hacktricks/network-services-pentesting/584-pentesting-afp.md

3.5 KiB

548 - Pentesting Apple Filing Protocol (AFP)

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

Basic Information

Apple Filing Protocol (AFP), zamani ikijulikana kama AppleTalk Filing Protocol, ni protokali maalum ya mtandao iliyojumuishwa ndani ya Apple File Service (AFS). Imeundwa kutoa huduma za faili kwa macOS na Mac OS ya jadi. AFP inajitofautisha kwa kuunga mkono majina ya faili ya Unicode, POSIX na ruhusa za orodha ya udhibiti wa ufikiaji, forks za rasilimali, sifa za ziada zenye majina, na mifumo ya kufunga faili ya kisasa. Ilikuwa protokali kuu ya huduma za faili katika Mac OS 9 na matoleo ya awali.

Default Port: 548

PORT    STATE SERVICE
548/tcp open  afp

Kuhesabu

Kwa kuhesabu huduma za AFP, amri na skripti zifuatazo ni muhimu:

msf> use auxiliary/scanner/afp/afp_server_info
nmap -sV --script "afp-* and not dos and not brute" -p <PORT> <IP>

Scripts and Their Descriptions:

  • afp-ls: Hii script inatumika kuorodhesha volumu na faili za AFP zinazopatikana.
  • afp-path-vuln: Inataja volumu na faili zote za AFP, ikionyesha uwezekano wa udhaifu.
  • afp-serverinfo: Hii inatoa maelezo ya kina kuhusu seva ya AFP.
  • afp-showmount: Inataja sehemu zinazopatikana za AFP pamoja na ACL zao husika.

Brute Force

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}