# Enumeration

![](/files/1iaQeC0FL8z2UN75rejz)

When I first ran the nmap scan i only discovered 2 ports - 2222 -ssh banana studio and port 5555 which was filtered. Which means I could not connect to it. So I widened the ths scan and found port 59777

![](/files/1UQVabB2GeIvdLK0ul6Z)

![](/files/51TufwWTYtsAIUh2gpK6)

I googled the port and found there was vulnerability on it. Specifically a script allowing me to read files.

I saved the script to a python file by typing "vi exploit.py" after copying it from the exploit db, then i used cat to see the script in the terminal and see what commands I could find. Which should me a few but i decided to start with "getDeviceInfo" as it could allow me to avoid any unnecessary commands.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://oklencodes.gitbook.io/untitled/ctfs/explore-android-box/enumeration.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
