auxiliary/multi/http/wp_responsive_thumbnail_slider_upload      | WPPASSWORD                |
|                     | auxiliary/multi/http/x7chat2_php_exec                           | PASSWORD|USERNAME         |
|                     | auxiliary/unix/webapp/get_simple_cms_upload_exec                | USERNAME|PASSWORD         |
|                     | auxiliary/unix/webapp/hastymail_exec                            | PASS|USER                 |
|                     | auxiliary/unix/webapp/joomla_media_upload_exec                  | USERNAME|PASSWORD         |
|                     | auxiliary/unix/webapp/nagios_graph_explorer                     | PASSWORD                  |
|                     | auxiliary/unix/webapp/openemr_sqli_privesc_upload               | PASS|USER                 |
|                     | auxiliary/unix/webapp/opensis_modname_exec                      | USERNAME|PASSWORD         |
|                     | auxiliary/unix/webapp/openx_banner_edit                         | USERNAME|PASSWORD         |
|                     | auxiliary/unix/webapp/piwik_superuser_plugin_upload             | USERNAME|PASSWORD         |
|                     | auxiliary/unix/webapp/sugarcrm_unserialize_exec                 | USERNAME|PASSWORD         |
|                     | auxiliary/unix/webapp/webmin_upload_exec                        | USERNAME|PASSWORD         |
|                     | auxiliary/unix/webapp/wp_admin_shell_upload                     | USERNAME|PASSWORD         |
|                     | auxiliary/unix/webapp/wp_ajax_load_more_file_upload             | WP_PASSWORD|WP_USERNAME   |
|                     | auxiliary/unix/webapp/wp_photo_gallery_unrestricted_file_upload | USERNAME|PASSWORD         |
|                     | auxiliary/unix/webapp/wp_slideshowgallery_upload                | WP_USER|WP_PASSWORD       |
|                     | auxiliary/unix/webapp/wp_wptouch_file_upload                    | PASSWORD|USER             |
|                     | auxiliary/unix/webapp/xymon_useradm_cmd_exec                    | PASSWORD|USERNAME         |
|                     | auxiliary/unix/webapp/zpanel_username_exec                      | USERNAME|PASSWORD         |
|                     | auxiliary/windows/http/oats_weblogic_console                    | OATSPASSWORD              |
|                     | auxiliary/windows/http/sysax_create_folder                      | SysaxUSER|SysaxPASS       |
+---------------------+-----------------------------------------------------------------+---------------------------+


[*] 1 HTTP servers found
[*] 0 HTTPs servers found

[Bruteforcing URI Paths]
[+] Checking: http://172.16.164.218:80/portal -  404
[+] Checking: http://172.16.164.218:80/stmeetings -  404
[+] Checking: http://172.16.164.218:80/_all_dbs -  404
[+] Checking: http://172.16.164.218:80/cgi-bin/config.exp -  404
[+] Checking: http://172.16.164.218:80/courier/intermediate_login.html -  404
[+] Checking: http://172.16.164.218:80/dolibarr -  404
[+] Checking: http://172.16.164.218:80/admin/index.jsp -  404
[+] Checking: http://172.16.164.218:80/crowd/services -  404
[+] Checking: http://172.16.164.218:80/drupal -  404
[+] Checking: http://172.16.164.218:80/axis2/services/listServices -  404
[+] Checking: http://172.16.164.218:80/userinfo/search -  404
[+] Checking: http://172.16.164.218:80/axis2/axis2-admin/login -  404
[+] Checking: http://172.16.164.218:80/clansphere_2011.3 -  404
[+] Checking: http://172.16.164.218:80/cgi-mod/view_help.cgi -  404
[+] Checking: http://172.16.164.218:80/data/login -  404
[+] Checking: http://172.16.164.218:80/index.php?age=50[NoSQLi] -  200
[+] Checking: http://172.16.164.218:80/cgi-bin/dna -  404
[+] Checking: http://172.16.164.218:80/bitweaver -  404
[+] Checking: http://172.16.164.218:80/caidao.php -  404
[+] Checking: http://172.16.164.218:80/dolibarr/ -  404
[+] Checking: http://172.16.164.218:80/cgit -  404
[+] Checking: http://172.16.164.218:80/.git -  404
[+] Checking: http://172.16.164.218:80/forum -  404
[+] Checking: http://172.16.164.218:80/imc -  404
[+] Checking: http://172.16.164.218:80/status -  404
[+] Checking: http://172.16.164.218:80/opennms -  404
[+] Checking: http://172.16.164.218:80/jenkins -  404
[+] Checking: http://172.16.164.218:80/SiteScope -  404
[+] Checking: http://172.16.164.218:80/zabbix -  404
[+] Checking: http://172.16.164.218:80/jenkins/ -  404
[+] Checking: http://172.16.164.218:80/SiteScope/ -  404
[+] Checking: http://172.16.164.218:80/admin.php -  404
[+] Checking: http://172.16.164.218:80/eng -  404
[+] Checking: http://172.16.164.218:80/VPortal/mgtconsole/CheckPassword.jsp -  404
[+] Checking: http://172.16.164.218:80/api/users/login -  404
[+] Checking: http://172.16.164.218:80/mediawiki -  404
[+] Checking: http://172.16.164.218:80/s40 -  404
[+] Checking: http://172.16.164.218:80/provision/index.php -  404
[+] Checking: http://172.16.164.218:80/www -  404
[+] Checking: http://172.16.164.218:80/.svn -  404
[+] Checking: http://172.16.164.218:80/session -  404
[+] Checking: http://172.16.164.218:80/admin/j_security_check -  404
[+] Checking: http://172.16.164.218:80/index.php -  200
[+] Checking: http://172.16.164.218:80/sap/bc/soap/rfc -  404
[+] Checking: http://172.16.164.218:80/manager/html -  404
[+] Checking: http://172.16.164.218:80/vcms2 -  404
[+] Checking: http://172.16.164.218:80/bvsmweb -  404
[+] Checking: http://172.16.164.218:80/rips -  404
[+] Checking: http://172.16.164.218:80/ATutor -  404
[+] Checking: http://172.16.164.218:80/iControl/iControlPortal.cgi -  404
[+] Checking: http://172.16.164.218:80/centreon -  404
[+] Checking: http://172.16.164.218:80/admin2769gx8k3 -  404
[+] Checking: http://172.16.164.218:80/components/system/configuration/functions.php -  404
[+] Checking: http://172.16.164.218:80/pws/impcli -  404
[+] Checking: http://172.16.164.218:80/swimtemp -  404
[+] Checking: http://172.16.164.218:80/qcenter -  404
[+] Checking: http://172.16.164.218:80/ping.ccp -  404
[+] Checking: http://172.16.164.218:80/v2/apps -  404
[+] Checking: http://172.16.164.218:80/boardDataWW.php -  404
[+] Checking: http://172.16.164.218:80/railo-context -  404
[+] Checking: http://172.16.164.218:80/cgi-bin/dna/ -  404
[+] Checking: http://172.16.164.218:80/pandora_console -  404
[+] Checking: http://172.16.164.218:80/v1/projects -  404
[+] Checking: http://172.16.164.218:80/cgi-bin/chpasswd.cgi -  404
[+] Checking: http://172.16.164.218:80/cmsms -  404
[+] Checking: http://172.16.164.218:80/RPC2 -  404
[+] Checking: http://172.16.164.218:80/AjaXplorer-2.5.5 -  404
[+] Checking: http://172.16.164.218:80/spywall/pbcontrol.php -  404
[+] Checking: http://172.16.164.218:80/roller -  404
[+] Checking: http://172.16.164.218:80/cuteflow_v.2.11.2 -  404
[+] Checking: http://172.16.164.218:80/com_extplorer_2.1.0 -  404
[+] Checking: http://172.16.164.218:80/appRain-q-0.1.5 -  404
[+] Checking: http://172.16.164.218:80/vcms -  404
[+] Checking: http://172.16.164.218:80/WebCalendar-1.2.4 -  404
[+] Checking: http://172.16.164.218:80/gestioip -  404
[+] Checking: http://172.16.164.218:80/ATutor/ -  404
[+] Checking: http://172.16.164.218:80/glossword/1.8 -  404
[+] Checking: http://172.16.164.218:80/WeBid -  404
[+] Checking: http://172.16.164.218:80/Auxiliumpetratepro -  404
[+] Checking: http://172.16.164.218:80/jira -  404
[+] Checking: http://172.16.164.218:80/glpi -  404
[+] Checking: http://172.16.164.218:80/mma.php -  404
[+] Checking: http://172.16.164.218:80/kordil_edms -  404
[+] Checking: http://172.16.164.218:80/openadmin -  404
[+] Checking: http://172.16.164.218:80/jmx-console -  404
[+] Checking: http://172.16.164.218:80/mobilecartly -  404
[+] Checking: http://172.16.164.218:80/log1cms2.0 -  404
[+] Checking: http://172.16.164.218:80/moodle -  404
[+] Checking: http://172.16.164.218:80/invoker/JMXInvokerServlet -  404
[+] Checking: http://172.16.164.218:80/mt -  404
[+] Checking: http://172.16.164.218:80/admin-console/login.seam -  404
[+] Checking: http://172.16.164.218:80/mantisbt -  404
[+] Checking: http://172.16.164.218:80/navigate -  404
[+] Checking: http://172.16.164.218:80/interface -  404
[+] Checking: http://172.16.164.218:80/openx -  404
[+] Checking: http://172.16.164.218:80/wiki -  404
[+] Checking: http://172.16.164.218:80/wls-wsat/CoordinatorPortType -  404
[+] Checking: http://172.16.164.218:80/pandora_console/ -  404
[+] Checking: http://172.16.164.218:80/Phoenix/includes/geoip.php -  404
[+] Checking: http://172.16.164.218:80/php-utility-belt/ajax.php -  404
[+] Checking: http://172.16.164.218:80/phptax -  404
[+] Checking: http://172.16.164.218:80/sflog -  404
[+] Checking: http://172.16.164.218:80/bf102 -  404
[+] Checking: http://172.16.164.218:80/phpwiki -  404
[+] Checking: http://172.16.164.218:80/struts2-showcase/integration/saveGangster.action -  404
[+] Checking: http://172.16.164.218:80/polarbearcms -  404
[+] Checking: http://172.16.164.218:80/phpFileManager-0.9.8/index.php -  404
[+] Checking: http://172.16.164.218:80/struts2-showcase -  404
[+] Checking: http://172.16.164.218:80/phpmyadmin -  404
[+] Checking: http://172.16.164.218:80/qdPM -  404
[+] Checking: http://172.16.164.218:80/struts2-rest-showcase/orders/3 -  404
[+] Checking: http://172.16.164.218:80/missing404 -  404
[+] Checking: http://172.16.164.218:80/phpmyadmin/ -  404
[+] Checking: http://172.16.164.218:80/struts2-blank/example/HelloWorld.action -  404
[+] Checking: http://172.16.164.218:80/manager -  404
[+] Checking: http://172.16.164.218:80/blank-struts2/login.action -  404
[+] Checking: http://172.16.164.218:80/console -  404
[+] Checking: http://172.16.164.218:80/IDC.php -  404
[+] Checking: http://172.16.164.218:80/jos.php -  404
[+] Checking: http://172.16.164.218:80/wikka -  404
[+] Checking: http://172.16.164.218:80/sysaid -  404
[+] Checking: http://172.16.164.218:80/vtigercrm -  404
[+] Checking: http://172.16.164.218:80/x7chat2 -  404
[+] Checking: http://172.16.164.218:80/testlink-1.9.3 -  404
[+] Checking: http://172.16.164.218:80/zabbix/ -  404
[+] Checking: http://172.16.164.218:80/vtigercrm/ -  404
[+] Checking: http://172.16.164.218:80/Zemra/Panel/Zemra/system/command.php -  404
[+] Checking: http://172.16.164.218:80/zenworks -  404
[+] Checking: http://172.16.164.218:80/www/ -  404
[+] Checking: http://172.16.164.218:80/do/view/Main/WebHome -  404
[+] Checking: http://172.16.164.218:80/zpanel -  404
[+] Checking: http://172.16.164.218:80/lite -  404
[+] Checking: http://172.16.164.218:80/chat -  404
[+] Checking: http://172.16.164.218:80/_async/AsyncResponseService -  404
[+] Checking: http://172.16.164.218:80/GetSimpleCMS -  404
[+] Checking: http://172.16.164.218:80/basilic-1.5.14 -  404
[+] Checking: http://172.16.164.218:80/installer.php -  404
[+] Checking: http://172.16.164.218:80/hastymail2 -  404
[+] Checking: http://172.16.164.218:80/forums -  404
[+] Checking: http://172.16.164.218:80/sample -  404
[+] Checking: http://172.16.164.218:80/horde -  404
[+] Checking: http://172.16.164.218:80/elFinder -  404
[+] Checking: http://172.16.164.218:80/joomla -  404
[+] Checking: http://172.16.164.218:80/hybridauth -  404
[+] Checking: http://172.16.164.218:80/jQuery-File-Upload -  404
[+] Checking: http://172.16.164.218:80/kimai -  404
[+] Checking: http://172.16.164.218:80/librettoCMS_v.2.2.2 -  404
[+] Checking: http://172.16.164.218:80/nagios3/cgi-bin/history.cgi -  404
[+] Checking: http://172.16.164.218:80/simple_e_document_v_1_31 -  404
[+] Checking: http://172.16.164.218:80/php-charts_v1.0 -  404
[+] Checking: http://172.16.164.218:80/cgi-bin/mt -  404
[+] Checking: http://172.16.164.218:80/narcissus-master -  404
[+] Checking: http://172.16.164.218:80/phpcollab -  404
[+] Checking: http://172.16.164.218:80/sugarcrm -  404
[+] Checking: http://172.16.164.218:80/php-ofc-library -  404
[+] Checking: http://172.16.164.218:80/pp088 -  404
[+] Checking: http://172.16.164.218:80/sugarcrm/ -  404
[+] Checking: http://172.16.164.218:80/openemr -  404
[+] Checking: http://172.16.164.218:80/ProjectSend -  404
[+] Checking: http://172.16.164.218:80/tiki -  404
[+] Checking: http://172.16.164.218:80/opensis -  404
[+] Checking: http://172.16.164.218:80/seportal -  404
[+] Checking: http://172.16.164.218:80/zimbraAdmin -  404
[+] Checking: http://172.16.164.218:80/autopass -  404
[+] Checking: http://172.16.164.218:80/tiki/ -  404
[+] Checking: http://172.16.164.218:80/zm -  404
[+] Checking: http://172.16.164.218:80/vicidial -  404
[+] Checking: http://172.16.164.218:80/ws/control -  404
[+] Checking: http://172.16.164.218:80/webtester5 -  404
[+] Checking: http://172.16.164.218:80/cms400min -  404
[+] Checking: http://172.16.164.218:80/ctc/servlet -  404
[+] Checking: http://172.16.164.218:80/xoda -  404
[+] Checking: http://172.16.164.218:80/d4d/statusFilter.php -  404
[+] Checking: http://172.16.164.218:80/cms400min/ -  404
[+] Checking: http://172.16.164.218:80/TrackItWeb -  404
[+] Checking: http://172.16.164.218:80/cgi-bin/function.php?argument= -  404
[+] Checking: http://172.16.164.218:80/xymon-seccgi -  404
[+] Checking: http://172.16.164.218:80/status/Status_Basic.asp -  404
[+] Checking: http://172.16.164.218:80/umbraco -  404
[+] Checking: http://172.16.164.218:80/errorInSignUp.htm -  404
[+] Checking: http://172.16.164.218:80/cgi-bin/luci -  404
[+] Checking: http://172.16.164.218:80/Login.jsp -  404
[+] Checking: http://172.16.164.218:80/vtapi/v2/file/scan -  404
[+] Checking: http://172.16.164.218:80/common/index.jsf -  404
[+] Checking: http://172.16.164.218:80/ChangePhoto.jsp -  404
[+] Checking: http://172.16.164.218:80/HtmlAdaptor -  404
[+] Checking: http://172.16.164.218:80/version -  404
[+] Checking: http://172.16.164.218:80/login.jsf -  404
[+] Checking: http://172.16.164.218:80/gw_login.php -  404
[+] Checking: http://172.16.164.218:80/goform/websLogin -  404
[+] Checking: http://172.16.164.218:80/gw_admin.php?a=edit-own&t=users -  404
[+] Checking: http://172.16.164.218:80/console/login/LoginForm.jsp -  404
[+] Checking: http://172.16.164.218:80/global_group_login.php -  404
[+] Checking: http://172.16.164.218:80/userpictures -  404
[+] Checking: http://172.16.164.218:80/servlets/FileUploadServlet -  404
[+] Checking: http://172.16.164.218:80/jsp -  404
[+] Checking: http://172.16.164.218:80/appliance/applianceMainPage -  404
[+] Checking: http://172.16.164.218:80/appliance -  404
[+] Checking: http://172.16.164.218:80/admin/ -  404
[+] Checking: http://172.16.164.218:80/wizards/post2file.php -  404
[+] Checking: http://172.16.164.218:80/login_page.php -  404
[+] Checking: http://172.16.164.218:80/theme -  404
[+] Checking: http://172.16.164.218:80/ajax/jsonQuery.php -  404
[+] Checking: http://172.16.164.218:80/en-US/manager/appinstall/_upload -  404
[+] Checking: http://172.16.164.218:80/mods/documents/uploads/ -  404
[+] Checking: http://172.16.164.218:80/readme -  404
[+] Checking: http://172.16.164.218:80/main.php -  404
[+] Checking: http://172.16.164.218:80/proxy/ssllogin -  404
[+] Checking: http://172.16.164.218:80/actions/beats_uploader.php -  404
[+] Checking: http://172.16.164.218:80/www/delivery/fc.php -  404
[+] Checking: http://172.16.164.218:80/actions/pdir/pname -  404
[+] Checking: http://172.16.164.218:80/login.php -  404
[+] Checking: http://172.16.164.218:80/etc/apps/phpmyadmin/index.php -  404
[+] Checking: http://172.16.164.218:80/upload_area -  404
[+] Checking: http://172.16.164.218:80/etc/apps/phpmyadmin/import.php -  404
[+] Checking: http://172.16.164.218:80/upload_area/nodes_hierarchy -  404
[+] Checking: http://172.16.164.218:80/servlet/com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector -  404
[+] Checking: http://172.16.164.218:80/event/index3.do -  404
[+] Checking: http://172.16.164.218:80/admin/libraries/ajaxfilemanager/ajax_create_folder.php -  404
[+] Checking: http://172.16.164.218:80/index.php?loggedout -  200
[+] Checking: http://172.16.164.218:80/event/agentUpload -  404
[+] Checking: http://172.16.164.218:80/admin/libraries/ajaxfilemanager/inc/data.php -  404
[+] Checking: http://172.16.164.218:80/agentUpload -  404
[+] Checking: http://172.16.164.218:80/files/php_pagename -  404
[+] Checking: http://172.16.164.218:80/olt/Login.do/../../olt/UploadFileUpload.do -  404
[+] Checking: http://172.16.164.218:80/new -  404
[+] Checking: http://172.16.164.218:80/jetspeed/login/redirector -  404
[+] Checking: http://172.16.164.218:80/images/../jsp/ProcessFileUpload.jsp -  404
[+] Checking: http://172.16.164.218:80/jetspeed/portal/Administrative/site.psml -  404
[+] Checking: http://172.16.164.218:80/Admin/archive/ArchiveCache -  404
[+] Checking: http://172.16.164.218:80/Admin/archive/upload.jsp -  404
[+] Checking: http://172.16.164.218:80/examples/save.lsp -  404
[+] Checking: http://172.16.164.218:80/themes/dashboard/assets/plugins/jquery-file-upload/server/php -  404
[+] Checking: http://172.16.164.218:80/includes/jquery.uploadify/upload.php -  404
[+] Checking: http://172.16.164.218:80/includes/jquery.uploadify/upload.php?folder=#{upload_dir} -  404
[+] Checking: http://172.16.164.218:80/LiveTime/WebObjects/LiveTime.woa -  404
[+] Checking: http://172.16.164.218:80/images/.. -  200
[+] Checking: http://172.16.164.218:80/LiveTime -  404
[+] Checking: http://172.16.164.218:80/addons/uploadify/uploadify.php -  404
[+] Checking: http://172.16.164.218:80/rails -  404
[+] Checking: http://172.16.164.218:80/public/uploads/pay_name -  404
[+] Checking: http://172.16.164.218:80/wizards -  404
[+] Checking: http://172.16.164.218:80/admin/Login.do -  404
[+] Checking: http://172.16.164.218:80/install.php -  404
[+] Checking: http://172.16.164.218:80/axis2-admin/login -  404
[+] Checking: http://172.16.164.218:80/test/logo -  404
[+] Checking: http://172.16.164.218:80/images -  404
[+] Checking: http://172.16.164.218:80/wikka.php -  404
[+] Checking: http://172.16.164.218:80/my_view_page.php -  404
[+] Checking: http://172.16.164.218:80/library/openflashchart/tmp-upload-images -  404
[+] Checking: http://172.16.164.218:80/spamlog.txt.php -  404
[+] Checking: http://172.16.164.218:80/SGPAdmin/fileRequest -  404
[+] Checking: http://172.16.164.218:80/ajax-load-more/core/repeater -  404
[+] Checking: http://172.16.164.218:80/servlet/Main -  404
[+] Checking: http://172.16.164.218:80/_search -  404
[+] Checking: http://172.16.164.218:80/j_security_check -  404
[+] Checking: http://172.16.164.218:80/scripts/upload.php -  404
[+] Checking: http://172.16.164.218:80/interface/login/login.php -  404
[+] Checking: http://172.16.164.218:80/mods/_core/modules -  404
[+] Checking: http://172.16.164.218:80/library/openflashchart/php-ofc-library/ofc_upload_image.php -  404
[+] Checking: http://172.16.164.218:80/havalite/upload.php -  404
[+] Checking: http://172.16.164.218:80/foxypress/uploadify/uploadify.php -  404
[+] Checking: http://172.16.164.218:80/upload.php -  404
[+] Checking: http://172.16.164.218:80/cgi-bin/kerbynet -  404
[+] Checking: http://172.16.164.218:80/affiliate_images -  404
[+] Checking: http://172.16.164.218:80/ofc_upload_image.php -  404
[+] Checking: http://172.16.164.218:80/sites/default/images -  404
[+] Checking: http://172.16.164.218:80/staticpages.php -  404
[+] Checking: http://172.16.164.218:80/egallery/uploadify.php -  404
[+] Checking: http://172.16.164.218:80/interface/main/main_screen.php -  404
[+] Checking: http://172.16.164.218:80/config.php -  404
[+] Checking: http://172.16.164.218:80/interface/new/new_comprehensive_save.php -  404
[+] Checking: http://172.16.164.218:80/admin/downloads.php -  404
[+] Checking: http://172.16.164.218:80/admincp/ -  404
[+] Checking: http://172.16.164.218:80/interface/super/manage_site_files.php -  404
[+] Checking: http://172.16.164.218:80/data/down_media -  404
[+] Checking: http://172.16.164.218:80/uploads/slideshow-gallery -  404
[+] Checking: http://172.16.164.218:80/nagiosxi/includes/components/graphexplorer/visApi.php -  404
[+] Checking: http://172.16.164.218:80/nagiosxi/index.php -  404
[+] Checking: http://172.16.164.218:80/admin/CHANGES -  404
[+] Checking: http://172.16.164.218:80/service/v4/rest.php -  404
[+] Checking: http://172.16.164.218:80/install2.php -  404
[+] Checking: http://172.16.164.218:80/admin/config.php -  404
[+] Checking: http://172.16.164.218:80/admin_area/charts/ofc-library/ofc_upload_image.php -  404
[+] Checking: http://172.16.164.218:80/system_groupmanager.php -  404
[+] Checking: http://172.16.164.218:80/admin_area/charts/tmp-upload-images -  404
[+] Checking: http://172.16.164.218:80/infusionsoft/Infusionsoft/utilities/code_generator.php -  404
[+] Checking: http://172.16.164.218:80/cgi-bin/vmtadmin.cgi -  404
[+] Checking: http://172.16.164.218:80/front-end-editor/lib/aloha-editor/plugins/extra/draganddropfiles/demo -  404
[+] Checking: http://172.16.164.218:80/php/connector.minimal.php -  404
[+] Checking: http://172.16.164.218:80/setup.xml -  404
[+] Checking: http://172.16.164.218:80/ws/v1/cluster/apps/new-application -  404
[+] Checking: http://172.16.164.218:80/login.cgi -  404
[+] Checking: http://172.16.164.218:80/ws/v1/cluster/apps -  404
[+] Checking: http://172.16.164.218:80/spywall/login.php -  404
[+] Checking: http://172.16.164.218:80/spywall/ipchange.php -  404
[+] Checking: http://172.16.164.218:80/includes/settings.php -  404
[+] Checking: http://172.16.164.218:80/scripts_exec.php -  404
[+] Checking: http://172.16.164.218:80/cgi-bin/rdfs.cgi -  404
[+] Checking: http://172.16.164.218:80/display.php -  404
[+] Checking: http://172.16.164.218:80/img/favicon.png?v=6.0.1-1213 -  404
[+] Checking: http://172.16.164.218:80/nagiosxi/ -  404
[+] Checking: http://172.16.164.218:80/josso/signon/login.do -  404
[+] Checking: http://172.16.164.218:80/WANem/result.php -  404
[+] Checking: http://172.16.164.218:80/nagiosql/admin/settings.php -  404
[+] Checking: http://172.16.164.218:80/web/jquery/uploader/multi_uploadify.php -  404
[+] Checking: http://172.16.164.218:80/picsdesc.xml -  404
[+] Checking: http://172.16.164.218:80/httpmon.php -  404
[+] Checking: http://172.16.164.218:80/nagiosql/admin/helpedit.php -  404
[+] Checking: http://172.16.164.218:80/config/global.conf -  404
[+] Checking: http://172.16.164.218:80/scripts.php -  404
[+] Checking: http://172.16.164.218:80/hedwig.cgi -  404
[+] Checking: http://172.16.164.218:80/cgi-bin/setConfigSettings -  404
[+] Checking: http://172.16.164.218:80/authentication.cgi -  404
[+] Checking: http://172.16.164.218:80/spywall/blocked_file.php -  404
[+] Checking: http://172.16.164.218:80/tools_command.php -  404
[+] Checking: http://172.16.164.218:80/pigwidgeon.cgi -  404
[+] Checking: http://172.16.164.218:80/login.htm -  404
[+] Checking: http://172.16.164.218:80/InternetGatewayDevice.xml -  404
[+] Checking: http://172.16.164.218:80/hawkeye/v1/login -  404
[+] Checking: http://172.16.164.218:80/tmUnblock.cgi -  404
[+] Checking: http://172.16.164.218:80/hawkeye/v1/account -  404
[+] Checking: http://172.16.164.218:80/ossim/action/getaction.php -  404
[+] Checking: http://172.16.164.218:80/anyterm.html -  404
[+] Checking: http://172.16.164.218:80/anyterm-module -  404
[+] Checking: http://172.16.164.218:80/ForensicsAnalysisServlet/ -  404
[+] Checking: http://172.16.164.218:80/ossim/policy/policy.php -  404
[+] Checking: http://172.16.164.218:80/ossim/policy/newpolicy.php -  404
[+] Checking: http://172.16.164.218:80/docs/changes.txt -  404
[+] Checking: http://172.16.164.218:80/saveCert.imss -  404
[+] Checking: http://172.16.164.218:80/en/content/index.php -  404
[+] Checking: http://172.16.164.218:80/nagiosxi/admin/components.php -  404
[+] Checking: http://172.16.164.218:80/ossim/conf/reload.php -  404
[+] Checking: http://172.16.164.218:80/comm.asp -  404
[+] Checking: http://172.16.164.218:80/interface/index.do -  404
[+] Checking: http://172.16.164.218:80/en/logon.php -  404
[+] Checking: http://172.16.164.218:80/en/database/import.php -  404
[+] Checking: http://172.16.164.218:80/m -  404
[+] Checking: http://172.16.164.218:80/login.imss -  404
[+] Checking: http://172.16.164.218:80/cgi-bin/webcm -  404
[+] Checking: http://172.16.164.218:80/upload -  404
[+] Checking: http://172.16.164.218:80/initCert.imss -  404
[+] Checking: http://172.16.164.218:80/includes/inline_image_upload.php -  404
[+] Checking: http://172.16.164.218:80/continuum/about.action -  404
[+] Checking: http://172.16.164.218:80/api/systems/details -  404
[+] Checking: http://172.16.164.218:80/ping.html -  404
[+] Checking: http://172.16.164.218:80/agent/linuxpkgs -  404
[+] Checking: http://172.16.164.218:80/ayefeaturesconvert.js -  404
[+] Checking: http://172.16.164.218:80/HNAP1/ -  404
[+] Checking: http://172.16.164.218:80/setup.cgi -  404
[+] Checking: http://172.16.164.218:80/spywall/releasenotes.php?relfile=../../../../../usr/local/apache2/logs/access_log -  404
[+] Checking: http://172.16.164.218:80/sysinfo.cgi -  404
[+] Checking: http://172.16.164.218:80/ping.cgi -  404
[+] Checking: http://172.16.164.218:80/shell -  404
[+] Checking: http://172.16.164.218:80/globe -  404
[+] Checking: http://172.16.164.218:80/cgi-bin/ping.sh -  404
[+] Checking: http://172.16.164.218:80/redirect.cgi -  404
[+] Checking: http://172.16.164.218:80/php/utils/router.php/Administrator.get -  404
[+] Checking: http://172.16.164.218:80/webacs/pages/common/login.jsp -  404
[+] Checking: http://172.16.164.218:80/ossim/action/modifyactions.php -  404
[+] Checking: http://172.16.164.218:80/servlet/UploadServlet -  404
[+] Checking: http://172.16.164.218:80/mobile/index.php -  404
[+] Checking: http://172.16.164.218:80/ossim/policy/getpolicy.php -  404
[+] Checking: http://172.16.164.218:80/topology/home -  404
[+] Checking: http://172.16.164.218:80/event/j_security_check;jsessionid=#{jsessionid} -  404
[+] Checking: http://172.16.164.218:80/jsp_name -  404
[+] Checking: http://172.16.164.218:80/LoginServlet -  404
[+] Checking: http://172.16.164.218:80/ossim/session/token.php -  404
[+] Checking: http://172.16.164.218:80/whatsnew.txt -  404
[+] Checking: http://172.16.164.218:80/ossim/policy/deletepolicy.php -  404
[+] Checking: http://172.16.164.218:80/Installers -  404
[+] Checking: http://172.16.164.218:80/ossim/action/deleteaction.php -  404
[+] Checking: http://172.16.164.218:80/mve/upload/gfd -  404
[+] Checking: http://172.16.164.218:80/login -  404
[+] Checking: http://172.16.164.218:80/cbmui/images -  404
[+] Checking: http://172.16.164.218:80/SystemTab/uploadImage.asp -  404
[+] Checking: http://172.16.164.218:80/event/runQuery.do -  404
[+] Checking: http://172.16.164.218:80/LoginAdmin -  404
[+] Checking: http://172.16.164.218:80/unins000.dat -  404
[+] Checking: http://172.16.164.218:80/wlevs/visualizer/upload -  404
[+] Checking: http://172.16.164.218:80/ohw/help/state -  404
[+] Checking: http://172.16.164.218:80/chat.ghp -  404
[+] Checking: http://172.16.164.218:80/LoginPage.do -  404
[+] Checking: http://172.16.164.218:80/jsp/tabs.jsp -  404
[+] Checking: http://172.16.164.218:80/AccessNow/start.html -  404
[+] Checking: http://172.16.164.218:80/api/json/admin/SubmitQuery -  404
[+] Checking: http://172.16.164.218:80/fileUpload.do -  404
[+] Checking: http://172.16.164.218:80/OvCgi/nnmRptConfig.exe -  404
[+] Checking: http://172.16.164.218:80/jsp/Login.do -  404
[+] Checking: http://172.16.164.218:80/banner.jpg -  404
[+] Checking: http://172.16.164.218:80/rest/collectors/1.0/tempattachment -  404
[+] Checking: http://172.16.164.218:80/registresult.htm -  404
[+] Checking: http://172.16.164.218:80/upload/upload -  404
[+] Checking: http://172.16.164.218:80/ServiceEmulation/services/EmulationAdmin -  404
[+] Checking: http://172.16.164.218:80/ServiceEmulation -  404
[+] Checking: http://172.16.164.218:80/cs/pdfupload -  404
[+] Checking: http://172.16.164.218:80/scripts -  404
[+] Checking: http://172.16.164.218:80/exchange/servlet/GetProductVersion -  404
[+] Checking: http://172.16.164.218:80/user/login -  404
[+] Checking: http://172.16.164.218:80/ip -  404
[+] Checking: http://172.16.164.218:80/cgi-bin/user/Config.cgi -  404
[+] Checking: http://172.16.164.218:80/% -  400
[+] Checking: http://172.16.164.218:80/olt/ -  404
[+] Checking: http://172.16.164.218:80/cgi-bin/authLogin.cgi -  404
[+] Checking: http://172.16.164.218:80/webdm/mibbrowser/mibFileUpload -  404
[+] Checking: http://172.16.164.218:80/servicedesk/servicedesk/servicedesk.nocache.js -  404
[+] Checking: http://172.16.164.218:80/search -  404
[+] Checking: http://172.16.164.218:80/rest/action -  404
[+] Checking: http://172.16.164.218:80/servicedesk/servicedesk -  404
[+] Checking: http://172.16.164.218:80/servicedesk/servicedesk/accountSerivce.gwtsvc -  404
[+] Checking: http://172.16.164.218:80/rtc/post/ -  404
[+] Checking: http://172.16.164.218:80/scripts/ -  404
[+] Checking: http://172.16.164.218:80/rest/v1/AccountService/Accounts -  404
[+] Checking: http://172.16.164.218:80/miq_policy/explorer -  404
[+] Checking: http://172.16.164.218:80/userSession.do -  404
[+] Checking: http://172.16.164.218:80/setup/reboot -  404
[+] Checking: http://172.16.164.218:80/adm/syscmd.asp -  404
[+] Checking: http://172.16.164.218:80/data/config/image.do -  404
[+] Checking: http://172.16.164.218:80/config.bin -  404
[+] Checking: http://172.16.164.218:80/apps/YouTube -  404
[+] Checking: http://172.16.164.218:80/getcfg.php -  404
[+] Checking: http://172.16.164.218:80/apps/YouTube/run -  404
[+] Checking: http://172.16.164.218:80/cgi-bin/tmUnblock.cgi -  404
[+] Checking: http://172.16.164.218:80/telpho/temp/telpho10.epb -  404
[+] Checking: http://172.16.164.218:80/dashboard -  404
[+] Checking: http://172.16.164.218:80/showcallfwd.cgi -  404
[+] Checking: http://172.16.164.218:80/phonecallfwd.cgi -  404
[+] Checking: http://172.16.164.218:80/hw-sys.htm -  404
[+] Checking: http://172.16.164.218:80/showcallfwdperline.cgi -  404
[+] Checking: http://172.16.164.218:80/log-in -  404
[+] Checking: http://172.16.164.218:80/_users/_all_docs -  404
[+] Checking: http://172.16.164.218:80/0x44/BuildMaster.Web.WebApplication/Inedo.BuildMaster.Web.WebApplication.Pages.LogInPage/LogIn -  404
[+] Checking: http://172.16.164.218:80/sap/bw/xml/soap/xmla?sap-client= -  404
[+] Checking: http://172.16.164.218:80/index.php/component/users/ -  200
[+] Checking: http://172.16.164.218:80/events/reports/view.cgi -  404
[+] Checking: http://172.16.164.218:80/mmr/MMR -  404
[+] Checking: http://172.16.164.218:80/objects/ -  404
[+] Checking: http://172.16.164.218:80/tools.php -  404
[+] Checking: http://172.16.164.218:80/+CSCOE+/logon.html -  404
[+] Checking: http://172.16.164.218:80/+webvpn+/webvpn_logout.html -  404
[+] Checking: http://172.16.164.218:80/remote/login?lang=en -  404
[+] Checking: http://172.16.164.218:80/+webvpn+/index.html -  404
[+] Checking: http://172.16.164.218:80/remote/logout -  404
[+] Checking: http://172.16.164.218:80/workorder/FileDownload.jsp -  404
[+] Checking: http://172.16.164.218:80/remote/logincheck -  404
[+] Checking: http://172.16.164.218:80/html/en/index.html -  404
[+] Checking: http://172.16.164.218:80/windows/code.php -  404
[+] Checking: http://172.16.164.218:80/cfg/EWplant.db -  404
[+] Checking: http://172.16.164.218:80/html/en/confAccessProt.html -  404
[+] Checking: http://172.16.164.218:80/setup/scan_results -  404
[+] Checking: http://172.16.164.218:80/exportFile -  404
[+] Checking: http://172.16.164.218:80/mTheme-Unus/css/css.php -  404
[+] Checking: http://172.16.164.218:80/WorkOrder.do -  404
[+] Checking: http://172.16.164.218:80/setupfirmware.php -  404
[+] Checking: http://172.16.164.218:80/setup/scan_wifi -  404
[+] Checking: http://172.16.164.218:80/rfcode_reader/api/whoami.json -  404
[+] Checking: http://172.16.164.218:80/ui/login/ -  404
[+] Checking: http://172.16.164.218:80/gi-media-library/download.php -  404
[+] Checking: http://172.16.164.218:80/~login -  404
[+] Checking: http://172.16.164.218:80/goform/down_cfg_file -  404
[+] Checking: http://172.16.164.218:80/modules/common/logs -  404
[+] Checking: http://172.16.164.218:80/gconfig.htm -  404
[+] Checking: http://172.16.164.218:80/options-general.php -  404
[+] Checking: http://172.16.164.218:80/services/listServices -  404
[+] Checking: http://172.16.164.218:80/setup/eureka_info -  404
[+] Checking: http://172.16.164.218:80/en-US/app/launcher/home -  404
[+] Checking: http://172.16.164.218:80/posts -  404
[+] Checking: http://172.16.164.218:80/dukapress/lib/dp_image.php -  404
[+] Checking: http://172.16.164.218:80/fakeURL1 -  404
[+] Checking: http://172.16.164.218:80/_snapshot/pwn -  404
[+] Checking: http://172.16.164.218:80/English/pages_MacUS/lan_set_content.html -  404
[+] Checking: http://172.16.164.218:80/fakeURL2 -  404
[+] Checking: http://172.16.164.218:80/_snapshot/pwnie -  404
[+] Checking: http://172.16.164.218:80/fakeURL3 -  404

[List of Matching Metasploit Modules]
Host                 Module
-------------------  ----------------------------------
172.16.164.218:139   exploit/multi/samba/usermap_script
172.16.164.218:1099  exploit/multi/misc/java_rmi_server