Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-11 10:22 Romance Standard Time
- NSE: Loaded 151 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 10:22
- Completed NSE at 10:22, 0.00s elapsed
- Initiating NSE at 10:22
- Completed NSE at 10:22, 0.00s elapsed
- Initiating NSE at 10:22
- Completed NSE at 10:22, 0.00s elapsed
- Initiating ARP Ping Scan at 10:22
- Nmap scan report for 192.168.1.0 [host down]
- P Ping Scan at 10:22, 2.86s elapsed (255 total hosts)
- Initiating Parallel DNS resolution of 255 hosts. at 10:22
- Completed Parallel DNS resolution of 255 hosts. at 10:22, 0.03s elapsed
- Nmap scan report for 192.168.1.3 [host down]
- Nmap scan report for 192.168.1.4 [host down]
- Nmap scan report for 192.168.1.5 [host down]
- Nmap scan report for 192.168.1.6 [host down]
- Nmap scan report for 192.168.1.7 [host down]
- Nmap scan report for 192.168.1.8 [host down]
- Nmap scan report for 192.168.1.9 [host down]
- Nmap scan report for 192.168.1.10 [host down]
- Nmap scan report for 192.168.1.11 [host down]
- Nmap scan report for 192.168.1.12 [host down]
- Nmap scan report for 192.168.1.13 [host down]
- Nmap scan report for 192.168.1.14 [host down]
- Nmap scan report for 192.168.1.15 [host down]
- Nmap scan report for 192.168.1.16 [host down]
- Nmap scan report for 192.168.1.17 [host down]
- Nmap scan report for 192.168.1.18 [host down]
- Nmap scan report for 192.168.1.19 [host down]
- Nmap scan report for 192.168.1.20 [host down]
- Nmap scan report for 192.168.1.21 [host down]
- Nmap scan report for 192.168.1.22 [host down]
- Nmap scan report for 192.168.1.23 [host down]
- Nmap scan report for 192.168.1.24 [host down]
- Nmap scan report for 192.168.1.25 [host down]
- Nmap scan report for 192.168.1.26 [host down]
- Nmap scan report for 192.168.1.27 [host down]
- Nmap scan report for 192.168.1.28 [host down]
- Nmap scan report for 192.168.1.29 [host down]
- Nmap scan report for 192.168.1.30 [host down]
- Nmap scan report for 192.168.1.31 [host down]
- Nmap scan report for 192.168.1.32 [host down]
- Nmap scan report for 192.168.1.33 [host down]
- Nmap scan report for 192.168.1.34 [host down]
- Nmap scan report for 192.168.1.35 [host down]
- Nmap scan report for 192.168.1.36 [host down]
- Nmap scan report for 192.168.1.37 [host down]
- Nmap scan report for 192.168.1.38 [host down]
- Nmap scan report for 192.168.1.39 [host down]
- Nmap scan report for 192.168.1.40 [host down]
- Nmap scan report for 192.168.1.41 [host down]
- Nmap scan report for 192.168.1.42 [host down]
- Nmap scan report for 192.168.1.43 [host down]
- Nmap scan report for 192.168.1.44 [host down]
- Nmap scan report for 192.168.1.45 [host down]
- Nmap scan report for 192.168.1.46 [host down]
- Nmap scan report for 192.168.1.47 [host down]
- Nmap scan report for 192.168.1.48 [host down]
- Nmap scan report for 192.168.1.49 [host down]
- Nmap scan report for 192.168.1.50 [host down]
- Nmap scan report for 192.168.1.51 [host down]
- Nmap scan report for 192.168.1.52 [host down]
- Nmap scan report for 192.168.1.53 [host down]
- Nmap scan report for 192.168.1.54 [host down]
- Nmap scan report for 192.168.1.55 [host down]
- Nmap scan report for 192.168.1.56 [host down]
- Nmap scan report for 192.168.1.57 [host down]
- Nmap scan report for 192.168.1.58 [host down]
- Nmap scan report for 192.168.1.59 [host down]
- Nmap scan report for 192.168.1.60 [host down]
- Nmap scan report for 192.168.1.61 [host down]
- Nmap scan report for 192.168.1.62 [host down]
- Nmap scan report for 192.168.1.63 [host down]
- Nmap scan report for 192.168.1.64 [host down]
- Nmap scan report for 192.168.1.65 [host down]
- Nmap scan report for 192.168.1.66 [host down]
- Nmap scan report for 192.168.1.67 [host down]
- Nmap scan report for 192.168.1.68 [host down]
- Nmap scan report for 192.168.1.69 [host down]
- Nmap scan report for 192.168.1.70 [host down]
- Nmap scan report for 192.168.1.71 [host down]
- Nmap scan report for 192.168.1.72 [host down]
- Nmap scan report for 192.168.1.73 [host down]
- Nmap scan report for 192.168.1.74 [host down]
- Nmap scan report for 192.168.1.75 [host down]
- Nmap scan report for 192.168.1.76 [host down]
- Nmap scan report for 192.168.1.77 [host down]
- Nmap scan report for 192.168.1.78 [host down]
- Nmap scan report for 192.168.1.79 [host down]
- Nmap scan report for 192.168.1.80 [host down]
- Nmap scan report for 192.168.1.81 [host down]
- Nmap scan report for 192.168.1.82 [host down]
- Nmap scan report for 192.168.1.83 [host down]
- Nmap scan report for 192.168.1.84 [host down]
- Nmap scan report for 192.168.1.85 [host down]
- Nmap scan report for 192.168.1.86 [host down]
- Nmap scan report for 192.168.1.87 [host down]
- Nmap scan report for 192.168.1.88 [host down]
- Nmap scan report for 192.168.1.89 [host down]
- Nmap scan report for 192.168.1.90 [host down]
- Nmap scan report for 192.168.1.91 [host down]
- Nmap scan report for 192.168.1.92 [host down]
- Nmap scan report for 192.168.1.93 [host down]
- Nmap scan report for 192.168.1.94 [host down]
- Nmap scan report for 192.168.1.95 [host down]
- Nmap scan report for 192.168.1.96 [host down]
- Nmap scan report for 192.168.1.97 [host down]
- Nmap scan report for 192.168.1.98 [host down]
- Nmap scan report for 192.168.1.99 [host down]
- Nmap scan report for 192.168.1.104 [host down]
- Nmap scan report for 192.168.1.105 [host down]
- Nmap scan report for 192.168.1.106 [host down]
- Nmap scan report for 192.168.1.107 [host down]
- Nmap scan report for 192.168.1.108 [host down]
- Nmap scan report for 192.168.1.109 [host down]
- Nmap scan report for 192.168.1.110 [host down]
- Nmap scan report for 192.168.1.111 [host down]
- Nmap scan report for 192.168.1.112 [host down]
- Nmap scan report for 192.168.1.113 [host down]
- Nmap scan report for 192.168.1.114 [host down]
- Nmap scan report for 192.168.1.115 [host down]
- Nmap scan report for 192.168.1.116 [host down]
- Nmap scan report for 192.168.1.117 [host down]
- Nmap scan report for 192.168.1.118 [host down]
- Nmap scan report for 192.168.1.119 [host down]
- Nmap scan report for 192.168.1.120 [host down]
- Nmap scan report for 192.168.1.121 [host down]
- Nmap scan report for 192.168.1.122 [host down]
- Nmap scan report for 192.168.1.123 [host down]
- Nmap scan report for 192.168.1.124 [host down]
- Nmap scan report for 192.168.1.125 [host down]
- Nmap scan report for 192.168.1.126 [host down]
- Nmap scan report for 192.168.1.127 [host down]
- Nmap scan report for 192.168.1.128 [host down]
- Nmap scan report for 192.168.1.129 [host down]
- Nmap scan report for 192.168.1.130 [host down]
- Nmap scan report for 192.168.1.131 [host down]
- Nmap scan report for 192.168.1.132 [host down]
- Nmap scan report for 192.168.1.133 [host down]
- Nmap scan report for 192.168.1.134 [host down]
- Nmap scan report for 192.168.1.135 [host down]
- Nmap scan report for 192.168.1.136 [host down]
- Nmap scan report for 192.168.1.137 [host down]
- Nmap scan report for 192.168.1.138 [host down]
- Nmap scan report for 192.168.1.139 [host down]
- Nmap scan report for 192.168.1.140 [host down]
- Nmap scan report for 192.168.1.141 [host down]
- Nmap scan report for 192.168.1.142 [host down]
- Nmap scan report for 192.168.1.143 [host down]
- Nmap scan report for 192.168.1.144 [host down]
- Nmap scan report for 192.168.1.145 [host down]
- Nmap scan report for 192.168.1.146 [host down]
- Nmap scan report for 192.168.1.147 [host down]
- Nmap scan report for 192.168.1.148 [host down]
- Nmap scan report for 192.168.1.149 [host down]
- Nmap scan report for 192.168.1.150 [host down]
- Nmap scan report for 192.168.1.151 [host down]
- Nmap scan report for 192.168.1.152 [host down]
- Nmap scan report for 192.168.1.153 [host down]
- Nmap scan report for 192.168.1.154 [host down]
- Nmap scan report for 192.168.1.155 [host down]
- Nmap scan report for 192.168.1.156 [host down]
- Nmap scan report for 192.168.1.157 [host down]
- Nmap scan report for 192.168.1.158 [host down]
- Nmap scan report for 192.168.1.159 [host down]
- Nmap scan report for 192.168.1.160 [host down]
- Nmap scan report for 192.168.1.161 [host down]
- Nmap scan report for 192.168.1.162 [host down]
- Nmap scan report for 192.168.1.163 [host down]
- Nmap scan report for 192.168.1.164 [host down]
- Nmap scan report for 192.168.1.165 [host down]
- Nmap scan report for 192.168.1.166 [host down]
- Nmap scan report for 192.168.1.167 [host down]
- Nmap scan report for 192.168.1.168 [host down]
- Nmap scan report for 192.168.1.169 [host down]
- Nmap scan report for 192.168.1.170 [host down]
- Nmap scan report for 192.168.1.171 [host down]
- Nmap scan report for 192.168.1.172 [host down]
- Nmap scan report for 192.168.1.173 [host down]
- Nmap scan report for 192.168.1.174 [host down]
- Nmap scan report for 192.168.1.175 [host down]
- Nmap scan report for 192.168.1.176 [host down]
- Nmap scan report for 192.168.1.177 [host down]
- Nmap scan report for 192.168.1.178 [host down]
- Nmap scan report for 192.168.1.179 [host down]
- Nmap scan report for 192.168.1.180 [host down]
- Nmap scan report for 192.168.1.181 [host down]
- Nmap scan report for 192.168.1.182 [host down]
- Nmap scan report for 192.168.1.183 [host down]
- Nmap scan report for 192.168.1.184 [host down]
- Nmap scan report for 192.168.1.185 [host down]
- Nmap scan report for 192.168.1.186 [host down]
- Nmap scan report for 192.168.1.187 [host down]
- Nmap scan report for 192.168.1.188 [host down]
- Nmap scan report for 192.168.1.189 [host down]
- Nmap scan report for 192.168.1.190 [host down]
- Nmap scan report for 192.168.1.191 [host down]
- Nmap scan report for 192.168.1.192 [host down]
- Nmap scan report for 192.168.1.193 [host down]
- Nmap scan report for 192.168.1.194 [host down]
- Nmap scan report for 192.168.1.195 [host down]
- Nmap scan report for 192.168.1.196 [host down]
- Nmap scan report for 192.168.1.197 [host down]
- Nmap scan report for 192.168.1.198 [host down]
- Nmap scan report for 192.168.1.199 [host down]
- Nmap scan report for 192.168.1.200 [host down]
- Nmap scan report for 192.168.1.201 [host down]
- Nmap scan report for 192.168.1.202 [host down]
- Nmap scan report for 192.168.1.203 [host down]
- Nmap scan report for 192.168.1.204 [host down]
- Nmap scan report for 192.168.1.205 [host down]
- Nmap scan report for 192.168.1.206 [host down]
- Nmap scan report for 192.168.1.207 [host down]
- Nmap scan report for 192.168.1.208 [host down]
- Nmap scan report for 192.168.1.209 [host down]
- Nmap scan report for 192.168.1.210 [host down]
- Nmap scan report for 192.168.1.211 [host down]
- Nmap scan report for 192.168.1.212 [host down]
- Nmap scan report for 192.168.1.213 [host down]
- Nmap scan report for 192.168.1.214 [host down]
- Nmap scan report for 192.168.1.215 [host down]
- Nmap scan report for 192.168.1.216 [host down]
- Nmap scan report for 192.168.1.217 [host down]
- Nmap scan report for 192.168.1.218 [host down]
- Nmap scan report for 192.168.1.219 [host down]
- Nmap scan report for 192.168.1.220 [host down]
- Nmap scan report for 192.168.1.221 [host down]
- Nmap scan report for 192.168.1.222 [host down]
- Nmap scan report for 192.168.1.223 [host down]
- Nmap scan report for 192.168.1.224 [host down]
- Nmap scan report for 192.168.1.225 [host down]
- Nmap scan report for 192.168.1.226 [host down]
- Nmap scan report for 192.168.1.227 [host down]
- Nmap scan report for 192.168.1.228 [host down]
- Nmap scan report for 192.168.1.229 [host down]
- Nmap scan report for 192.168.1.230 [host down]
- Nmap scan report for 192.168.1.231 [host down]
- Nmap scan report for 192.168.1.232 [host down]
- Nmap scan report for 192.168.1.233 [host down]
- Nmap scan report for 192.168.1.234 [host down]
- Nmap scan report for 192.168.1.235 [host down]
- Nmap scan report for 192.168.1.236 [host down]
- Nmap scan report for 192.168.1.237 [host down]
- Nmap scan report for 192.168.1.238 [host down]
- Nmap scan report for 192.168.1.239 [host down]
- Nmap scan report for 192.168.1.240 [host down]
- Nmap scan report for 192.168.1.241 [host down]
- Nmap scan report for 192.168.1.242 [host down]
- Nmap scan report for 192.168.1.243 [host down]
- Nmap scan report for 192.168.1.244 [host down]
- Nmap scan report for 192.168.1.245 [host down]
- Nmap scan report for 192.168.1.246 [host down]
- Nmap scan report for 192.168.1.247 [host down]
- Nmap scan report for 192.168.1.248 [host down]
- Nmap scan report for 192.168.1.249 [host down]
- Nmap scan report for 192.168.1.250 [host down]
- Nmap scan report for 192.168.1.251 [host down]
- Nmap scan report for 192.168.1.252 [host down]
- Nmap scan report for 192.168.1.253 [host down]
- Nmap scan report for 192.168.1.254 [host down]
- Nmap scan report for 192.168.1.255 [host down]
- Initiating Parallel DNS resolution of 1 host. at 10:22
- Completed Parallel DNS resolution of 1 host. at 10:22, 0.02s elapsed
- Initiating SYN Stealth Scan at 10:22
- Scanning 5 hosts [1000 ports/host]
- Discovered open port 22/tcp on 192.168.1.102
- Discovered open port 22/tcp on 192.168.1.103
- Discovered open port 22/tcp on 192.168.1.100
- Discovered open port 22/tcp on 192.168.1.2
- Discovered open port 21/tcp on 192.168.1.2
- Discovered open port 443/tcp on 192.168.1.2
- Discovered open port 53/tcp on 192.168.1.2
- Discovered open port 80/tcp on 192.168.1.2
- Discovered open port 5432/tcp on 192.168.1.2
- Completed SYN Stealth Scan against 192.168.1.2 in 0.28s (4 hosts left)
- Completed SYN Stealth Scan against 192.168.1.100 in 0.28s (3 hosts left)
- Discovered open port 139/tcp on 192.168.1.102
- Discovered open port 3389/tcp on 192.168.1.102
- Discovered open port 135/tcp on 192.168.1.102
- Discovered open port 445/tcp on 192.168.1.102
- Discovered open port 3389/tcp on 192.168.1.103
- Discovered open port 1022/tcp on 192.168.1.1
- Discovered open port 1443/tcp on 192.168.1.1
- Completed SYN Stealth Scan against 192.168.1.1 in 7.19s (2 hosts left)
- Completed SYN Stealth Scan against 192.168.1.102 in 7.31s (1 host left)
- Completed SYN Stealth Scan at 10:22, 7.42s elapsed (5000 total ports)
- Initiating Service scan at 10:22
- Scanning 16 services on 5 hosts
- Completed Service scan at 10:23, 12.11s elapsed (16 services on 5 hosts)
- Initiating OS detection (try #1) against 5 hosts
- Retrying OS detection (try #2) against 3 hosts
- NSE: Script scanning 5 hosts.
- Initiating NSE at 10:23
- Completed NSE at 10:23, 49.44s elapsed
- Initiating NSE at 10:23
- Completed NSE at 10:23, 0.94s elapsed
- Initiating NSE at 10:23
- Completed NSE at 10:23, 0.00s elapsed
- Nmap scan report for 192.168.1.1
- Host is up (0.00s latency).
- Not shown: 998 filtered ports
- PORT STATE SERVICE VERSION
- 1022/tcp open ssh OpenSSH 7.5 (protocol 2.0)
- | ssh-hostkey:
- | 4096 3d:81:b9:4d:0a:5f:1f:6e:87:63:06:b7:d4:13:48:21 (RSA)
- |_ 256 b6:af:c8:04:02:ff:66:6d:32:21:99:83:02:e8:63:3f (ED25519)
- 1443/tcp open ssl/http nginx
- |_http-favicon: Unknown favicon MD5: 5567E9CE23E5549E0FCD7195F3882816
- | http-methods:
- |_ Supported Methods: GET HEAD POST
- |_http-title: Login
- | ssl-cert: Subject: commonName=pfSense-5dea350f7fd42/organizationName=pfSense webConfigurator Self-Signed Certificate
- | Subject Alternative Name: DNS:pfSense-5dea350f7fd42
- | Issuer: commonName=pfSense-5dea350f7fd42/organizationName=pfSense webConfigurator Self-Signed Certificate
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-12-06T11:01:35
- | Not valid after: 2025-05-28T11:01:35
- | MD5: edd5 82f4 8b8b ef88 42f8 5256 83f2 4872
- |_SHA-1: 121b 98e3 494d fc30 3105 d930 003c 0439 f94e d075
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- | h2
- |_ http/1.1
- | tls-nextprotoneg:
- | h2
- |_ http/1.1
- MAC Address: 00:50:56:B2:FD:D0 (VMware)
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
- No OS matches for host
- Uptime guess: 0.001 days (since Wed Dec 11 10:23:04 2019)
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=262 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE
- HOP RTT ADDRESS
- 1 0.00 ms 192.168.1.1
- Nmap scan report for facecat.be (192.168.1.2)
- Host is up (0.00s latency).
- Not shown: 994 closed ports
- PORT STATE SERVICE VERSION
- 21/tcp open ftp vsftpd 3.0.3
- 22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u7 (protocol 2.0)
- | ssh-hostkey:
- | 2048 b0:1a:ce:63:08:6e:b0:34:e8:97:c6:2e:cb:5d:f4:ad (RSA)
- | 256 71:57:0c:ec:a2:a3:b6:aa:22:58:ef:1f:c1:52:4d:55 (ECDSA)
- |_ 256 80:94:49:dd:33:29:2d:89:1a:9f:e2:a7:09:cc:3d:96 (ED25519)
- 53/tcp open domain dnsmasq 2.76
- | dns-nsid:
- |_ bind.version: dnsmasq-2.76
- 80/tcp open http nginx
- |_http-favicon: Unknown favicon MD5: F7E3D97F404E71D302B3239EEF48D5F2
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- | http-robots.txt: 55 disallowed entries (15 shown)
- | / /autocomplete/users /search /api /admin /profile
- | /dashboard /projects/new /groups/new /groups/*/edit /users /help
- |_/s/ /snippets/new /snippets/*/edit
- | http-title: Sign in \xC2\xB7 GitLab
- |_Requested resource was http://facecat.be/users/sign_in
- |_http-trane-info: Problem with XML parsing of /evox/about
- 443/tcp open ssl/http Apache httpd 2.4.25 ((Debian))
- | http-git:
- | 192.168.1.2:443/.git/
- | Git repository found!
- | .git/COMMIT_EDITMSG matched patterns 'bug'
- | Repository description: Unnamed repository; edit this file 'description' to name the...
- | Last commit message: bugfix # Please enter the commit message for your changes. L...
- | Remotes:
- |_ http://gitlab.miauw.be/root/facecat.git
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: Apache/2.4.25 (Debian)
- | http-title: Bienvenue sur facecat.be !
- |_Requested resource was login.php
- | ssl-cert: Subject: commonName=server
- | Subject Alternative Name: DNS:server
- | Issuer: commonName=server
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-12-10T19:52:17
- | Not valid after: 2029-12-07T19:52:17
- | MD5: 1fe7 38ec cf0d 1753 9df2 fef7 174f 8614
- |_SHA-1: 7400 4f9b db2b 2780 2c24 f2c9 57c0 abd3 554a 3293
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- |_ http/1.1
- 5432/tcp open postgresql PostgreSQL DB 9.6.4 - 9.6.6
- | ssl-cert: Subject: commonName=server
- | Subject Alternative Name: DNS:server
- | Issuer: commonName=server
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-12-10T19:52:17
- | Not valid after: 2029-12-07T19:52:17
- | MD5: 1fe7 38ec cf0d 1753 9df2 fef7 174f 8614
- |_SHA-1: 7400 4f9b db2b 2780 2c24 f2c9 57c0 abd3 554a 3293
- |_ssl-date: TLS randomness does not represent time
- MAC Address: 00:50:56:B2:3D:6F (VMware)
- Device type: general purpose
- Running: Linux 3.X|4.X
- OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
- OS details: Linux 3.2 - 4.9
- Uptime guess: 0.075 days (since Wed Dec 11 08:35:46 2019)
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=260 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
- TRACEROUTE
- HOP RTT ADDRESS
- 1 0.00 ms facecat.be (192.168.1.2)
- Nmap scan report for 192.168.1.100
- Host is up (0.00s latency).
- Not shown: 999 closed ports
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
- | ssh-hostkey:
- | 2048 2f:0c:8a:63:49:99:03:b3:f7:dc:9f:27:91:a4:67:19 (RSA)
- | 256 67:ac:69:23:52:2b:13:d5:57:47:96:0b:c2:87:5f:86 (ECDSA)
- |_ 256 f8:ec:a7:08:60:4a:10:5c:c9:33:84:5a:76:02:ac:71 (ED25519)
- MAC Address: 00:50:56:B2:93:8C (VMware)
- Device type: general purpose
- Running: Linux 3.X|4.X
- OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
- OS details: Linux 3.2 - 4.9
- Uptime guess: 28.363 days (since Wed Nov 13 01:41:41 2019)
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=256 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
- TRACEROUTE
- HOP RTT ADDRESS
- 1 0.00 ms 192.168.1.100
- Nmap scan report for 192.168.1.102
- Host is up (0.00s latency).
- Not shown: 995 filtered ports
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH for_Windows_7.6 (protocol 2.0)
- | ssh-hostkey:
- | 2048 78:bb:9d:99:a9:b2:48:6b:a6:97:59:39:ac:33:f3:8e (RSA)
- | 256 a7:4d:6b:b3:06:c3:f2:0c:50:30:16:c5:18:d4:5c:e1 (ECDSA)
- |_ 256 7f:47:c1:cb:b2:e7:e9:f6:67:f0:28:ae:b1:50:d4:56 (ED25519)
- 135/tcp open msrpc Microsoft Windows RPC
- 139/tcp open netbios-ssn Microsoft Windows netbios-ssn
- 445/tcp open microsoft-ds?
- 3389/tcp open ms-wbt-server Microsoft Terminal Services
- | rdp-ntlm-info:
- | Target_Name: BOB-DESKTOP
- | NetBIOS_Domain_Name: BOB-DESKTOP
- | NetBIOS_Computer_Name: BOB-DESKTOP
- | DNS_Domain_Name: Bob-Desktop
- | DNS_Computer_Name: Bob-Desktop
- | Product_Version: 10.0.17134
- |_ System_Time: 2019-12-11T09:23:11+00:00
- | ssl-cert: Subject: commonName=Bob-Desktop
- | Issuer: commonName=Bob-Desktop
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-12-09T17:34:20
- | Not valid after: 2020-06-09T17:34:20
- | MD5: e907 a120 2cca 37f7 e031 c036 c617 4695
- |_SHA-1: 76ac 956c c1db d75f 3c26 cbcd c209 eb54 3db0 e6e9
- |_ssl-date: 2019-12-11T09:23:56+00:00; 0s from scanner time.
- MAC Address: 00:50:56:B2:EB:E3 (VMware)
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running (JUST GUESSING): Microsoft Windows XP|7|2008 (87%)
- OS CPE: cpe:/o:microsoft:windows_xp::sp2 cpe:/o:microsoft:windows_7 cpe:/o:microsoft:windows_server_2008::sp1 cpe:/o:microsoft:windows_server_2008:r2
- Aggressive OS guesses: Microsoft Windows XP SP2 (87%), Microsoft Windows 7 (85%), Microsoft Windows Server 2008 SP1 or Windows Server 2008 R2 (85%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=263 (Good luck!)
- IP ID Sequence Generation: Incremental
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- Host script results:
- | nbstat: NetBIOS name: BOB-DESKTOP, NetBIOS user: <unknown>, NetBIOS MAC: 00:50:56:b2:eb:e3 (VMware)
- | Names:
- | BOB-DESKTOP<00> Flags: <unique><active>
- | WORKGROUP<00> Flags: <group><active>
- |_ BOB-DESKTOP<20> Flags: <unique><active>
- | smb2-security-mode:
- | 2.02:
- |_ Message signing enabled but not required
- | smb2-time:
- | date: 2019-12-11T09:23:14
- |_ start_date: N/A
- TRACEROUTE
- HOP RTT ADDRESS
- 1 0.00 ms 192.168.1.102
- Nmap scan report for 192.168.1.103
- Host is up (0.00s latency).
- Not shown: 998 filtered ports
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH for_Windows_7.6 (protocol 2.0)
- | ssh-hostkey:
- | 2048 78:bb:9d:99:a9:b2:48:6b:a6:97:59:39:ac:33:f3:8e (RSA)
- | 256 a7:4d:6b:b3:06:c3:f2:0c:50:30:16:c5:18:d4:5c:e1 (ECDSA)
- |_ 256 7f:47:c1:cb:b2:e7:e9:f6:67:f0:28:ae:b1:50:d4:56 (ED25519)
- 3389/tcp open ms-wbt-server Microsoft Terminal Services
- | rdp-ntlm-info:
- | Target_Name: CHARLIE-DESKTOP
- | NetBIOS_Domain_Name: CHARLIE-DESKTOP
- | NetBIOS_Computer_Name: CHARLIE-DESKTOP
- | DNS_Domain_Name: Charlie-Desktop
- | DNS_Computer_Name: Charlie-Desktop
- | Product_Version: 10.0.17134
- |_ System_Time: 2019-12-11T09:23:15+00:00
- | ssl-cert: Subject: commonName=Charlie-Desktop
- | Issuer: commonName=Charlie-Desktop
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-12-09T17:34:41
- | Not valid after: 2020-06-09T17:34:41
- | MD5: 815d 7b98 0720 7485 cad5 2c0c e632 983e
- |_SHA-1: 2b11 1be2 8489 ee97 74e3 013c 7a98 0510 2b32 b7a9
- |_ssl-date: 2019-12-11T09:23:56+00:00; 0s from scanner time.
- MAC Address: 00:50:56:B2:5C:AC (VMware)
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: specialized|general purpose
- Running (JUST GUESSING): AVtech embedded (87%), Microsoft Windows XP (87%), FreeBSD 6.X|10.X (86%)
- OS CPE: cpe:/o:microsoft:windows_xp::sp2 cpe:/o:freebsd:freebsd:6.2 cpe:/o:freebsd:freebsd:10.3
- Aggressive OS guesses: AVtech Room Alert 26W environmental monitor (87%), Microsoft Windows XP SP2 (87%), FreeBSD 6.2-RELEASE (86%), FreeBSD 10.3-STABLE (85%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=265 (Good luck!)
- IP ID Sequence Generation: Incremental
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- TRACEROUTE
- HOP RTT ADDRESS
- 1 0.00 ms 192.168.1.103
- Initiating SYN Stealth Scan at 10:23
- Scanning 192.168.1.101 [1000 ports]
- Discovered open port 22/tcp on 192.168.1.101
- Discovered open port 139/tcp on 192.168.1.101
- Discovered open port 3389/tcp on 192.168.1.101
- Discovered open port 135/tcp on 192.168.1.101
- Discovered open port 445/tcp on 192.168.1.101
- Completed SYN Stealth Scan at 10:23, 0.05s elapsed (1000 total ports)
- Initiating Service scan at 10:23
- Scanning 5 services on 192.168.1.101
- Completed Service scan at 10:24, 52.14s elapsed (5 services on 1 host)
- Initiating OS detection (try #1) against 192.168.1.101
- Retrying OS detection (try #2) against 192.168.1.101
- Retrying OS detection (try #3) against 192.168.1.101
- Retrying OS detection (try #4) against 192.168.1.101
- Retrying OS detection (try #5) against 192.168.1.101
- NSE: Script scanning 192.168.1.101.
- Initiating NSE at 10:24
- Completed NSE at 10:26, 77.88s elapsed
- Initiating NSE at 10:26
- Completed NSE at 10:27, 60.03s elapsed
- Initiating NSE at 10:27
- Completed NSE at 10:27, 0.00s elapsed
- Nmap scan report for 192.168.1.101
- Host is up (0.00s latency).
- Not shown: 995 closed ports
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH for_Windows_7.6 (protocol 2.0)
- | ssh-hostkey:
- |_ 256 7f:47:c1:cb:b2:e7:e9:f6:67:f0:28:ae:b1:50:d4:56 (ED25519)
- 135/tcp open tcpwrapped
- 139/tcp open netbios-ssn Microsoft Windows netbios-ssn
- 445/tcp open microsoft-ds?
- 3389/tcp open ms-wbt-server Microsoft Terminal Services
- | rdp-ntlm-info:
- | Target_Name: ALICE-DESKTOP
- | NetBIOS_Domain_Name: ALICE-DESKTOP
- | NetBIOS_Computer_Name: ALICE-DESKTOP
- | DNS_Domain_Name: Alice-Desktop
- | DNS_Computer_Name: Alice-Desktop
- | Product_Version: 10.0.17134
- |_ System_Time: 2019-12-11T09:25:02+00:00
- |_ssl-date: 2019-12-11T09:26:17+00:00; 0s from scanner time.
- No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
- TCP/IP fingerprint:
- OS:SCAN(V=7.80%E=4%D=12/11%OT=22%CT=1%CU=30753%PV=Y%DS=0%DC=L%G=Y%TM=5DF0B6
- OS:75%P=i686-pc-windows-windows)SEQ(SP=FE%GCD=1%ISR=10E%TI=I%CI=I%II=I%SS=S
- OS:%TS=U)OPS(O1=M5B4NW8NNS%O2=M5B4NW8NNS%O3=M5B4NW8%O4=M5B4NW8NNS%O5=M5B4NW
- OS:8NNS%O6=M5B4NNS)WIN(W1=FFFF%W2=FFFF%W3=FFFF%W4=FFFF%W5=FFFF%W6=FF70)ECN(
- OS:R=Y%DF=Y%T=80%W=FFFF%O=M5B4NW8NNS%CC=N%Q=)T1(R=Y%DF=Y%T=80%S=O%A=S+%F=AS
- OS:%RD=0%Q=)T2(R=Y%DF=Y%T=80%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)T3(R=Y%DF=Y%T=80%W
- OS:=0%S=Z%A=O%F=AR%O=%RD=0%Q=)T4(R=Y%DF=Y%T=80%W=0%S=A%A=O%F=R%O=%RD=0%Q=)T
- OS:5(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=80%W=0%S=A%A=
- OS:O%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF
- OS:=N%T=80%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=Z%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=80
- OS:%CD=Z)
- Network Distance: 0 hops
- TCP Sequence Prediction: Difficulty=254 (Good luck!)
- IP ID Sequence Generation: Incremental
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- Host script results:
- | smb2-security-mode:
- | 2.10:
- |_ Message signing enabled but not required
- |_smb2-time: Protocol negotiation failed (SMB2)
- NSE: Script Post-scanning.
- Initiating NSE at 10:27
- Completed NSE at 10:27, 0.00s elapsed
- Initiating NSE at 10:27
- Completed NSE at 10:27, 0.00s elapsed
- Initiating NSE at 10:27
- Completed NSE at 10:27, 0.00s elapsed
- Post-scan script results:
- | clock-skew:
- | 0s:
- | 192.168.1.102
- |_ 192.168.1.101
- | ssh-hostkey: Possible duplicate hosts
- | Key 256 7f:47:c1:cb:b2:e7:e9:f6:67:f0:28:ae:b1:50:d4:56 (ED25519) used by:
- | 192.168.1.101
- | 192.168.1.102
- | 192.168.1.103
- | Key 256 a7:4d:6b:b3:06:c3:f2:0c:50:30:16:c5:18:d4:5c:e1 (ECDSA) used by:
- | 192.168.1.102
- | 192.168.1.103
- | Key 2048 78:bb:9d:99:a9:b2:48:6b:a6:97:59:39:ac:33:f3:8e (RSA) used by:
- | 192.168.1.102
- |_ 192.168.1.103
- Read data files from: C:\Program Files (x86)\Nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 256 IP addresses (6 hosts up) scanned in 281.98 seconds
- Raw packets sent: 9865 (443.706KB) | Rcvd: 4303 (184.732KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement