Pastebin launched a little side project called VERYVIRAL.com, check it out ;-) Want more features on Pastebin? Sign Up, it's FREE!
Guest

Untitled

By: a guest on Aug 29th, 2013  |  syntax: None  |  size: 4.14 KB  |  views: 34  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1. Starting Nmap 6.25 ( http://nmap.org ) at 2013-08-29 10:43 W. Europe Daylight Time
  2.  
  3. NSE: Loaded 106 scripts for scanning.
  4.  
  5. NSE: Script Pre-scanning.
  6.  
  7. Initiating ARP Ping Scan at 10:43
  8.  
  9. Scanning<ip> [1 port]
  10.  
  11. Completed ARP Ping Scan at 10:43, 0.57s elapsed (1 total hosts)
  12.  
  13. Initiating Parallel DNS resolution of 1 host. at 10:43
  14.  
  15. Completed Parallel DNS resolution of 1 host. at 10:43, 0.01s elapsed
  16.  
  17. Initiating SYN Stealth Scan at 10:43
  18.  
  19. Scanning<ip> [1000 ports]
  20.  
  21. Discovered open port 445/tcp on<ip>
  22.  
  23. Discovered open port 199/tcp on<ip>
  24.  
  25. Discovered open port 139/tcp on<ip>
  26.  
  27. Discovered open port 22/tcp on<ip>
  28.  
  29. Discovered open port 10000/tcp on<ip>
  30.  
  31. Discovered open port 631/tcp on<ip>
  32.  
  33. Discovered open port 6566/tcp on<ip>
  34.  
  35. Completed SYN Stealth Scan at 10:43, 0.13s elapsed (1000 total ports)
  36.  
  37. Initiating Service scan at 10:43
  38.  
  39. Scanning 7 services on<ip>
  40.  
  41. Completed Service scan at 10:44, 11.01s elapsed (7 services on 1 host)
  42.  
  43. Initiating OS detection (try #1) against<ip>
  44.  
  45. NSE: Script scanning<ip>.
  46.  
  47. Initiating NSE at 10:44
  48.  
  49. Completed NSE at 10:44, 30.07s elapsed
  50.  
  51. Nmap scan report for<ip>
  52.  
  53. Host is up (0.00010s latency).
  54.  
  55. Not shown: 993 closed ports
  56.  
  57. PORT      STATE SERVICE     VERSION
  58.  
  59. 22/tcp    open  ssh         OpenSSH 5.9 (protocol 2.0)
  60.  
  61. | ssh-hostkey: 1024 76:59:a2:78:0e:d0:47:49:32:7e:f5:ed:f1:b2:f0:a4 (DSA)
  62.  
  63. |_2048 f0:58:39:95:26:2d:6d:ab:81:de:07:43:75:9d:b5:8c (RSA)
  64.  
  65. 139/tcp   open  netbios-ssn Samba smbd 3.X (workgroup: MDVGROUP)
  66.  
  67. 199/tcp   open  smux        Linux SNMP multiplexer
  68.  
  69. 445/tcp   open  netbios-ssn Samba smbd 3.X (workgroup: MDVGROUP)
  70.  
  71. 631/tcp   open  ipp         CUPS 1.4
  72.  
  73. | http-methods: GET HEAD OPTIONS POST PUT
  74.  
  75. | Potentially risky methods: PUT
  76.  
  77. |_See http://nmap.org/nsedoc/scripts/http-methods.html
  78.  
  79. | http-robots.txt: 1 disallowed entry
  80.  
  81. |_/
  82.  
  83. |_http-title: Home - CUPS 1.4.6
  84.  
  85. 6566/tcp  open  tcpwrapped
  86.  
  87. 10000/tcp open  http        MiniServ 1.650 (Webmin httpd)
  88.  
  89. |_http-favicon: Unknown favicon MD5: 9A2006C267DE04E262669D821B57EAD1
  90.  
  91. |_http-git: 0
  92.  
  93. |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
  94.  
  95. | http-robots.txt: 1 disallowed entry
  96.  
  97. |_/
  98.  
  99. |_http-title: Login to Webmin
  100.  
  101. | ndmp-version:
  102.  
  103. |_  ERROR: Failed to get host information from server
  104.  
  105. MAC Address: 00:21:70:B6:05:78 (Dell)
  106.  
  107. Device type: general purpose
  108.  
  109. Running: Linux 2.6.X|3.X
  110.  
  111. OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
  112.  
  113. OS details: Linux 2.6.32 - 3.6
  114.  
  115. Uptime guess: 0.003 days (since Thu Aug 29 10:39:37 2013)
  116.  
  117. Network Distance: 1 hop
  118.  
  119. TCP Sequence Prediction: Difficulty=263 (Good luck!)
  120.  
  121. IP ID Sequence Generation: All zeros
  122.  
  123. Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
  124.  
  125.  
  126.  
  127. Host script results:
  128.  
  129. | nbstat:
  130.  
  131. |   NetBIOS name: LOCALHOST, NetBIOS user: <unknown>, NetBIOS MAC: <unknown>
  132.  
  133. |   Names
  134.  
  135. |     LOCALHOST<00>        Flags: <unique><active>
  136.  
  137. |     LOCALHOST<03>        Flags: <unique><active>
  138.  
  139. |     LOCALHOST<20>        Flags: <unique><active>
  140.  
  141. |     \x01\x02__MSBROWSE__\x02<01>  Flags: <group><active>
  142.  
  143. |     MDVGROUP<1d>         Flags: <unique><active>
  144.  
  145. |     MDVGROUP<1e>         Flags: <group><active>
  146.  
  147. |_    MDVGROUP<00>         Flags: <group><active>
  148.  
  149. | smb-os-discovery:
  150.  
  151. |   OS: Unix (Samba 3.5.14)
  152.  
  153. |   Computer name: localhost
  154.  
  155. |   NetBIOS computer name:
  156.  
  157. |   Domain name:
  158.  
  159. |   FQDN: localhost
  160.  
  161. |_  System time: 2013-08-29T10:44:09+02:00
  162.  
  163. | smb-security-mode:
  164.  
  165. |   Account that was used for smb scripts: guest
  166.  
  167. |   User-level authentication
  168.  
  169. |   SMB Security: Challenge/response passwords supported
  170.  
  171. |_  Message signing disabled (dangerous, but default)
  172.  
  173. |_smbv2-enabled: Server doesn't support SMBv2 protocol
  174.  
  175.  
  176.  
  177. TRACEROUTE
  178.  
  179. HOP RTT     ADDRESS
  180.  
  181. 1   0.10 ms<ip>
  182.  
  183.  
  184.  
  185. NSE: Script Post-scanning.
  186.  
  187. Initiating NSE at 10:44
  188.  
  189. Completed NSE at 10:44, 0.00s elapsed
  190.  
  191. Read data files from: C:\Program Files (x86)\Nmap
  192.  
  193. OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  194.  
  195. Nmap done: 1 IP address (1 host up) scanned in 45.63 seconds
  196.  
  197.            Raw packets sent: 1023 (45.806KB) | Rcvd: 1016 (41.334KB)