Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@kali:~/pentest# unicornscan 192.168.13.201
- TCP open netbios-ssn[ 139] from 192.168.13.201 ttl 128
- TCP open microsoft-ds[ 445] from 192.168.13.201 ttl 128
- TCP open blackjack[ 1025] from 192.168.13.201 ttl 128
- TCP open ms-wbt-server[ 3389] from 192.168.13.201 ttl 128
- root@kali:~/pentest# nmap -sT -sV -O 192.168.13.201 --open
- Starting Nmap 6.40 ( http://nmap.org ) at 2014-11-01 13:09 IST
- Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
- Nmap done: 1 IP address (0 hosts up) scanned in 0.99 seconds
- root@kali:~/pentest# nmap -sT -sV -O 192.168.13.201 --open -e tap0
- Starting Nmap 6.40 ( http://nmap.org ) at 2014-11-01 13:09 IST
- Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
- Nmap done: 1 IP address (0 hosts up) scanned in 0.90 seconds
- root@kali:~/pentest# nmap -p 80 192.168.13.202-252
- Starting Nmap 6.40 ( http://nmap.org ) at 2014-11-01 13:41 IST
- Nmap scan report for 192.168.13.202
- Host is up (0.52s latency).
- PORT STATE SERVICE
- 80/tcp open http
- MAC Address: 00:50:56:AF:1B:C0 (VMware)
- Nmap scan report for 192.168.13.203
- Host is up (0.50s latency).
- PORT STATE SERVICE
- 80/tcp open http
- MAC Address: 00:50:56:AF:60:BE (VMware)
- Nmap scan report for 192.168.13.204
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement