1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162
| kali@kali:~$ nmap -T4 -A -vvv -p- 192.168.1.19 Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-06 07:57 EST NSE: Loaded 151 scripts for scanning. NSE: Script Pre-scanning. NSE: Starting runlevel 1 (of 3) scan. Initiating NSE at 07:57 Completed NSE at 07:57, 0.00s elapsed NSE: Starting runlevel 2 (of 3) scan. Initiating NSE at 07:57 Completed NSE at 07:57, 0.00s elapsed NSE: Starting runlevel 3 (of 3) scan. Initiating NSE at 07:57 Completed NSE at 07:57, 0.00s elapsed Initiating Ping Scan at 07:57 Scanning 192.168.1.19 [2 ports] Completed Ping Scan at 07:57, 0.00s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 07:57 Completed Parallel DNS resolution of 1 host. at 07:57, 6.52s elapsed DNS resolution of 1 IPs took 6.52s. Mode: Async [#: 2, OK: 0, NX: 1, DR: 0, SF: 0, TR: 3, CN: 0] Initiating Connect Scan at 07:57 Scanning 192.168.1.19 [65535 ports] Discovered open port 3306/tcp on 192.168.1.19 Discovered open port 21/tcp on 192.168.1.19 Discovered open port 22/tcp on 192.168.1.19 Discovered open port 139/tcp on 192.168.1.19 Discovered open port 53/tcp on 192.168.1.19 Discovered open port 80/tcp on 192.168.1.19 Connect Scan Timing: About 22.87% done; ETC: 08:00 (0:01:45 remaining) Connect Scan Timing: About 41.39% done; ETC: 08:00 (0:01:26 remaining) Discovered open port 12380/tcp on 192.168.1.19 Connect Scan Timing: About 60.60% done; ETC: 08:00 (0:00:59 remaining) Discovered open port 666/tcp on 192.168.1.19 Completed Connect Scan at 08:00, 132.12s elapsed (65535 total ports) Initiating Service scan at 08:00 Scanning 8 services on 192.168.1.19 Completed Service scan at 08:00, 11.19s elapsed (8 services on 1 host) NSE: Script scanning 192.168.1.19. NSE: Starting runlevel 1 (of 3) scan. Initiating NSE at 08:00 NSE: [ftp-bounce 192.168.1.19:21] PORT response: 500 Illegal PORT command. NSE Timing: About 99.91% done; ETC: 08:00 (0:00:00 remaining) Completed NSE at 08:00, 31.04s elapsed NSE: Starting runlevel 2 (of 3) scan. Initiating NSE at 08:00 Completed NSE at 08:00, 0.04s elapsed NSE: Starting runlevel 3 (of 3) scan. Initiating NSE at 08:00 Completed NSE at 08:00, 0.00s elapsed Nmap scan report for 192.168.1.19 Host is up, received syn-ack (0.0018s latency). Scanned at 2020-03-06 07:57:52 EST for 181s Not shown: 65523 filtered ports Reason: 65523 no-responses PORT STATE SERVICE REASON VERSION 20/tcp closed ftp-data conn-refused 21/tcp open ftp syn-ack vsftpd 2.0.8 or later | ftp-anon: Anonymous FTP login allowed (FTP code 230) |_Can't get directory listing: PASV failed: 550 Permission denied. | ftp-syst: | STAT: | FTP server status: | Connected to 192.168.1.20 | Logged in as ftp | TYPE: ASCII | No session bandwidth limit | Session timeout in seconds is 300 | Control connection is plain text | Data connections will be plain text | At session startup, client count was 2 | vsFTPd 3.0.3 - secure, fast, stable |_End of status 22/tcp open ssh syn-ack OpenSSH 7.2p2 Ubuntu 4 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 2048 81:21:ce:a1:1a:05:b1:69:4f:4d:ed:80:28:e8:99:05 (RSA) | ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDc/xrBbi5hixT2B19dQilbbrCaRllRyNhtJcOzE8x0BM1ow9I80RcU7DtajyqiXXEwHRavQdO+/cHZMyOiMFZG59OCuIouLRNoVO58C91gzDgDZ1fKH6BDg+FaSz+iYZbHg2lzaMPbRje6oqNamPR4QGISNUpxZeAsQTLIiPcRlb5agwurovTd3p0SXe0GknFhZwHHvAZWa2J6lHE2b9K5IsSsDzX2WHQ4vPb+1DzDHV0RTRVUGviFvUX1X5tVFvVZy0TTFc0minD75CYClxLrgc+wFLPcAmE2C030ER/Z+9umbhuhCnLkLN87hlzDSRDPwUjWr+sNA3+7vc/xuZul | 256 5b:a5:bb:67:91:1a:51:c2:d3:21:da:c0:ca:f0:db:9e (ECDSA) | ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBNQB5n5kAZPIyHb9lVx1aU0fyOXMPUblpmB8DRjnP8tVIafLIWh54wmTFVd3nCMr1n5IRWiFeX1weTBDSjjz0IY= | 256 6d:01:b7:73:ac:b0:93:6f:fa:b9:89:e6:ae:3c:ab:d3 (ED25519) |_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ9wvrF4tkFMApswOmWKpTymFjkaiIoie4QD0RWOYnny 53/tcp open domain syn-ack dnsmasq 2.75 | dns-nsid: |_ bind.version: dnsmasq-2.75 80/tcp open http syn-ack PHP cli server 5.5 or later | http-methods: |_ Supported Methods: GET HEAD POST OPTIONS |_http-title: Site doesn't have a title (text/html; charset=UTF-8). 123/tcp closed ntp conn-refused 137/tcp closed netbios-ns conn-refused 138/tcp closed netbios-dgm conn-refused 139/tcp open netbios-ssn syn-ack Samba smbd 4.3.9-Ubuntu (workgroup: WORKGROUP) 666/tcp open tcpwrapped syn-ack 3306/tcp open mysql syn-ack MySQL 5.7.12-0ubuntu1 | mysql-info: | Protocol: 10 | Version: 5.7.12-0ubuntu1 | Thread ID: 10 | Capabilities flags: 63487 | Some Capabilities: IgnoreSpaceBeforeParenthesis, IgnoreSigpipes, Support41Auth, ConnectWithDatabase, SupportsCompression, SupportsTransactions, LongPassword, ODBCClient, LongColumnFlag, Speaks41ProtocolOld, FoundRows, InteractiveClient, Speaks41ProtocolNew, SupportsLoadDataLocal, DontAllowDatabaseTableColumn, SupportsMultipleResults, SupportsAuthPlugins, SupportsMultipleStatments | Status: Autocommit | Salt: e~\x1C\x1EUPi .vp;2F0oI#IW |_ Auth Plugin Name: mysql_native_password 12380/tcp open http syn-ack Apache httpd 2.4.18 ((Ubuntu)) | http-methods: |_ Supported Methods: GET HEAD POST OPTIONS |_http-server-header: Apache/2.4.18 (Ubuntu) |_http-title: Tim, we need to-do better next year for Initech Service Info: Host: RED; OS: Linux; CPE: cpe:/o:linux:linux_kernel
Host script results: |_clock-skew: mean: 7h59m58s, deviation: 1s, median: 7h59m58s | nbstat: NetBIOS name: RED, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown) | Names: | RED<00> Flags: <unique><active> | RED<03> Flags: <unique><active> | RED<20> Flags: <unique><active> | \x01\x02__MSBROWSE__\x02<01> Flags: <group><active> | WORKGROUP<00> Flags: <group><active> | WORKGROUP<1d> Flags: <unique><active> | WORKGROUP<1e> Flags: <group><active> | Statistics: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |_ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | p2p-conficker: | Checking for Conficker.C or higher... | Check 1 (port 15772/tcp): CLEAN (Timeout) | Check 2 (port 4705/tcp): CLEAN (Timeout) | Check 3 (port 17120/udp): CLEAN (Failed to receive data) | Check 4 (port 35387/udp): CLEAN (Failed to receive data) |_ 0/4 checks are positive: Host is CLEAN or ports are blocked | smb-os-discovery: | OS: Windows 6.1 (Samba 4.3.9-Ubuntu) | Computer name: red | NetBIOS computer name: RED\x00 | Domain name: \x00 | FQDN: red |_ System time: 2020-03-06T21:00:22+00:00 | smb-security-mode: | account_used: guest | authentication_level: user | challenge_response: supported |_ message_signing: disabled (dangerous, but default) | smb2-security-mode: | 2.02: |_ Message signing enabled but not required | smb2-time: | date: 2020-03-06T21:00:21 |_ start_date: N/A
NSE: Script Post-scanning. NSE: Starting runlevel 1 (of 3) scan. Initiating NSE at 08:00 Completed NSE at 08:00, 0.00s elapsed NSE: Starting runlevel 2 (of 3) scan. Initiating NSE at 08:00 Completed NSE at 08:00, 0.00s elapsed NSE: Starting runlevel 3 (of 3) scan. Initiating NSE at 08:00 Completed NSE at 08:00, 0.00s elapsed Read data files from: /usr/bin/../share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 181.33 seconds
|