Skip to content

Commit 0c5a15e

Browse files
authored
Merge pull request #1647 from HackTricks-wiki/research_update_src_network-services-pentesting_pentesting-rpcbind_20251208_083146
Research Update Enhanced src/network-services-pentesting/pen...
2 parents 50e2eb8 + 1639929 commit 0c5a15e

File tree

1 file changed

+18
-4
lines changed

1 file changed

+18
-4
lines changed

src/network-services-pentesting/pentesting-rpcbind.md

Lines changed: 18 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,19 @@ Sometimes it doesn't give you any information, in other occasions you will get s
2525

2626
![](<../images/image (553).png>)
2727

28+
### Advanced `rpcinfo` usage
29+
30+
Leverage `rpcinfo -T udp -p <target>` to pull the UDP program list even when TCP/111 is filtered, then immediately run `showmount -e <target>` to spot world-readable NFS exports registered through rpcbind.
31+
32+
```bash
33+
rpcinfo -T udp -p 10.10.10.10
34+
showmount -e 10.10.10.10
35+
```
36+
37+
### Exhaustive mapping with Nmap NSE
38+
39+
Pair the classic scan with `nmap --script=rpcinfo,rpc-grind -p111 <target>` to brute-force RPC program numbers. `rpc-grind` hammers the portmapper with null calls that walk the `nmap-rpc` database, extracting supported versions whenever the remote daemon replies with "can't support version," which often reveals quietly registered services such as rusersd, rquotad or custom daemons. Multi-threading via `--script-args 'rpc-grind.threads=8'` speeds up large targets while the companion `rpcinfo` script prints human-readable tables you can diff against host baselines.
40+
2841
### Shodan
2942

3043
- `port:111 portmap`
@@ -35,7 +48,7 @@ If you find the service NFS then probably you will be able to list and download(
3548

3649
![](<../images/image (872).png>)
3750

38-
Read[ 2049 - Pentesting NFS service](nfs-service-pentesting.md) to learn more about how to test this protocol.
51+
Read [2049 - Pentesting NFS service](nfs-service-pentesting.md) to learn more about how to test this protocol.
3952

4053
## NIS
4154

@@ -77,9 +90,6 @@ You could enumerate users of the box. To learn how read [1026 - Pentesting Rsuse
7790

7891
When conducting a **nmap scan** and discovering open NFS ports with port 111 being filtered, direct exploitation of these ports is not feasible. However, by **simulating a portmapper service locally and creating a tunnel from your machine** to the target, exploitation becomes possible using standard tools. This technique allows for bypassing the filtered state of port 111, thus enabling access to NFS services. For detailed guidance on this method, refer to the article available at [this link](https://medium.com/@sebnemK/how-to-bypass-filtered-portmapper-port-111-27cee52416bc).
7992

80-
## Shodan
81-
82-
- `Portmap`
8393

8494
## Labs to practice
8595

@@ -112,6 +122,10 @@ Entry_3:
112122
Command: nmap -sSUC -p 111 {IP}
113123
```
114124

125+
## References
126+
127+
- [Nmap NSE: rpc-grind](https://nmap.org/nsedoc/scripts/rpc-grind.html)
128+
115129
{{#include ../banners/hacktricks-training.md}}
116130

117131

0 commit comments

Comments
 (0)