Starting Nmap 6.25 ( http://nmap.org ) at 2013-08-29 10:43 W. Europe Daylight Time NSE: Loaded 106 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 10:43 Scanning [1 port] Completed ARP Ping Scan at 10:43, 0.57s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 10:43 Completed Parallel DNS resolution of 1 host. at 10:43, 0.01s elapsed Initiating SYN Stealth Scan at 10:43 Scanning [1000 ports] Discovered open port 445/tcp on Discovered open port 199/tcp on Discovered open port 139/tcp on Discovered open port 22/tcp on Discovered open port 10000/tcp on Discovered open port 631/tcp on Discovered open port 6566/tcp on Completed SYN Stealth Scan at 10:43, 0.13s elapsed (1000 total ports) Initiating Service scan at 10:43 Scanning 7 services on Completed Service scan at 10:44, 11.01s elapsed (7 services on 1 host) Initiating OS detection (try #1) against NSE: Script scanning. Initiating NSE at 10:44 Completed NSE at 10:44, 30.07s elapsed Nmap scan report for Host is up (0.00010s latency). Not shown: 993 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.9 (protocol 2.0) | ssh-hostkey: 1024 76:59:a2:78:0e:d0:47:49:32:7e:f5:ed:f1:b2:f0:a4 (DSA) |_2048 f0:58:39:95:26:2d:6d:ab:81:de:07:43:75:9d:b5:8c (RSA) 139/tcp open netbios-ssn Samba smbd 3.X (workgroup: MDVGROUP) 199/tcp open smux Linux SNMP multiplexer 445/tcp open netbios-ssn Samba smbd 3.X (workgroup: MDVGROUP) 631/tcp open ipp CUPS 1.4 | http-methods: GET HEAD OPTIONS POST PUT | Potentially risky methods: PUT |_See http://nmap.org/nsedoc/scripts/http-methods.html | http-robots.txt: 1 disallowed entry |_/ |_http-title: Home - CUPS 1.4.6 6566/tcp open tcpwrapped 10000/tcp open http MiniServ 1.650 (Webmin httpd) |_http-favicon: Unknown favicon MD5: 9A2006C267DE04E262669D821B57EAD1 |_http-git: 0 |_http-methods: No Allow or Public header in OPTIONS response (status code 200) | http-robots.txt: 1 disallowed entry |_/ |_http-title: Login to Webmin | ndmp-version: |_ ERROR: Failed to get host information from server MAC Address: 00:21:70:B6:05:78 (Dell) Device type: general purpose Running: Linux 2.6.X|3.X OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 OS details: Linux 2.6.32 - 3.6 Uptime guess: 0.003 days (since Thu Aug 29 10:39:37 2013) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=263 (Good luck!) IP ID Sequence Generation: All zeros Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Host script results: | nbstat: | NetBIOS name: LOCALHOST, NetBIOS user: , NetBIOS MAC: | Names | LOCALHOST<00> Flags: | LOCALHOST<03> Flags: | LOCALHOST<20> Flags: | \x01\x02__MSBROWSE__\x02<01> Flags: | MDVGROUP<1d> Flags: | MDVGROUP<1e> Flags: |_ MDVGROUP<00> Flags: | smb-os-discovery: | OS: Unix (Samba 3.5.14) | Computer name: localhost | NetBIOS computer name: | Domain name: | FQDN: localhost |_ System time: 2013-08-29T10:44:09+02:00 | smb-security-mode: | Account that was used for smb scripts: guest | User-level authentication | SMB Security: Challenge/response passwords supported |_ Message signing disabled (dangerous, but default) |_smbv2-enabled: Server doesn't support SMBv2 protocol TRACEROUTE HOP RTT ADDRESS 1 0.10 ms NSE: Script Post-scanning. Initiating NSE at 10:44 Completed NSE at 10:44, 0.00s elapsed Read data files from: C:\Program Files (x86)\Nmap OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 45.63 seconds Raw packets sent: 1023 (45.806KB) | Rcvd: 1016 (41.334KB)