Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- $ nmap -p0- -v -A -T4 10.0.0.111
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-04-18 07:23 EDT
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 07:23
- Completed NSE at 07:23, 0.00s elapsed
- Initiating NSE at 07:23
- Completed NSE at 07:23, 0.00s elapsed
- Initiating Ping Scan at 07:23
- Scanning 10.0.0.111 [2 ports]
- Completed Ping Scan at 07:23, 0.00s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 07:23
- Completed Parallel DNS resolution of 1 host. at 07:23, 0.00s elapsed
- Initiating Connect Scan at 07:23
- Scanning 10.0.0.111 [65536 ports]
- Discovered open port 135/tcp on 10.0.0.111
- Discovered open port 3306/tcp on 10.0.0.111
- Discovered open port 80/tcp on 10.0.0.111
- Discovered open port 445/tcp on 10.0.0.111
- Discovered open port 3389/tcp on 10.0.0.111
- Discovered open port 139/tcp on 10.0.0.111
- Discovered open port 49669/tcp on 10.0.0.111
- Discovered open port 49846/tcp on 10.0.0.111
- Discovered open port 49670/tcp on 10.0.0.111
- Discovered open port 636/tcp on 10.0.0.111
- Connect Scan Timing: About 23.38% done; ETC: 07:26 (0:01:42 remaining)
- Discovered open port 3269/tcp on 10.0.0.111
- Discovered open port 33060/tcp on 10.0.0.111
- Discovered open port 49666/tcp on 10.0.0.111
- Discovered open port 593/tcp on 10.0.0.111
- Connect Scan Timing: About 59.49% done; ETC: 07:25 (0:00:42 remaining)
- Discovered open port 3268/tcp on 10.0.0.111
- Discovered open port 464/tcp on 10.0.0.111
- Discovered open port 9389/tcp on 10.0.0.111
- Discovered open port 5985/tcp on 10.0.0.111
- Discovered open port 88/tcp on 10.0.0.111
- Discovered open port 49667/tcp on 10.0.0.111
- Discovered open port 389/tcp on 10.0.0.111
- Discovered open port 49672/tcp on 10.0.0.111
- Completed Connect Scan at 07:25, 88.41s elapsed (65536 total ports)
- Initiating Service scan at 07:25
- Scanning 22 services on 10.0.0.111
- Completed Service scan at 07:26, 56.14s elapsed (22 services on 1 host)
- NSE: Script scanning 10.0.0.111.
- Initiating NSE at 07:26
- Completed NSE at 07:27, 91.56s elapsed
- Initiating NSE at 07:27
- Completed NSE at 07:27, 0.01s elapsed
- Nmap scan report for 10.0.0.111
- Host is up (0.0045s latency).
- Not shown: 65514 filtered ports
- PORT STATE SERVICE VERSION
- 80/tcp open http Microsoft IIS httpd 10.0
- | http-cookie-flags:
- | /:
- | PHPSESSID:
- |_ httponly flag not set
- | http-methods:
- | Supported Methods: OPTIONS TRACE GET HEAD POST
- |_ Potentially risky methods: TRACE
- |_http-server-header: Microsoft-IIS/10.0
- |_http-title: Site doesn't have a title (text/html; charset=UTF-8).
- 88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2019-04-18 11:25:29Z)
- 135/tcp open msrpc Microsoft Windows RPC
- 139/tcp open netbios-ssn Microsoft Windows netbios-ssn
- 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: WIT-D03.local, Site: Default-First-Site-Name)
- 445/tcp open microsoft-ds?
- 464/tcp open kpasswd5?
- 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
- 636/tcp open tcpwrapped
- 3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: WIT-D03.local, Site: Default-First-Site-Name)
- 3269/tcp open tcpwrapped
- 3306/tcp open mysql MySQL (unauthorized)
- 3389/tcp open ms-wbt-server Microsoft Terminal Services
- | ssl-cert: Subject: commonName=Joey03.GROEN.WIT-D03.local
- | Issuer: commonName=Joey03.GROEN.WIT-D03.local
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-04-04T10:43:34
- | Not valid after: 2019-10-04T10:43:34
- | MD5: cbe0 4da7 256c 3a63 3514 004b 9245 2bfd
- |_SHA-1: f588 12c5 e93f c420 ed11 ee5a 3afc 246f 56ae 99d4
- |_ssl-date: 2019-04-18T11:26:20+00:00; 0s from scanner time.
- 5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
- |_http-server-header: Microsoft-HTTPAPI/2.0
- |_http-title: Not Found
- 9389/tcp open mc-nmf .NET Message Framing
- 33060/tcp open mysqlx?
- 49666/tcp open msrpc Microsoft Windows RPC
- 49667/tcp open msrpc Microsoft Windows RPC
- 49669/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
- 49670/tcp open msrpc Microsoft Windows RPC
- 49672/tcp open msrpc Microsoft Windows RPC
- 49846/tcp open msrpc Microsoft Windows RPC
- Service Info: Host: JOEY03; OS: Windows; CPE: cpe:/o:microsoft:windows
- Host script results:
- | nbstat: NetBIOS name: JOEY03, NetBIOS user: <unknown>, NetBIOS MAC: 00:0d:3a:45:7b:7d (Microsoft)
- | Names:
- | GROEN<00> Flags: <group><active>
- | JOEY03<00> Flags: <unique><active>
- | GROEN<1c> Flags: <group><active>
- |_ JOEY03<20> Flags: <unique><active>
- | smb2-security-mode:
- | 2.02:
- |_ Message signing enabled and required
- | smb2-time:
- | date: 2019-04-18 07:26:20
- |_ start_date: 2019-04-18 06:56:28
- NSE: Script Post-scanning.
- Initiating NSE at 07:27
- Completed NSE at 07:27, 0.00s elapsed
- Initiating NSE at 07:27
- Completed NSE at 07:27, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 238.28 seconds
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement