nmap is telling you that port 81 is open, not what service is running on port 81 . hosts2-ns is simply the name nmap has it referenced as (possibly from the /etc/services file on the machine you are running nmap from). The real question is why is it open, and what is behind it. There are a few options:, 81 /tcp open hosts2-ns 5880/tcp open unknown 8201/tcp open trivnet2 HTTP/1.1 200 OK Content-Type: text/html Accept-Ranges: bytes ETag: 1800253254 Last-Modified: Mon, 29 Feb 2016 07:23:52 GMT Content-Length: 3940 Date: Wed, 28 Jun 2017 12:13:26 GMT Server: lighttpd/1.4.28 HTTP/1.1 200 OK Server: vshttpd Cache-Control: no-cache Pragma: no-cache, 6/13/2003 · An exploit allows an attacker to take advantage of known weaknesses in operating systems or applications to gain access to a server. Exploits can be performed in many ways, however, it is becoming increasingly common for an exploit to be written into a software application that can be easily pointed at any server.
Upload the appropriate exploit code to the Intranet server 5. Use exploit to enable compromise the server Phase II Impersonate admin From my previous dealings with the Help Desk via email I have the name and email address of the manager of the … 81 /tcp open hosts2 – ns 135/tcp open epmap 139/tcp open netbios – ssn 443/tcp open https …
hosts2-ns( 81 /tcp): WebDAV The WebDAV module is enabled on the port 81 on the device (i.e. HMP internal content server) in order to allow pushing content onto HMP.
5/5/2018 · 445/tcp open microsoft-ds. 808/tcp open ccproxy-http. 1433/tcp open ms-sql-s. Nmap done: 1 IP address (1 host up) scanned in 46.37 seconds. Alright we have an ftp server, a website, port 81 .
81 /tcp open hosts2-ns. 140/tcp filtered unknown. 443/tcp open https. Then, I created a new Inbound rule to block access to Port 23 and the scan on WAN IP result is as follows: PORT STATE SERVICE. 23/tcp filtered telnet. 80/tcp open http. 81 /tcp open hosts2-ns. 443/tcp open https.