Advertisement
Guest User

Untitled

a guest
Sep 7th, 2016
658
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.50 KB | None | 0 0
  1. Starting Nmap 7.12 ( https://nmap.org ) at 2016-09-07 22:42 Paris, Madrid (heure d?été)
  2.  
  3. Winpcap present, dynamic linked to: WinPcap version 4.1.3 (packet.dll version 4.1.0.2980), based on libpcap version 1.0 branch 1_0_rel0b (20091008)
  4.  
  5. --------------- Timing report ---------------
  6.  
  7. hostgroups: min 1, max 100000
  8.  
  9. rtt-timeouts: init 1000, min 100, max 10000
  10.  
  11. max-scan-delay: TCP 1000, UDP 1000, SCTP 1000
  12.  
  13. parallelism: min 0, max 0
  14.  
  15. max-retries: 10, host-timeout: 0
  16.  
  17. min-rate: 0, max-rate: 0
  18.  
  19. ---------------------------------------------
  20.  
  21. NSE: Using Lua 5.2.
  22.  
  23. NSE: Arguments from CLI:
  24.  
  25. NSE: Loaded 37 scripts for scanning.
  26.  
  27. NSE: Script Pre-scanning.
  28.  
  29. NSE: Starting runlevel 1 (of 2) scan.
  30.  
  31. Initiating NSE at 22:42
  32.  
  33. Completed NSE at 22:42, 0.00s elapsed
  34.  
  35. NSE: Starting runlevel 2 (of 2) scan.
  36.  
  37. Initiating NSE at 22:42
  38.  
  39. Completed NSE at 22:42, 0.00s elapsed
  40.  
  41. Initiating Ping Scan at 22:42
  42.  
  43. Scanning 136.243.6.3 [4 ports]
  44.  
  45. Packet capture filter (device eth2): dst host 192.168.0.26 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 136.243.6.3)))
  46.  
  47. We got a ping packet back from 136.243.6.3: id = 51604 seq = 0 checksum = 13931
  48.  
  49. Completed Ping Scan at 22:42, 0.27s elapsed (1 total hosts)
  50.  
  51. Overall sending rates: 14.93 packets / s, 567.16 bytes / s.
  52.  
  53. mass_rdns: Using DNS server 89.2.0.1
  54.  
  55. mass_rdns: Using DNS server 89.2.0.2
  56.  
  57. Initiating Parallel DNS resolution of 1 host. at 22:42
  58.  
  59. mass_rdns: 0.62s 0/1 [#: 2, OK: 0, NX: 0, DR: 0, SF: 0, TR: 1]
  60.  
  61. Completed Parallel DNS resolution of 1 host. at 22:42, 0.03s elapsed
  62.  
  63. DNS resolution of 1 IPs took 0.62s. Mode: Async [#: 2, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
  64.  
  65. Initiating UDP Scan at 22:42
  66.  
  67. Scanning chessimo.com (136.243.6.3) [1 port]
  68.  
  69. Packet capture filter (device eth2): dst host 192.168.0.26 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 136.243.6.3)))
  70.  
  71. Discovered open port 123/udp on 136.243.6.3
  72.  
  73. Completed UDP Scan at 22:42, 0.03s elapsed (1 total ports)
  74.  
  75. Overall sending rates: 34.48 packets / s, 2620.69 bytes / s.
  76.  
  77. Initiating Service scan at 22:42
  78.  
  79. Scanning 1 service on chessimo.com (136.243.6.3)
  80.  
  81. Completed Service scan at 22:42, 0.05s elapsed (1 service on 1 host)
  82.  
  83. NSE: Script scanning 136.243.6.3.
  84.  
  85. NSE: Starting runlevel 1 (of 2) scan.
  86.  
  87. Initiating NSE at 22:42
  88.  
  89. NSE: Starting ntp-monlist against 136.243.6.3:123.
  90.  
  91. NSE: UDP 192.168.0.26:55534 > 136.243.6.3:123 | CONNECT
  92.  
  93. NSE: UDP 192.168.0.26:55534 > 136.243.6.3:123 | 00000000: 17 00 03 2a 00 00 00 00 00 00 00 00 00 00 00 00 *
  94.  
  95. 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  96.  
  97. 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  98.  
  99.  
  100.  
  101. NSE: UDP 192.168.0.26:55534 > 136.243.6.3:123 | SEND
  102.  
  103. NSE: UDP 192.168.0.26:55534 > 136.243.6.3:123 | CLOSE
  104.  
  105. NSE: Finished ntp-monlist against 136.243.6.3:123.
  106.  
  107. Completed NSE at 22:42, 5.15s elapsed
  108.  
  109. NSE: Starting runlevel 2 (of 2) scan.
  110.  
  111. Initiating NSE at 22:42
  112.  
  113. Completed NSE at 22:42, 0.00s elapsed
  114.  
  115. Nmap scan report for chessimo.com (136.243.6.3)
  116.  
  117. NSOCK INFO [5.4720s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 8 [136.243.6.3:123]
  118.  
  119. NSOCK INFO [5.4720s] nsock_write(): Write request for 48 bytes to IOD #1 EID 19 [136.243.6.3:123]
  120.  
  121. NSOCK INFO [5.4830s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 19 [136.243.6.3:123]
  122.  
  123. NSOCK INFO [5.4830s] nsock_readbytes(): Read request for 1 bytes from IOD #1 [136.243.6.3:123] EID 26
  124.  
  125. NSOCK INFO [10.4840s] nsock_trace_handler_callback(): Callback: READ TIMEOUT for EID 26 [136.243.6.3:123]
  126.  
  127. NSOCK INFO [10.4840s] nsock_iod_delete(): nsock_iod_delete (IOD #1)
  128.  
  129. Host is up, received echo-reply ttl 52 (0.028s latency).
  130.  
  131. Scanned at 2016-09-07 22:42:46 Paris, Madrid (heure d?été) for 6s
  132.  
  133. PORT STATE SERVICE REASON VERSION
  134.  
  135. 123/udp open ntp udp-response ttl 52 NTP v4 (secondary server)
  136.  
  137. Final times for host: srtt: 28000 rttvar: 21000 to: 112000
  138.  
  139.  
  140.  
  141. NSE: Script Post-scanning.
  142.  
  143. NSE: Starting runlevel 1 (of 2) scan.
  144.  
  145. Initiating NSE at 22:42
  146.  
  147. Completed NSE at 22:42, 0.00s elapsed
  148.  
  149. NSE: Starting runlevel 2 (of 2) scan.
  150.  
  151. Initiating NSE at 22:42
  152.  
  153. Completed NSE at 22:42, 0.00s elapsed
  154.  
  155. Read from C:\Program Files (x86)\Nmap: nmap-payloads nmap-service-probes nmap-services.
  156.  
  157. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  158.  
  159. Nmap done: 1 IP address (1 host up) scanned in 10.52 seconds
  160.  
  161. Raw packets sent: 5 (228B) | Rcvd: 2 (104B
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement