

SF:in \x 20charset=US-ASCII \r\n Connection: \x 20Close \r\n\r\n Method \x 20not \x 2 SF:r \n Invalid \x 20request \x 20line: \x 20" )%r (GetRequest,5C, "HTTP/1 \.

After getting shell, we switched to root and captured the flag(. SF:t-Type: \x 20text/plain \x 20charset=US-ASCII \r\n Connection: \x 20Close \r\n\ As we knew from Nmap scan that freeciv is running on port 5555 so tried to connect it with adb.
Freeciv port 5555 exploit full#
$ nmap -p37425,42135,59777 -sV -Pn -oA Full 10.10.10.247Ĥ2135/tcp open http ES File Explorer Name Response httpdĥ9777/tcp open http Bukkit JSONAPI httpd for Minecraft game server 3.6.0 or older Nmap done: 1 IP address (1 host up ) scanned in 41.93 seconds To look for any other missing information, ran another nmap scan, this time to check all TCP ports, and found the following additional ports open: Let’s keep this information for now until we find a way to open it and get an interactive shell on the device. Freeciv is a turn-based strategy game for workstations and personal. Interestingly I came across a write-up for a VulnHub machine that mentions that this port is used by ADB (Android Debug Bridge) but, differently from that one, this port is currently filtered. By using port 5555/TCP, an attacker could exploit this vulnerability to conduct.
Freeciv port 5555 exploit android#
Nmap done: 1 IP address (1 host up ) scanned in 11.05 secondsĪs this is my first Android box, started researching about this freeciv service found.

If you know the service/version, please submit the following fingerprint at : All addresses will be marked 'up' and scan times will be slower.
