It is a good idea to start a port scan on the server. A very basic fast way is:
nmap -sS <ip/fqdn>
To get a bit more information use flags for default scripts (-sC
), enumerate versions (-sV
), output all formats (-oA
) at put it in a file called defualt
under the directory nmap
:
nmap -sC -sV -oA nmap/default <ip/fqdn>
If we see things that might be exploitable, use searchsploit, i.e. for vsftpd:
searchsploit vsftpd