You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/network-services-pentesting/pentesting-rpcbind.md
+18-4Lines changed: 18 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,6 +25,19 @@ Sometimes it doesn't give you any information, in other occasions you will get s
25
25
26
26
.png>)
27
27
28
+
### Advanced `rpcinfo` usage
29
+
30
+
Leverage `rpcinfo -T udp -p <target>` to pull the UDP program list even when TCP/111 is filtered, then immediately run `showmount -e <target>` to spot world-readable NFS exports registered through rpcbind.
31
+
32
+
```bash
33
+
rpcinfo -T udp -p 10.10.10.10
34
+
showmount -e 10.10.10.10
35
+
```
36
+
37
+
### Exhaustive mapping with Nmap NSE
38
+
39
+
Pair the classic scan with `nmap --script=rpcinfo,rpc-grind -p111 <target>` to brute-force RPC program numbers. `rpc-grind` hammers the portmapper with null calls that walk the `nmap-rpc` database, extracting supported versions whenever the remote daemon replies with "can't support version," which often reveals quietly registered services such as rusersd, rquotad or custom daemons. Multi-threading via `--script-args 'rpc-grind.threads=8'` speeds up large targets while the companion `rpcinfo` script prints human-readable tables you can diff against host baselines.
40
+
28
41
### Shodan
29
42
30
43
-`port:111 portmap`
@@ -35,7 +48,7 @@ If you find the service NFS then probably you will be able to list and download(
35
48
36
49
.png>)
37
50
38
-
Read[2049 - Pentesting NFS service](nfs-service-pentesting.md) to learn more about how to test this protocol.
51
+
Read[2049 - Pentesting NFS service](nfs-service-pentesting.md) to learn more about how to test this protocol.
39
52
40
53
## NIS
41
54
@@ -77,9 +90,6 @@ You could enumerate users of the box. To learn how read [1026 - Pentesting Rsuse
77
90
78
91
When conducting a **nmap scan** and discovering open NFS ports with port 111 being filtered, direct exploitation of these ports is not feasible. However, by **simulating a portmapper service locally and creating a tunnel from your machine** to the target, exploitation becomes possible using standard tools. This technique allows for bypassing the filtered state of port 111, thus enabling access to NFS services. For detailed guidance on this method, refer to the article available at [this link](https://medium.com/@sebnemK/how-to-bypass-filtered-portmapper-port-111-27cee52416bc).
0 commit comments