R-Sync 873
R-Sync (Port 873) Enumeration and Scanning Commands
Step 1: Define the Target IP
Replace <target_ip>
with the actual IP address of the target.
# Define the target IP
export TARGET_IP="192.168.1.100"
Step 2: Perform an Nmap Scan for R-Sync Services
Use the following command to identify services and vulnerabilities:
nmap -p 873 -sV --script rsync-list-modules <target_ip>
Explanation:
-p 873
: Specifies port 873 for R-Sync.-sV
: Detects the service version.--script rsync-list-modules
: Uses an NSE script to list available R-Sync modules.
Step 3: Enumerate R-Sync Modules Using rsync Command
The rsync
tool can be used to list available modules on the target server.
rsync --list-only rsync://<target_ip>/
Example:
rsync --list-only rsync://192.168.1.100/
Step 4: Test File Synchronization (If Applicable)
After identifying available modules, you can test file synchronization. Replace <module>
with the identified module name.
rsync -av rsync://<target_ip>/<module>/ ./local_directory
Example:
rsync -av rsync://192.168.1.100/public/ ./local_directory
Explanation:
-a
: Archive mode to preserve file attributes.-v
: Verbose output../local_directory
: Specifies the destination directory.
Additional Notes
Ensure you have the necessary permissions to access the R-Sync modules.
R-Sync can expose sensitive information if misconfigured.
Explore other
rsync
commands and tools for further testing and exploitation.
Last updated