Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting Nmap 6.25 ( http://nmap.org ) at 2014-09-30 08:18 EDT
- NSE: Loaded 106 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating ARP Ping Scan at 08:18
- Scanning 192.168.1.116 [1 port]
- Completed ARP Ping Scan at 08:18, 0.00s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 08:18
- Completed Parallel DNS resolution of 1 host. at 08:18, 13.00s elapsed
- Initiating SYN Stealth Scan at 08:18
- Scanning 192.168.1.116 [1000 ports]
- Discovered open port 139/tcp on 192.168.1.116
- Discovered open port 135/tcp on 192.168.1.116
- Discovered open port 445/tcp on 192.168.1.116
- Discovered open port 49153/tcp on 192.168.1.116
- Discovered open port 49155/tcp on 192.168.1.116
- Discovered open port 49157/tcp on 192.168.1.116
- Discovered open port 49156/tcp on 192.168.1.116
- Discovered open port 12345/tcp on 192.168.1.116
- Discovered open port 49152/tcp on 192.168.1.116
- Discovered open port 5357/tcp on 192.168.1.116
- Discovered open port 49154/tcp on 192.168.1.116
- Completed SYN Stealth Scan at 08:18, 1.32s elapsed (1000 total ports)
- Initiating Service scan at 08:18
- Scanning 11 services on 192.168.1.116
- Service scan Timing: About 54.55% done; ETC: 08:19 (0:00:41 remaining)
- Completed Service scan at 08:19, 53.57s elapsed (11 services on 1 host)
- Initiating OS detection (try #1) against 192.168.1.116
- NSE: Script scanning 192.168.1.116.
- Initiating NSE at 08:19
- Completed NSE at 08:19, 5.33s elapsed
- Initiating NSE at 08:19
- Completed NSE at 08:19, 0.01s elapsed
- Nmap scan report for 192.168.1.116
- Host is up (0.00042s latency).
- Not shown: 989 closed ports
- PORT STATE SERVICE VERSION
- 135/tcp open msrpc Microsoft Windows RPC
- 139/tcp open netbios-ssn
- 445/tcp open netbios-ssn
- 5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
- |_http-methods: No Allow or Public header in OPTIONS response (status code 503)
- |_http-title: Service Unavailable
- 12345/tcp open netbus NetBus trojan 1.70
- | netbus-info:
- | APPLICATIONS
- | Start
- | NetBus 1.70, by cf (active)
- | Netbus
- | netbus
- | Libraries
- | Program Manager
- | INFO
- | Program Path: C:\Users\cs2lab\Desktop\SecurityPrograms\netbus\Patch.exe
- | Restart persistent: Yes
- | Login ID: cs2lab
- | Clients connected to this host: 1
- | SETUP
- | TCP-port: 12345
- | Log traffic: 0
- | Password:
- | Notify to:
- | Notify from:
- | SMTP-server:
- | VOLUME
- | Wave: 255
- | Synth: 0
- |_ Cd: 0
- 49152/tcp open msrpc Microsoft Windows RPC
- 49153/tcp open msrpc Microsoft Windows RPC
- 49154/tcp open msrpc Microsoft Windows RPC
- 49155/tcp open msrpc Microsoft Windows RPC
- 49156/tcp open msrpc Microsoft Windows RPC
- 49157/tcp open msrpc Microsoft Windows RPC
- MAC Address: 08:00:27:D7:44:51 (Cadmus Computer Systems)
- Device type: general purpose
- Running: Microsoft Windows 7|2008
- OS CPE: cpe:/o:microsoft:windows_7::- cpe:/o:microsoft:windows_7::sp1 cpe:/o:microsoft:windows_server_2008::sp1 cpe:/o:microsoft:windows_8
- OS details: Microsoft Windows 7 SP0 - SP1, Windows Server 2008 SP1, or Windows 8
- Uptime guess: 0.019 days (since Tue Sep 30 07:51:31 2014)
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=259 (Good luck!)
- IP ID Sequence Generation: Incremental
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- Host script results:
- | smb-os-discovery:
- | OS: Windows 7 Professional 7601 Service Pack 1 (Windows 7 Professional 6.1)
- | OS CPE: cpe:/o:microsoft:windows_7::sp1:professional
- | Computer name: cs2lab-PC
- | NetBIOS computer name: CS2LAB-PC
- | Workgroup: WORKGROUP
- |_ System time: 2014-09-30T14:19:10+02:00
- | smb-security-mode:
- | Account that was used for smb scripts: guest
- | User-level authentication
- | SMB Security: Challenge/response passwords supported
- |_ Message signing disabled (dangerous, but default)
- |_smbv2-enabled: Server supports SMBv2 protocol
- TRACEROUTE
- HOP RTT ADDRESS
- 1 0.42 ms 192.168.1.116
- NSE: Script Post-scanning.
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 74.78 seconds
- Raw packets sent: 1125 (50.198KB) | Rcvd: 1018 (41.442KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement