Hello to all and all, I join you here with my NMAP PS4 Port TCP / UDP research... I put a link to the CVE (FreeBSD) for this version.
I continue to struggle to find a solution to bypass firewall.. if you are a PlayStation 4 Developer and you have ideas to share let me know..
I hope to work with you.. and here is an interesting discovery.
My research is available here: nmap ps4.txt
I continue to struggle to find a solution to bypass firewall.. if you are a PlayStation 4 Developer and you have ideas to share let me know..
I hope to work with you.. and here is an interesting discovery.
My research is available here: nmap ps4.txt
Code:
Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-24 05:18 UTC
Nmap scan report for 192.168.0.21
Host is up (0.0024s latency).
Not shown: 1998 closed ports
PORT STATE SERVICE
68/udp open|filtered dhcpc
5353/udp open zeroconf
=========================================================================
PORT STATE SERVICE VERSION
68/udp open|filtered dhcpc
5353/udp open mdns DNS-based service discovery
17417/udp open|filtered unknown
17592/udp open|filtered unknown
48455/udp open|filtered unknown
=========================================================================
PROTOCOL STATE SERVICE
1 open icmp
6 open tcp
17 open udp
=========================================================================
Host is up (0.0045s latency).
All 1000 scanned ports on 192.168.0.21 are closed
MAC Address: 2C:CC:44:73:63:E1 (Sony Interactive Entertainment)
Device type: firewall|general purpose|game console
Running: Cisco AsyncOS 7.X, FreeBSD 10.X|6.X|7.X|8.X|9.X, Sony embedded
OS CPE: cpe:/h:cisco:ironport_c650 cpe:/o:cisco:asyncos:7.0.1 cpe:/o:freebsd:freebsd:10.2 cpe:/h:sony:playstation_4 cpe:/o:freebsd:freebsd:6.2 cpe:/o:freebsd:freebsd:7.0:beta2 cpe:/o:freebsd:freebsd:8.2 cpe:/o:freebsd:freebsd:9.1
Too many fingerprints match this host to give specific OS details
===========================================================================
https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/freebsd
===========================================================================
9295/tcp open armcenterhttps
41800/tcp open unknown
============================================================================