Advertisement
Guest User

nmap issue

a guest
Nov 1st, 2014
197
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.28 KB | None | 0 0
  1. root@kali:~/pentest# unicornscan 192.168.13.201
  2. TCP open netbios-ssn[ 139] from 192.168.13.201 ttl 128
  3. TCP open microsoft-ds[ 445] from 192.168.13.201 ttl 128
  4. TCP open blackjack[ 1025] from 192.168.13.201 ttl 128
  5. TCP open ms-wbt-server[ 3389] from 192.168.13.201 ttl 128
  6. root@kali:~/pentest# nmap -sT -sV -O 192.168.13.201 --open
  7.  
  8. Starting Nmap 6.40 ( http://nmap.org ) at 2014-11-01 13:09 IST
  9. Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
  10. Nmap done: 1 IP address (0 hosts up) scanned in 0.99 seconds
  11. root@kali:~/pentest# nmap -sT -sV -O 192.168.13.201 --open -e tap0
  12.  
  13. Starting Nmap 6.40 ( http://nmap.org ) at 2014-11-01 13:09 IST
  14. Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
  15. Nmap done: 1 IP address (0 hosts up) scanned in 0.90 seconds
  16. root@kali:~/pentest# nmap -p 80 192.168.13.202-252
  17.  
  18. Starting Nmap 6.40 ( http://nmap.org ) at 2014-11-01 13:41 IST
  19. Nmap scan report for 192.168.13.202
  20. Host is up (0.52s latency).
  21. PORT STATE SERVICE
  22. 80/tcp open http
  23. MAC Address: 00:50:56:AF:1B:C0 (VMware)
  24.  
  25. Nmap scan report for 192.168.13.203
  26. Host is up (0.50s latency).
  27. PORT STATE SERVICE
  28. 80/tcp open http
  29. MAC Address: 00:50:56:AF:60:BE (VMware)
  30.  
  31. Nmap scan report for 192.168.13.204
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement