79 - Pentesting Finger
Instantly available setup for vulnerability assessment & penetration testing. Run a full pentest from anywhere with 20+ tools & features that go from recon to reporting. We don't replace pentesters - we develop custom tools, detection & exploitation modules to give them back some time to dig deeper, pop shells, and have fun.
Basic Info
The Finger program/service is utilized for retrieving details about computer users. Typically, the information provided includes the user's login name, full name, and, in some cases, additional details. These extra details could encompass the office location and phone number (if available), the time the user logged in, the period of inactivity (idle time), the last instance mail was read by the user, and the contents of the user's plan and project files.
Default port: 79
Enumeration
Banner Grabbing/Basic connection
User enumeration
Alternatively you can use finger-user-enum from pentestmonkey, some examples:
Nmap execute a script for doing using default scripts
Metasploit uses more tricks than Nmap
Shodan
port:79 USER
Command execution
Finger Bounce
Use a system as a finger relay
Instantly available setup for vulnerability assessment & penetration testing. Run a full pentest from anywhere with 20+ tools & features that go from recon to reporting. We don't replace pentesters - we develop custom tools, detection & exploitation modules to give them back some time to dig deeper, pop shells, and have fun.
Last updated