Advertisement
Guest User

twonky srv

a guest
May 3rd, 2014
188
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.13 KB | None | 0 0
  1. sudo nmap -sV -vv -PN 192.xxx.xxx.xxx
  2.  
  3. mike@xxxxxxxxxxxxx-D620:~$ sudo nmap -sV -vv -PN 192.xxx.xxx.xxx
  4. [sudo] password for mike:
  5. Starting Nmap 6.40 ( http://nmap.org ) at 2014-05-01 23:42 CEST NSE:
  6. Loaded 23 scripts for scanning. Initiating ARP Ping Scan at 23:42 Scanning 192.xxx.xxx.xxx [1 port] Completed ARP Ping Scan at 23:42, 0.33s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 23:42 Completed Parallel DNS resolution of 1 host. at 23:42, 0.00s elapsed Initiating SYN Stealth Scan at 23:42 Scanning Mike2 (192.168.xxxxxx) [1000 ports] Discovered open port 445/tcp on Discovered open port 135/tcp on 192.xxx.xxx.xxx Discovered open port 139/tcp on 192.xxx.xxx.xxx Discovered open port 9000/tcp on 192.xxx.xxx.xxx Discovered open port 5357/tcp on 192.xxx.xxx.xxx Discovered open port 2869/tcp on 192.xxx.xxx.xxx Discovered open port 1028/tcp on 192.xxx.xxx.xxx Increasing send delay for 192.xxx.xxx.xxx from 0 to 5 due to 11 out of 31 dropped probes since last increase. Completed SYN Stealth Scan at 23:43, 23.69s elapsed (1000 total ports) Initiating Service scan at 23:43 Scanning 7 services on Mike2 (192.xxx.xxx.xxx) Completed Service scan at 23:44, 53.57s elapsed (7 services on 1 host) NSE: Script scanning 192.xxx.xxx.xxx. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 23:44 Completed NSE at 23:44, 0.06s elapsed Nmap scan report for Mike2 (192.xxx.xxx.xxx) Host is up (0.0012s latency). Scanned at 2014-05-01 23:42:52 CEST for 78s Not shown: 993 filtered ports PORT STATE SERVICE VERSION 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn 445/tcp open netbios-ssn 1028/tcp open msrpc Microsoft Windows RPC 2869/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) 5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) 9000/tcp open cslistener? 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : SF-Port9000-TCP:V=6.40%I=7%D=5/1%Time=5362C000%P=i686-pc-linux-gnu%r(GetRe SF:quest,F01,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/ SF:html;\x20charset=utf-8\r\nContent-Length:\x203587\r\nDate:\x20Thu,\x200 SF:1\x20May\x202014\x2021:43:26\x20GMT\r\nAccept-Ranges:\x20bytes\r\nConne SF:ction:\x20close\r\nEXT:\r\nServer:\x20Windows\x20NT/5\.0,\x20UPnP/1\.0, SF:\x20pvConnect\x20UPnP\x20SDK/1\.0,\x20\x20Twonky\x20UPnP\x20SDK/1\.1\r\ SF:n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01//EN\ SF:"\x20\"http://www\.w3\.org/TR/html4/strict\.dtd\">\r\n<html>\r\n<head>\ SF:r\n\x20\x20\x20<meta\x20http-equiv=\"Content-Type\"\x20content=\"text/h SF:tml;\x20charset=iso-8859-1\">\r\n\x20\x20\x20<meta\x20http-equiv=\"cach SF:e-control\"\x20content=\"no-cache\">\r\n\x20\x20\x20<meta\x20http-equiv SF:=\"pragma\"\x20content=\"no-cache\">\r\n\x20\x20\x20<title>Twonky\x20Se SF:rver</title>\r\n\x20\x20\x20<link\x20rel=\"stylesheet\"\x20href=\"/webc SF:onfig/reset\.css\"\x20type=\"text/css\"\x20media=\"screen\"\x20/>\r\n\x SF:20\x20\x20<link\x20rel=\"stylesheet\"\x20href=\"/webconfig/new\.css\"\x SF:20type=\"text/css\"\x20media=\"screen\"\x20/>\r\n\x20\x20\x20<link\x20r SF:el=\"shortcut\x20icon\"\x20href=\"/webconfig/favicon\.ico\"\x20/>\r\n\x SF:20\x20\x20<script\x20src=\"/webconfig/jquery-1\.5\.1\.min\.js\"\x20type SF:=\"text/javascript\"></script>\r\n")%r(HTTPOptions,FE,"HTTP/1\.1\x20400 SF:\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nC SF:ontent-Length:\x203587\r\nDate:\x20Thu,\x2001\x20May\x202014\x2021:43:2 SF:7\x20GMT\r\nAccept-Ranges:\x20bytes\r\nConnection:\x20close\r\nEXT:\r\n SF:Server:\x20Windows\x20NT/5\.0,\x20UPnP/1\.0,\x20pvConnect\x20UPnP\x20SD SF:K/1\.0,\x20\x20Twonky\x20UPnP\x20SDK/1\.1\r\n\r\n")%r(RTSPRequest,FE,"H SF:TTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20cha SF:rset=utf-8\r\nContent-Length:\x203587\r\nDate:\x20Thu,\x2001\x20May\x20 SF:2014\x2021:43:27\x20GMT\r\nAccept-Ranges:\x20bytes\r\nConnection:\x20cl SF:ose\r\nEXT:\r\nServer:\x20Windows\x20NT/5\.0,\x20UPnP/1\.0,\x20pvConnec SF:t\x20UPnP\x20SDK/1\.0,\x20\x20Twonky\x20UPnP\x20SDK/1\.1\r\n\r\n")%r(Fo SF:urOhFourRequest,17F,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Type:\ SF:x20text/html;\x20charset=utf-8\r\nContent-Length:\x20132\r\nDate:\x20Th SF:u,\x2001\x20May\x202014\x2021:43:39\x20GMT\r\nAccept-Ranges:\x20bytes\r SF:\nConnection:\x20close\r\nEXT:\r\nServer:\x20Windows\x20NT/5\.0,\x20UPn SF:P/1\.0,\x20pvConnect\x20UPnP\x20SDK/1\.0,\x20\x20Twonky\x20UPnP\x20SDK/ SF:1\.1\r\n\r\n<HTML><HEAD><TITLE>404\x20Not\x20Found</TITLE></HEAD><BODY> SF:<H1>Not\x20Found</H1>The\x20requested\x20URL\x20was\x20not\x20found\x20 SF:on\x20this\x20server\.</BODY></HTML>"); MAC Address: xxxxxxxxxx (Giga-byte Technology Co.) Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows Read data files from: /usr/bin/../share/nmap Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 78.80 seconds Raw packets sent: 3008 (132.336KB) | Rcvd: 29 (1.260KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement