All posts

Scanning and Securing Rsync with Nmap

Rsync answered Nmap’s knock without hesitation. When Nmap scans for running services, it can detect Rsync on TCP port 873. If misconfigured, that Rsync daemon can leak file lists, code repositories, or production assets to anyone who asks. This is not theory. Many exposed Rsync instances are found every week on public networks, often with anonymous read access. To check for Rsync, run: nmap -p 873 --script rsync-info <target> This script identifies the Rsync version and available modules. I

Free White Paper

Infrastructure as Code Security Scanning: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

Rsync answered Nmap’s knock without hesitation.

When Nmap scans for running services, it can detect Rsync on TCP port 873. If misconfigured, that Rsync daemon can leak file lists, code repositories, or production assets to anyone who asks. This is not theory. Many exposed Rsync instances are found every week on public networks, often with anonymous read access.

To check for Rsync, run:

nmap -p 873 --script rsync-info <target>

This script identifies the Rsync version and available modules. If you see unprotected modules, it means the server shares data without authentication. Attackers can use the same simple commands to mirror entire directories.

Continue reading? Get the full guide.

Infrastructure as Code Security Scanning: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Combine Nmap with rsync itself to probe deeper:

rsync rsync://<target>/<module>

If files start listing, your Rsync is exposed. From there, a penetration test may reveal sensitive paths, codebases, or backups.

Securing Rsync starts with disabling anonymous access, enforcing strong authentication, and binding to internal interfaces only. Use firewall rules to limit port 873 to trusted IPs. Keep the daemon updated to patch vulnerabilities.

Nmap plus Rsync is a fast combination for both security testing and exploitation. If you run network-facing Rsync, assume it will be found—scan it before someone else does.

Want to see scanning, detection, and secure configuration in action? Deploy a safe, live environment in minutes at hoop.dev and run it yourself.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts