2049 - Pentesting NFS Service
Basic Information
It is a client/server system that allows users to access files across a network and treat them as if they resided in a local file directory.
Default port: 2049
Enumeration
Useful nmap scripts
Useful metasploit modules
Mounting
To know which folder has the server available to mount you an ask it using:
Then mount it using:
You should specify to use version 2 because it doesn't have any authentication or authorization.
Example:
Permissions
If you mount a folder which contains files or folders only accesible by some user (by UID). You can create locally a user with that UID and using that user you will be able to access the file/folder.
NSFShell
To easily list, mount and change UID and GID to have access to files you can use nfsshell.
Config files
Privilege Escalation using NFS misconfigurations
NFS no_root_squash and no_all_squash privilege escalation
HackTricks Automatic Commands
Last updated