Advertisement
Guest User

Untitled

a guest
Apr 26th, 2019
1,305
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 34.80 KB | None | 0 0
  1. Starting Nmap 7.70 ( https://nmap.org ) at 2019-04-26 08:40 Pacific Daylight Time
  2.  
  3. NSE: Loaded 148 scripts for scanning.
  4.  
  5. NSE: Script Pre-scanning.
  6.  
  7. Initiating NSE at 08:40
  8.  
  9. Completed NSE at 08:40, 0.00s elapsed
  10.  
  11. Initiating NSE at 08:40
  12.  
  13. Completed NSE at 08:40, 0.00s elapsed
  14.  
  15. Initiating ARP Ping Scan at 08:40
  16.  
  17. Scanning 255 hosts [1 port/host]
  18.  
  19. Completed ARP Ping Scan at 08:40, 3.55s elapsed (255 total hosts)
  20.  
  21. Initiating Parallel DNS resolution of 255 hosts. at 08:41
  22.  
  23. Completed Parallel DNS resolution of 255 hosts. at 08:41, 13.05s elapsed
  24.  
  25. Nmap scan report for 10.2.0.0 [host down]
  26.  
  27. Nmap scan report for 10.2.0.3 [host down]
  28.  
  29. Nmap scan report for 10.2.0.4 [host down]
  30.  
  31. Nmap scan report for 10.2.0.10 [host down]
  32.  
  33. Nmap scan report for 10.2.0.11 [host down]
  34.  
  35. Nmap scan report for 10.2.0.12 [host down]
  36.  
  37. Nmap scan report for 10.2.0.13 [host down]
  38.  
  39. Nmap scan report for 10.2.0.14 [host down]
  40.  
  41. Nmap scan report for 10.2.0.15 [host down]
  42.  
  43. Nmap scan report for 10.2.0.16 [host down]
  44.  
  45. Nmap scan report for 10.2.0.17 [host down]
  46.  
  47. Nmap scan report for 10.2.0.18 [host down]
  48.  
  49. Nmap scan report for 10.2.0.19 [host down]
  50.  
  51. Nmap scan report for 10.2.0.20 [host down]
  52.  
  53. Nmap scan report for 10.2.0.21 [host down]
  54.  
  55. Nmap scan report for 10.2.0.22 [host down]
  56.  
  57. Nmap scan report for 10.2.0.23 [host down]
  58.  
  59. Nmap scan report for 10.2.0.24 [host down]
  60.  
  61. Nmap scan report for 10.2.0.25 [host down]
  62.  
  63. Nmap scan report for 10.2.0.26 [host down]
  64.  
  65. Nmap scan report for 10.2.0.27 [host down]
  66.  
  67. Nmap scan report for 10.2.0.28 [host down]
  68.  
  69. Nmap scan report for 10.2.0.29 [host down]
  70.  
  71. Nmap scan report for 10.2.0.30 [host down]
  72.  
  73. Nmap scan report for 10.2.0.31 [host down]
  74.  
  75. Nmap scan report for 10.2.0.32 [host down]
  76.  
  77. Nmap scan report for 10.2.0.33 [host down]
  78.  
  79. Nmap scan report for 10.2.0.34 [host down]
  80.  
  81. Nmap scan report for 10.2.0.35 [host down]
  82.  
  83. Nmap scan report for 10.2.0.36 [host down]
  84.  
  85. Nmap scan report for 10.2.0.37 [host down]
  86.  
  87. Nmap scan report for 10.2.0.38 [host down]
  88.  
  89. Nmap scan report for 10.2.0.39 [host down]
  90.  
  91. Nmap scan report for 10.2.0.40 [host down]
  92.  
  93. Nmap scan report for 10.2.0.41 [host down]
  94.  
  95. Nmap scan report for 10.2.0.42 [host down]
  96.  
  97. Nmap scan report for 10.2.0.43 [host down]
  98.  
  99. Nmap scan report for 10.2.0.44 [host down]
  100.  
  101. Nmap scan report for 10.2.0.45 [host down]
  102.  
  103. Nmap scan report for 10.2.0.46 [host down]
  104.  
  105. Nmap scan report for 10.2.0.47 [host down]
  106.  
  107. Nmap scan report for 10.2.0.48 [host down]
  108.  
  109. Nmap scan report for 10.2.0.49 [host down]
  110.  
  111. Nmap scan report for 10.2.0.50 [host down]
  112.  
  113. Nmap scan report for 10.2.0.51 [host down]
  114.  
  115. Nmap scan report for 10.2.0.52 [host down]
  116.  
  117. Nmap scan report for 10.2.0.53 [host down]
  118.  
  119. Nmap scan report for 10.2.0.54 [host down]
  120.  
  121. Nmap scan report for 10.2.0.55 [host down]
  122.  
  123. Nmap scan report for 10.2.0.56 [host down]
  124.  
  125. Nmap scan report for 10.2.0.57 [host down]
  126.  
  127. Nmap scan report for 10.2.0.58 [host down]
  128.  
  129. Nmap scan report for 10.2.0.59 [host down]
  130.  
  131. Nmap scan report for 10.2.0.60 [host down]
  132.  
  133. Nmap scan report for 10.2.0.61 [host down]
  134.  
  135. Nmap scan report for 10.2.0.62 [host down]
  136.  
  137. Nmap scan report for 10.2.0.63 [host down]
  138.  
  139. Nmap scan report for 10.2.0.64 [host down]
  140.  
  141. Nmap scan report for 10.2.0.65 [host down]
  142.  
  143. Nmap scan report for 10.2.0.66 [host down]
  144.  
  145. Nmap scan report for 10.2.0.67 [host down]
  146.  
  147. Nmap scan report for 10.2.0.68 [host down]
  148.  
  149. Nmap scan report for 10.2.0.69 [host down]
  150.  
  151. Nmap scan report for 10.2.0.70 [host down]
  152.  
  153. Nmap scan report for 10.2.0.71 [host down]
  154.  
  155. Nmap scan report for 10.2.0.72 [host down]
  156.  
  157. Nmap scan report for 10.2.0.73 [host down]
  158.  
  159. Nmap scan report for 10.2.0.74 [host down]
  160.  
  161. Nmap scan report for 10.2.0.75 [host down]
  162.  
  163. Nmap scan report for 10.2.0.76 [host down]
  164.  
  165. Nmap scan report for 10.2.0.77 [host down]
  166.  
  167. Nmap scan report for 10.2.0.78 [host down]
  168.  
  169. Nmap scan report for 10.2.0.79 [host down]
  170.  
  171. Nmap scan report for 10.2.0.80 [host down]
  172.  
  173. Nmap scan report for 10.2.0.81 [host down]
  174.  
  175. Nmap scan report for 10.2.0.82 [host down]
  176.  
  177. Nmap scan report for 10.2.0.83 [host down]
  178.  
  179. Nmap scan report for 10.2.0.84 [host down]
  180.  
  181. Nmap scan report for 10.2.0.85 [host down]
  182.  
  183. Nmap scan report for 10.2.0.86 [host down]
  184.  
  185. Nmap scan report for 10.2.0.87 [host down]
  186.  
  187. Nmap scan report for 10.2.0.88 [host down]
  188.  
  189. Nmap scan report for 10.2.0.89 [host down]
  190.  
  191. Nmap scan report for 10.2.0.90 [host down]
  192.  
  193. Nmap scan report for 10.2.0.91 [host down]
  194.  
  195. Nmap scan report for 10.2.0.92 [host down]
  196.  
  197. Nmap scan report for 10.2.0.93 [host down]
  198.  
  199. Nmap scan report for 10.2.0.94 [host down]
  200.  
  201. Nmap scan report for 10.2.0.95 [host down]
  202.  
  203. Nmap scan report for 10.2.0.96 [host down]
  204.  
  205. Nmap scan report for 10.2.0.97 [host down]
  206.  
  207. Nmap scan report for 10.2.0.98 [host down]
  208.  
  209. Nmap scan report for 10.2.0.99 [host down]
  210.  
  211. Nmap scan report for 10.2.0.100 [host down]
  212.  
  213. Nmap scan report for 10.2.0.101 [host down]
  214.  
  215. Nmap scan report for 10.2.0.102 [host down]
  216.  
  217. Nmap scan report for 10.2.0.103 [host down]
  218.  
  219. Nmap scan report for 10.2.0.104 [host down]
  220.  
  221. Nmap scan report for 10.2.0.105 [host down]
  222.  
  223. Nmap scan report for 10.2.0.106 [host down]
  224.  
  225. Nmap scan report for 10.2.0.107 [host down]
  226.  
  227. Nmap scan report for 10.2.0.108 [host down]
  228.  
  229. Nmap scan report for 10.2.0.109 [host down]
  230.  
  231. Nmap scan report for 10.2.0.110 [host down]
  232.  
  233. Nmap scan report for 10.2.0.111 [host down]
  234.  
  235. Nmap scan report for 10.2.0.112 [host down]
  236.  
  237. Nmap scan report for 10.2.0.113 [host down]
  238.  
  239. Nmap scan report for 10.2.0.114 [host down]
  240.  
  241. Nmap scan report for 10.2.0.115 [host down]
  242.  
  243. Nmap scan report for 10.2.0.116 [host down]
  244.  
  245. Nmap scan report for 10.2.0.117 [host down]
  246.  
  247. Nmap scan report for 10.2.0.118 [host down]
  248.  
  249. Nmap scan report for 10.2.0.119 [host down]
  250.  
  251. Nmap scan report for 10.2.0.120 [host down]
  252.  
  253. Nmap scan report for 10.2.0.121 [host down]
  254.  
  255. Nmap scan report for 10.2.0.122 [host down]
  256.  
  257. Nmap scan report for 10.2.0.123 [host down]
  258.  
  259. Nmap scan report for 10.2.0.124 [host down]
  260.  
  261. Nmap scan report for 10.2.0.125 [host down]
  262.  
  263. Nmap scan report for 10.2.0.126 [host down]
  264.  
  265. Nmap scan report for 10.2.0.127 [host down]
  266.  
  267. Nmap scan report for 10.2.0.128 [host down]
  268.  
  269. Nmap scan report for 10.2.0.129 [host down]
  270.  
  271. Nmap scan report for 10.2.0.130 [host down]
  272.  
  273. Nmap scan report for 10.2.0.131 [host down]
  274.  
  275. Nmap scan report for 10.2.0.132 [host down]
  276.  
  277. Nmap scan report for 10.2.0.133 [host down]
  278.  
  279. Nmap scan report for 10.2.0.134 [host down]
  280.  
  281. Nmap scan report for 10.2.0.135 [host down]
  282.  
  283. Nmap scan report for 10.2.0.136 [host down]
  284.  
  285. Nmap scan report for 10.2.0.137 [host down]
  286.  
  287. Nmap scan report for 10.2.0.138 [host down]
  288.  
  289. Nmap scan report for 10.2.0.139 [host down]
  290.  
  291. Nmap scan report for 10.2.0.140 [host down]
  292.  
  293. Nmap scan report for 10.2.0.141 [host down]
  294.  
  295. Nmap scan report for 10.2.0.142 [host down]
  296.  
  297. Nmap scan report for 10.2.0.143 [host down]
  298.  
  299. Nmap scan report for 10.2.0.144 [host down]
  300.  
  301. Nmap scan report for 10.2.0.145 [host down]
  302.  
  303. Nmap scan report for 10.2.0.146 [host down]
  304.  
  305. Nmap scan report for 10.2.0.147 [host down]
  306.  
  307. Nmap scan report for 10.2.0.148 [host down]
  308.  
  309. Nmap scan report for 10.2.0.149 [host down]
  310.  
  311. Nmap scan report for 10.2.0.150 [host down]
  312.  
  313. Nmap scan report for 10.2.0.151 [host down]
  314.  
  315. Nmap scan report for 10.2.0.152 [host down]
  316.  
  317. Nmap scan report for 10.2.0.153 [host down]
  318.  
  319. Nmap scan report for 10.2.0.154 [host down]
  320.  
  321. Nmap scan report for 10.2.0.155 [host down]
  322.  
  323. Nmap scan report for 10.2.0.156 [host down]
  324.  
  325. Nmap scan report for 10.2.0.157 [host down]
  326.  
  327. Nmap scan report for 10.2.0.158 [host down]
  328.  
  329. Nmap scan report for 10.2.0.159 [host down]
  330.  
  331. Nmap scan report for 10.2.0.160 [host down]
  332.  
  333. Nmap scan report for 10.2.0.161 [host down]
  334.  
  335. Nmap scan report for 10.2.0.162 [host down]
  336.  
  337. Nmap scan report for 10.2.0.163 [host down]
  338.  
  339. Nmap scan report for 10.2.0.164 [host down]
  340.  
  341. Nmap scan report for 10.2.0.165 [host down]
  342.  
  343. Nmap scan report for 10.2.0.166 [host down]
  344.  
  345. Nmap scan report for 10.2.0.167 [host down]
  346.  
  347. Nmap scan report for 10.2.0.168 [host down]
  348.  
  349. Nmap scan report for 10.2.0.169 [host down]
  350.  
  351. Nmap scan report for 10.2.0.170 [host down]
  352.  
  353. Nmap scan report for 10.2.0.171 [host down]
  354.  
  355. Nmap scan report for 10.2.0.172 [host down]
  356.  
  357. Nmap scan report for 10.2.0.173 [host down]
  358.  
  359. Nmap scan report for 10.2.0.174 [host down]
  360.  
  361. Nmap scan report for 10.2.0.175 [host down]
  362.  
  363. Nmap scan report for 10.2.0.176 [host down]
  364.  
  365. Nmap scan report for 10.2.0.177 [host down]
  366.  
  367. Nmap scan report for 10.2.0.178 [host down]
  368.  
  369. Nmap scan report for 10.2.0.179 [host down]
  370.  
  371. Nmap scan report for 10.2.0.180 [host down]
  372.  
  373. Nmap scan report for 10.2.0.181 [host down]
  374.  
  375. Nmap scan report for 10.2.0.182 [host down]
  376.  
  377. Nmap scan report for 10.2.0.183 [host down]
  378.  
  379. Nmap scan report for 10.2.0.184 [host down]
  380.  
  381. Nmap scan report for 10.2.0.185 [host down]
  382.  
  383. Nmap scan report for 10.2.0.186 [host down]
  384.  
  385. Nmap scan report for 10.2.0.187 [host down]
  386.  
  387. Nmap scan report for 10.2.0.188 [host down]
  388.  
  389. Nmap scan report for 10.2.0.189 [host down]
  390.  
  391. Nmap scan report for 10.2.0.190 [host down]
  392.  
  393. Nmap scan report for 10.2.0.191 [host down]
  394.  
  395. Nmap scan report for 10.2.0.192 [host down]
  396.  
  397. Nmap scan report for 10.2.0.193 [host down]
  398.  
  399. Nmap scan report for 10.2.0.194 [host down]
  400.  
  401. Nmap scan report for 10.2.0.195 [host down]
  402.  
  403. Nmap scan report for 10.2.0.196 [host down]
  404.  
  405. Nmap scan report for 10.2.0.197 [host down]
  406.  
  407. Nmap scan report for 10.2.0.198 [host down]
  408.  
  409. Nmap scan report for 10.2.0.199 [host down]
  410.  
  411. Nmap scan report for 10.2.0.200 [host down]
  412.  
  413. Nmap scan report for 10.2.0.201 [host down]
  414.  
  415. Nmap scan report for 10.2.0.202 [host down]
  416.  
  417. Nmap scan report for 10.2.0.203 [host down]
  418.  
  419. Nmap scan report for 10.2.0.204 [host down]
  420.  
  421. Nmap scan report for 10.2.0.205 [host down]
  422.  
  423. Nmap scan report for 10.2.0.206 [host down]
  424.  
  425. Nmap scan report for 10.2.0.207 [host down]
  426.  
  427. Nmap scan report for 10.2.0.208 [host down]
  428.  
  429. Nmap scan report for 10.2.0.209 [host down]
  430.  
  431. Nmap scan report for 10.2.0.210 [host down]
  432.  
  433. Nmap scan report for 10.2.0.211 [host down]
  434.  
  435. Nmap scan report for 10.2.0.212 [host down]
  436.  
  437. Nmap scan report for 10.2.0.213 [host down]
  438.  
  439. Nmap scan report for 10.2.0.214 [host down]
  440.  
  441. Nmap scan report for 10.2.0.215 [host down]
  442.  
  443. Nmap scan report for 10.2.0.216 [host down]
  444.  
  445. Nmap scan report for 10.2.0.217 [host down]
  446.  
  447. Nmap scan report for 10.2.0.218 [host down]
  448.  
  449. Nmap scan report for 10.2.0.219 [host down]
  450.  
  451. Nmap scan report for 10.2.0.220 [host down]
  452.  
  453. Nmap scan report for 10.2.0.221 [host down]
  454.  
  455. Nmap scan report for 10.2.0.222 [host down]
  456.  
  457. Nmap scan report for 10.2.0.223 [host down]
  458.  
  459. Nmap scan report for 10.2.0.224 [host down]
  460.  
  461. Nmap scan report for 10.2.0.225 [host down]
  462.  
  463. Nmap scan report for 10.2.0.226 [host down]
  464.  
  465. Nmap scan report for 10.2.0.227 [host down]
  466.  
  467. Nmap scan report for 10.2.0.228 [host down]
  468.  
  469. Nmap scan report for 10.2.0.229 [host down]
  470.  
  471. Nmap scan report for 10.2.0.230 [host down]
  472.  
  473. Nmap scan report for 10.2.0.231 [host down]
  474.  
  475. Nmap scan report for 10.2.0.232 [host down]
  476.  
  477. Nmap scan report for 10.2.0.233 [host down]
  478.  
  479. Nmap scan report for 10.2.0.234 [host down]
  480.  
  481. Nmap scan report for 10.2.0.235 [host down]
  482.  
  483. Nmap scan report for 10.2.0.236 [host down]
  484.  
  485. Nmap scan report for 10.2.0.237 [host down]
  486.  
  487. Nmap scan report for 10.2.0.238 [host down]
  488.  
  489. Nmap scan report for 10.2.0.239 [host down]
  490.  
  491. Nmap scan report for 10.2.0.240 [host down]
  492.  
  493. Nmap scan report for 10.2.0.241 [host down]
  494.  
  495. Nmap scan report for 10.2.0.242 [host down]
  496.  
  497. Nmap scan report for 10.2.0.243 [host down]
  498.  
  499. Nmap scan report for 10.2.0.244 [host down]
  500.  
  501. Nmap scan report for 10.2.0.245 [host down]
  502.  
  503. Nmap scan report for 10.2.0.246 [host down]
  504.  
  505. Nmap scan report for 10.2.0.247 [host down]
  506.  
  507. Nmap scan report for 10.2.0.248 [host down]
  508.  
  509. Nmap scan report for 10.2.0.249 [host down]
  510.  
  511. Nmap scan report for 10.2.0.250 [host down]
  512.  
  513. Nmap scan report for 10.2.0.251 [host down]
  514.  
  515. Nmap scan report for 10.2.0.252 [host down]
  516.  
  517. Nmap scan report for 10.2.0.253 [host down]
  518.  
  519. Nmap scan report for 10.2.0.254 [host down]
  520.  
  521. Nmap scan report for 10.2.0.255 [host down]
  522.  
  523. Initiating Parallel DNS resolution of 1 host. at 08:41
  524.  
  525. Completed Parallel DNS resolution of 1 host. at 08:41, 13.05s elapsed
  526.  
  527. Initiating SYN Stealth Scan at 08:41
  528.  
  529. Scanning 6 hosts [1000 ports/host]
  530.  
  531. Discovered open port 21/tcp on 10.2.0.5
  532.  
  533. Discovered open port 21/tcp on 10.2.0.6
  534.  
  535. Discovered open port 21/tcp on 10.2.0.7
  536.  
  537. Discovered open port 22/tcp on 10.2.0.6
  538.  
  539. Discovered open port 22/tcp on 10.2.0.5
  540.  
  541. Discovered open port 22/tcp on 10.2.0.9
  542.  
  543. Discovered open port 139/tcp on 10.2.0.5
  544.  
  545. Discovered open port 139/tcp on 10.2.0.7
  546.  
  547. Discovered open port 80/tcp on 10.2.0.5
  548.  
  549. Discovered open port 80/tcp on 10.2.0.7
  550.  
  551. Discovered open port 80/tcp on 10.2.0.9
  552.  
  553. Discovered open port 3306/tcp on 10.2.0.5
  554.  
  555. Discovered open port 443/tcp on 10.2.0.9
  556.  
  557. Discovered open port 8080/tcp on 10.2.0.5
  558.  
  559. Discovered open port 445/tcp on 10.2.0.7
  560.  
  561. Discovered open port 445/tcp on 10.2.0.5
  562.  
  563. Discovered open port 135/tcp on 10.2.0.7
  564.  
  565. Discovered open port 3389/tcp on 10.2.0.7
  566.  
  567. Discovered open port 111/tcp on 10.2.0.5
  568.  
  569. Discovered open port 8181/tcp on 10.2.0.5
  570.  
  571. Discovered open port 10010/tcp on 10.2.0.5
  572.  
  573. Discovered open port 631/tcp on 10.2.0.5
  574.  
  575. Discovered open port 53/tcp on 10.2.0.2
  576.  
  577. Discovered open port 6667/tcp on 10.2.0.5
  578.  
  579. Completed SYN Stealth Scan against 10.2.0.5 in 2.00s (5 hosts left)
  580.  
  581. Completed SYN Stealth Scan against 10.2.0.6 in 2.02s (4 hosts left)
  582.  
  583. Completed SYN Stealth Scan against 10.2.0.7 in 2.11s (3 hosts left)
  584.  
  585. Completed SYN Stealth Scan against 10.2.0.1 in 6.53s (2 hosts left)
  586.  
  587. Completed SYN Stealth Scan against 10.2.0.9 in 6.72s (1 host left)
  588.  
  589. Completed SYN Stealth Scan at 08:41, 6.75s elapsed (6000 total ports)
  590.  
  591. Initiating Service scan at 08:41
  592.  
  593. Scanning 24 services on 6 hosts
  594.  
  595. Completed Service scan at 08:42, 86.24s elapsed (24 services on 6 hosts)
  596.  
  597. Initiating OS detection (try #1) against 6 hosts
  598.  
  599. Retrying OS detection (try #2) against 5 hosts
  600.  
  601. Retrying OS detection (try #3) against 2 hosts
  602.  
  603. Retrying OS detection (try #4) against 2 hosts
  604.  
  605. Retrying OS detection (try #5) against 2 hosts
  606.  
  607. NSE: Script scanning 6 hosts.
  608.  
  609. Initiating NSE at 08:43
  610.  
  611. NSE: [ftp-bounce] Couldn't resolve scanme.nmap.org, scanning 10.0.0.1 instead.
  612.  
  613. NSE: [ftp-bounce] PORT response: 501 Server cannot accept argument.
  614.  
  615. NSE: [ftp-bounce] PORT response: 500 Illegal PORT command.
  616.  
  617. Completed NSE at 08:43, 38.51s elapsed
  618.  
  619. Initiating NSE at 08:43
  620.  
  621. Completed NSE at 08:43, 1.07s elapsed
  622.  
  623. Nmap scan report for 10.2.0.1
  624.  
  625. Host is up (0.00s latency).
  626.  
  627. All 1000 scanned ports on 10.2.0.1 are filtered
  628.  
  629. MAC Address: 02:E7:3E:A5:18:70 (Unknown)
  630.  
  631. Too many fingerprints match this host to give specific OS details
  632.  
  633. Network Distance: 1 hop
  634.  
  635.  
  636.  
  637. TRACEROUTE
  638.  
  639. HOP RTT ADDRESS
  640.  
  641. 1 0.00 ms 10.2.0.1
  642.  
  643.  
  644.  
  645. Nmap scan report for 10.2.0.2
  646.  
  647. Host is up (0.00s latency).
  648.  
  649. Not shown: 999 filtered ports
  650.  
  651. PORT STATE SERVICE VERSION
  652.  
  653. 53/tcp open domain (unknown banner: EC2 DNS)
  654.  
  655. | dns-nsid:
  656.  
  657. | id.server: prod-pdx1-cell00-i-01d5626c8c626dd65
  658.  
  659. |_ bind.version: EC2 DNS
  660.  
  661. | fingerprint-strings:
  662.  
  663. | DNSVersionBindReqTCP:
  664.  
  665. | version
  666.  
  667. |_ bind
  668.  
  669. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  670.  
  671. SF-Port53-TCP:V=7.70%I=7%D=4/26%Time=5CC326B5%P=i686-pc-windows-windows%r(
  672.  
  673. SF:DNSVersionBindReqTCP,34,"\x002\0\x06\x81\x80\0\x01\0\x01\0\0\0\0\x07ver
  674.  
  675. SF:sion\x04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x08\x07EC2\x20
  676.  
  677. SF:DNS");
  678.  
  679. MAC Address: 02:E7:3E:A5:18:70 (Unknown)
  680.  
  681. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  682.  
  683. Device type: PBX
  684.  
  685. Running (JUST GUESSING): Vodavi embedded (86%)
  686.  
  687. OS CPE: cpe:/h:vodavi:xts-ip
  688.  
  689. Aggressive OS guesses: Vodavi XTS-IP PBX (86%)
  690.  
  691. No exact OS matches for host (test conditions non-ideal).
  692.  
  693. Uptime guess: 91.643 days (since Thu Jan 24 16:17:29 2019)
  694.  
  695. Network Distance: 1 hop
  696.  
  697. TCP Sequence Prediction: Difficulty=255 (Good luck!)
  698.  
  699. IP ID Sequence Generation: All zeros
  700.  
  701.  
  702.  
  703. TRACEROUTE
  704.  
  705. HOP RTT ADDRESS
  706.  
  707. 1 0.00 ms 10.2.0.2
  708.  
  709.  
  710.  
  711. Nmap scan report for 10.2.0.5
  712.  
  713. Host is up (0.00014s latency).
  714.  
  715. Not shown: 988 closed ports
  716.  
  717. PORT STATE SERVICE VERSION
  718.  
  719. 21/tcp open ftp ProFTPD 1.3.5
  720.  
  721. 22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.11 (Ubuntu Linux; protocol 2.0)
  722.  
  723. | ssh-hostkey:
  724.  
  725. | 1024 b9:07:bc:1e:21:f8:aa:09:7a:f3:66:c9:4c:1e:93:82 (DSA)
  726.  
  727. | 2048 41:1c:56:97:4e:77:d2:3a:c5:fc:e1:e8:bb:52:c7:58 (RSA)
  728.  
  729. | 256 6f:3a:67:21:7c:1c:cc:71:f3:f2:33:58:ba:ea:17:0f (ECDSA)
  730.  
  731. |_ 256 31:0c:79:ba:be:a8:ef:8f:0a:f6:bb:45:70:97:b3:9b (ED25519)
  732.  
  733. 80/tcp open http Apache httpd 2.4.7
  734.  
  735. | http-ls: Volume /
  736.  
  737. | SIZE TIME FILENAME
  738.  
  739. | - 2018-07-29 13:18 chat/
  740.  
  741. | - 2011-07-27 20:17 drupal/
  742.  
  743. | 1.7K 2018-07-29 13:18 payroll_app.php
  744.  
  745. | - 2013-04-08 12:06 phpmyadmin/
  746.  
  747. |_
  748.  
  749. | http-methods:
  750.  
  751. |_ Supported Methods: POST OPTIONS GET HEAD
  752.  
  753. |_http-server-header: Apache/2.4.7 (Ubuntu)
  754.  
  755. |_http-title: Index of /
  756.  
  757. 111/tcp open rpcbind 2-4 (RPC #100000)
  758.  
  759. | rpcinfo:
  760.  
  761. | program version port/proto service
  762.  
  763. | 100000 2,3,4 111/tcp rpcbind
  764.  
  765. | 100000 2,3,4 111/udp rpcbind
  766.  
  767. | 100024 1 41410/udp status
  768.  
  769. |_ 100024 1 45659/tcp status
  770.  
  771. 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
  772.  
  773. 445/tcp open netbios-ssn Samba smbd 4.3.11-Ubuntu (workgroup: WORKGROUP)
  774.  
  775. 631/tcp open ipp CUPS 1.7
  776.  
  777. | http-methods:
  778.  
  779. | Supported Methods: GET HEAD OPTIONS POST PUT
  780.  
  781. |_ Potentially risky methods: PUT
  782.  
  783. | http-robots.txt: 1 disallowed entry
  784.  
  785. |_/
  786.  
  787. |_http-server-header: CUPS/1.7 IPP/2.1
  788.  
  789. |_http-title: Home - CUPS 1.7.2
  790.  
  791. 3306/tcp open mysql MySQL (unauthorized)
  792.  
  793. 6667/tcp open irc UnrealIRCd
  794.  
  795. | irc-info:
  796.  
  797. | users: 1
  798.  
  799. | servers: 1
  800.  
  801. | lusers: 1
  802.  
  803. | lservers: 0
  804.  
  805. |_ server: irc.TestIRC.net
  806.  
  807. 8080/tcp open http Jetty 8.1.7.v20120910
  808.  
  809. |_http-favicon: Unknown favicon MD5: ED7D5C39C69262F4BA95418D4F909B10
  810.  
  811. |_http-server-header: Jetty(8.1.7.v20120910)
  812.  
  813. |_http-title: Error 404 - Not Found
  814.  
  815. 8181/tcp open http WEBrick httpd 1.3.1 (Ruby 2.3.7 (2018-03-28))
  816.  
  817. | http-methods:
  818.  
  819. |_ Supported Methods: GET HEAD
  820.  
  821. |_http-server-header: WEBrick/1.3.1 (Ruby/2.3.7/2018-03-28)
  822.  
  823. |_http-title: Site doesn't have a title (text/html;charset=utf-8).
  824.  
  825. 10010/tcp open rxapi?
  826.  
  827. | fingerprint-strings:
  828.  
  829. | FourOhFourRequest:
  830.  
  831. | HTTP/1.0 404 Not Found
  832.  
  833. | Date: Fri, 26 Apr 2019 15:42:04 GMT
  834.  
  835. | Content-Length: 19
  836.  
  837. | Content-Type: text/plain; charset=utf-8
  838.  
  839. | 404: Page Not Found
  840.  
  841. | GenericLines, Help, Kerberos, LDAPSearchReq, LPDString, RTSPRequest, SIPOptions, SSLSessionReq, TLSSessionReq:
  842.  
  843. | HTTP/1.1 400 Bad Request
  844.  
  845. | Content-Type: text/plain; charset=utf-8
  846.  
  847. | Connection: close
  848.  
  849. | Request
  850.  
  851. | GetRequest, HTTPOptions:
  852.  
  853. | HTTP/1.0 404 Not Found
  854.  
  855. | Date: Fri, 26 Apr 2019 15:41:39 GMT
  856.  
  857. | Content-Length: 19
  858.  
  859. | Content-Type: text/plain; charset=utf-8
  860.  
  861. |_ 404: Page Not Found
  862.  
  863. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  864.  
  865. SF-Port10010-TCP:V=7.70%I=7%D=4/26%Time=5CC326B3%P=i686-pc-windows-windows
  866.  
  867. SF:%r(GenericLines,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:
  868.  
  869. SF:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20
  870.  
  871. SF:Bad\x20Request")%r(GetRequest,8F,"HTTP/1\.0\x20404\x20Not\x20Found\r\nD
  872.  
  873. SF:ate:\x20Fri,\x2026\x20Apr\x202019\x2015:41:39\x20GMT\r\nContent-Length:
  874.  
  875. SF:\x2019\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\n\r\n404:\x20
  876.  
  877. SF:Page\x20Not\x20Found")%r(HTTPOptions,8F,"HTTP/1\.0\x20404\x20Not\x20Fou
  878.  
  879. SF:nd\r\nDate:\x20Fri,\x2026\x20Apr\x202019\x2015:41:39\x20GMT\r\nContent-
  880.  
  881. SF:Length:\x2019\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\n\r\n4
  882.  
  883. SF:04:\x20Page\x20Not\x20Found")%r(RTSPRequest,67,"HTTP/1\.1\x20400\x20Bad
  884.  
  885. SF:\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnect
  886.  
  887. SF:ion:\x20close\r\n\r\n400\x20Bad\x20Request")%r(Help,67,"HTTP/1\.1\x2040
  888.  
  889. SF:0\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\
  890.  
  891. SF:nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(SSLSessionReq,67
  892.  
  893. SF:,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x2
  894.  
  895. SF:0charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r
  896.  
  897. SF:(TLSSessionReq,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\
  898.  
  899. SF:x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20B
  900.  
  901. SF:ad\x20Request")%r(Kerberos,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nCo
  902.  
  903. SF:ntent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n
  904.  
  905. SF:\r\n400\x20Bad\x20Request")%r(FourOhFourRequest,8F,"HTTP/1\.0\x20404\x2
  906.  
  907. SF:0Not\x20Found\r\nDate:\x20Fri,\x2026\x20Apr\x202019\x2015:42:04\x20GMT\
  908.  
  909. SF:r\nContent-Length:\x2019\r\nContent-Type:\x20text/plain;\x20charset=utf
  910.  
  911. SF:-8\r\n\r\n404:\x20Page\x20Not\x20Found")%r(LPDString,67,"HTTP/1\.1\x204
  912.  
  913. SF:00\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r
  914.  
  915. SF:\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(LDAPSearchReq,6
  916.  
  917. SF:7,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x
  918.  
  919. SF:20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%
  920.  
  921. SF:r(SIPOptions,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x2
  922.  
  923. SF:0text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad
  924.  
  925. SF:\x20Request");
  926.  
  927. MAC Address: 02:1B:6B:4E:2A:46 (Unknown)
  928.  
  929. No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
  930.  
  931. TCP/IP fingerprint:
  932.  
  933. OS:SCAN(V=7.70%E=4%D=4/26%OT=21%CT=1%CU=39155%PV=Y%DS=1%DC=D%G=Y%M=021B6B%T
  934.  
  935. OS:M=5CC32739%P=i686-pc-windows-windows)SEQ(SP=FD%GCD=1%ISR=10A%TI=Z%CI=I%I
  936.  
  937. OS:I=I%TS=8)OPS(O1=M2301ST11NW6%O2=M2301ST11NW6%O3=M2301NNT11NW6%O4=M2301ST
  938.  
  939. OS:11NW6%O5=M2301ST11NW6%O6=M2301ST11)WIN(W1=68DF%W2=68DF%W3=68DF%W4=68DF%W
  940.  
  941. OS:5=68DF%W6=68DF)ECN(R=Y%DF=Y%T=40%W=6903%O=M2301NNSNW6%CC=Y%Q=)T1(R=Y%DF=
  942.  
  943. OS:Y%T=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%
  944.  
  945. OS:F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y
  946.  
  947. OS:%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%R
  948.  
  949. OS:D=0%Q=)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)I
  950.  
  951. OS:E(R=Y%DFI=N%T=40%CD=S)
  952.  
  953.  
  954.  
  955. Uptime guess: 0.004 days (since Fri Apr 26 08:38:34 2019)
  956.  
  957. Network Distance: 1 hop
  958.  
  959. TCP Sequence Prediction: Difficulty=253 (Good luck!)
  960.  
  961. IP ID Sequence Generation: All zeros
  962.  
  963. Service Info: Hosts: 127.0.0.1, PUMPPLC, irc.TestIRC.net; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
  964.  
  965.  
  966.  
  967. Host script results:
  968.  
  969. | nbstat: NetBIOS name: PUMPPLC, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
  970.  
  971. | Names:
  972.  
  973. | PUMPPLC<00> Flags: <unique><active>
  974.  
  975. | PUMPPLC<03> Flags: <unique><active>
  976.  
  977. | PUMPPLC<20> Flags: <unique><active>
  978.  
  979. | \x01\x02__MSBROWSE__\x02<01> Flags: <group><active>
  980.  
  981. | WORKGROUP<00> Flags: <group><active>
  982.  
  983. | WORKGROUP<1d> Flags: <unique><active>
  984.  
  985. |_ WORKGROUP<1e> Flags: <group><active>
  986.  
  987. | smb-os-discovery:
  988.  
  989. | OS: Windows 6.1 (Samba 4.3.11-Ubuntu)
  990.  
  991. | Computer name: pumpplc
  992.  
  993. | NetBIOS computer name: PUMPPLC\x00
  994.  
  995. | Domain name: \x00
  996.  
  997. | FQDN: pumpplc
  998.  
  999. |_ System time: 2019-04-26T15:43:15+00:00
  1000.  
  1001. | smb-security-mode:
  1002.  
  1003. | account_used: guest
  1004.  
  1005. | authentication_level: user
  1006.  
  1007. | challenge_response: supported
  1008.  
  1009. |_ message_signing: disabled (dangerous, but default)
  1010.  
  1011. | smb2-security-mode:
  1012.  
  1013. | 2.02:
  1014.  
  1015. |_ Message signing enabled but not required
  1016.  
  1017. | smb2-time:
  1018.  
  1019. | date: 2019-04-26 08:43:15
  1020.  
  1021. |_ start_date: N/A
  1022.  
  1023.  
  1024.  
  1025. TRACEROUTE
  1026.  
  1027. HOP RTT ADDRESS
  1028.  
  1029. 1 0.14 ms 10.2.0.5
  1030.  
  1031.  
  1032.  
  1033. Nmap scan report for 10.2.0.6
  1034.  
  1035. Host is up (0.00013s latency).
  1036.  
  1037. Not shown: 998 closed ports
  1038.  
  1039. PORT STATE SERVICE VERSION
  1040.  
  1041. 21/tcp open ftp vsftpd 3.0.3
  1042.  
  1043. |_ftp-anon: Anonymous FTP login allowed (FTP code 230)
  1044.  
  1045. | ftp-syst:
  1046.  
  1047. | STAT:
  1048.  
  1049. | FTP server status:
  1050.  
  1051. | Connected to ::ffff:10.2.0.8
  1052.  
  1053. | Logged in as ftp
  1054.  
  1055. | TYPE: ASCII
  1056.  
  1057. | No session bandwidth limit
  1058.  
  1059. | Session timeout in seconds is 300
  1060.  
  1061. | Control connection is plain text
  1062.  
  1063. | Data connections will be plain text
  1064.  
  1065. | At session startup, client count was 2
  1066.  
  1067. | vsFTPd 3.0.3 - secure, fast, stable
  1068.  
  1069. |_End of status
  1070.  
  1071. 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4 (Ubuntu Linux; protocol 2.0)
  1072.  
  1073. | ssh-hostkey:
  1074.  
  1075. | 2048 9d:d4:27:04:e1:02:c6:7f:79:6e:6f:33:ce:3b:55:3c (RSA)
  1076.  
  1077. | 256 2f:c7:80:78:b6:3e:40:03:3a:89:78:c7:e3:9d:67:9f (ECDSA)
  1078.  
  1079. |_ 256 31:31:c7:4a:63:03:b1:db:88:e3:20:30:99:c6:72:66 (ED25519)
  1080.  
  1081. MAC Address: 02:26:FB:EB:44:0A (Unknown)
  1082.  
  1083. No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
  1084.  
  1085. TCP/IP fingerprint:
  1086.  
  1087. OS:SCAN(V=7.70%E=4%D=4/26%OT=21%CT=1%CU=41773%PV=Y%DS=1%DC=D%G=Y%M=0226FB%T
  1088.  
  1089. OS:M=5CC32739%P=i686-pc-windows-windows)SEQ(SP=106%GCD=1%ISR=106%TI=Z%CI=I%
  1090.  
  1091. OS:II=I%TS=8)OPS(O1=M2301ST11NW7%O2=M2301ST11NW7%O3=M2301NNT11NW7%O4=M2301S
  1092.  
  1093. OS:T11NW7%O5=M2301ST11NW7%O6=M2301ST11)WIN(W1=68DF%W2=68DF%W3=68DF%W4=68DF%
  1094.  
  1095. OS:W5=68DF%W6=68DF)ECN(R=Y%DF=Y%T=40%W=6903%O=M2301NNSNW7%CC=Y%Q=)T1(R=Y%DF
  1096.  
  1097. OS:=Y%T=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z
  1098.  
  1099. OS:%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=
  1100.  
  1101. OS:Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%
  1102.  
  1103. OS:RD=0%Q=)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)
  1104.  
  1105. OS:IE(R=Y%DFI=N%T=40%CD=S)
  1106.  
  1107.  
  1108.  
  1109. Uptime guess: 0.004 days (since Fri Apr 26 08:37:54 2019)
  1110.  
  1111. Network Distance: 1 hop
  1112.  
  1113. TCP Sequence Prediction: Difficulty=262 (Good luck!)
  1114.  
  1115. IP ID Sequence Generation: All zeros
  1116.  
  1117. Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
  1118.  
  1119.  
  1120.  
  1121. TRACEROUTE
  1122.  
  1123. HOP RTT ADDRESS
  1124.  
  1125. 1 0.13 ms 10.2.0.6
  1126.  
  1127.  
  1128.  
  1129. Nmap scan report for 10.2.0.7
  1130.  
  1131. Host is up (0.0073s latency).
  1132.  
  1133. Not shown: 994 closed ports
  1134.  
  1135. PORT STATE SERVICE VERSION
  1136.  
  1137. 21/tcp open ftp Microsoft ftpd
  1138.  
  1139. | ftp-anon: Anonymous FTP login allowed (FTP code 230)
  1140.  
  1141. | 04-26-19 08:34AM 1024 .rnd
  1142.  
  1143. | 05-19-18 06:09AM <DIR> inetpub
  1144.  
  1145. | 06-15-17 11:31PM <DIR> ISSA_TOOLS
  1146.  
  1147. | 09-12-16 04:34AM <DIR> Logs
  1148.  
  1149. | 07-16-16 06:23AM <DIR> PerfLogs
  1150.  
  1151. | 05-19-18 06:09AM <DIR> Program Files
  1152.  
  1153. | 05-19-18 06:09AM <DIR> Program Files (x86)
  1154.  
  1155. | 01-17-17 12:19AM <DIR> Users
  1156.  
  1157. | 10-17-18 03:23AM <DIR> Windows
  1158.  
  1159. |_06-15-17 09:14PM 645 wod.log
  1160.  
  1161. | ftp-syst:
  1162.  
  1163. |_ SYST: Windows_NT
  1164.  
  1165. 80/tcp open http Microsoft IIS httpd 10.0
  1166.  
  1167. | http-methods:
  1168.  
  1169. | Supported Methods: OPTIONS TRACE GET HEAD POST
  1170.  
  1171. |_ Potentially risky methods: TRACE
  1172.  
  1173. |_http-server-header: Microsoft-IIS/10.0
  1174.  
  1175. |_http-title: City Water Treatment System
  1176.  
  1177. 135/tcp open msrpc Microsoft Windows RPC
  1178.  
  1179. 139/tcp open netbios-ssn Microsoft Windows netbios-ssn
  1180.  
  1181. 445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
  1182.  
  1183. 3389/tcp open ms-wbt-server Microsoft Terminal Services
  1184.  
  1185. | ssl-cert: Subject: commonName=WEB01
  1186.  
  1187. | Issuer: commonName=WEB01
  1188.  
  1189. | Public Key type: rsa
  1190.  
  1191. | Public Key bits: 2048
  1192.  
  1193. | Signature Algorithm: sha256WithRSAEncryption
  1194.  
  1195. | Not valid before: 2019-04-25T15:34:09
  1196.  
  1197. | Not valid after: 2019-10-25T15:34:09
  1198.  
  1199. | MD5: 8f9f e3f6 de07 fddc 9586 6a41 ad67 02f1
  1200.  
  1201. |_SHA-1: 152e 4364 c3a1 b72d cfbb 505b 14c4 4ba8 6cf5 7042
  1202.  
  1203. |_ssl-date: 2019-04-26T15:43:15+00:00; -1s from scanner time.
  1204.  
  1205. MAC Address: 02:EB:30:E3:1F:2A (Unknown)
  1206.  
  1207. Device type: general purpose
  1208.  
  1209. Running: Microsoft Windows 2016
  1210.  
  1211. OS CPE: cpe:/o:microsoft:windows_server_2016
  1212.  
  1213. OS details: Microsoft Windows Server 2016 build 10586 - 14393
  1214.  
  1215. Uptime guess: 0.007 days (since Fri Apr 26 08:33:22 2019)
  1216.  
  1217. Network Distance: 1 hop
  1218.  
  1219. TCP Sequence Prediction: Difficulty=253 (Good luck!)
  1220.  
  1221. IP ID Sequence Generation: Incremental
  1222.  
  1223. Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows
  1224.  
  1225.  
  1226.  
  1227. Host script results:
  1228.  
  1229. |_clock-skew: mean: -1s, deviation: 0s, median: -1s
  1230.  
  1231. | nbstat: NetBIOS name: WEB01, NetBIOS user: <unknown>, NetBIOS MAC: 02:eb:30:e3:1f:2a (unknown)
  1232.  
  1233. | Names:
  1234.  
  1235. | WORKGROUP<00> Flags: <group><active>
  1236.  
  1237. | WEB01<00> Flags: <unique><active>
  1238.  
  1239. |_ WEB01<20> Flags: <unique><active>
  1240.  
  1241. | smb-security-mode:
  1242.  
  1243. | authentication_level: user
  1244.  
  1245. | challenge_response: supported
  1246.  
  1247. |_ message_signing: disabled (dangerous, but default)
  1248.  
  1249. | smb2-security-mode:
  1250.  
  1251. | 2.02:
  1252.  
  1253. |_ Message signing enabled but not required
  1254.  
  1255. | smb2-time:
  1256.  
  1257. | date: 2019-04-26 08:43:16
  1258.  
  1259. |_ start_date: 2019-04-26 08:34:06
  1260.  
  1261.  
  1262.  
  1263. TRACEROUTE
  1264.  
  1265. HOP RTT ADDRESS
  1266.  
  1267. 1 7.26 ms 10.2.0.7
  1268.  
  1269.  
  1270.  
  1271. Nmap scan report for 10.2.0.9
  1272.  
  1273. Host is up (0.00022s latency).
  1274.  
  1275. Not shown: 997 filtered ports
  1276.  
  1277. PORT STATE SERVICE VERSION
  1278.  
  1279. 22/tcp open ssh OpenSSH 7.4 (protocol 2.0)
  1280.  
  1281. | ssh-hostkey:
  1282.  
  1283. | 2048 20:18:a2:ac:89:6f:e8:10:14:f7:c4:6d:d1:0d:93:db (RSA)
  1284.  
  1285. | 256 01:41:52:c1:17:65:aa:77:1b:0f:f1:29:ae:f5:95:3e (ECDSA)
  1286.  
  1287. |_ 256 a9:99:e0:c3:be:b5:8e:e1:2a:ad:e6:d4:fa:b9:8d:b0 (ED25519)
  1288.  
  1289. 80/tcp open http nginx
  1290.  
  1291. | http-methods:
  1292.  
  1293. |_ Supported Methods: GET HEAD POST OPTIONS
  1294.  
  1295. |_http-server-header: nginx
  1296.  
  1297. |_http-title: Did not follow redirect to https://10.2.0.9/
  1298.  
  1299. 443/tcp open ssl/http nginx
  1300.  
  1301. | http-methods:
  1302.  
  1303. | Supported Methods: GET HEAD POST PUT DELETE OPTIONS
  1304.  
  1305. |_ Potentially risky methods: PUT DELETE
  1306.  
  1307. |_http-server-header: nginx
  1308.  
  1309. |_http-title: Site doesn't have a title (text/html; charset=utf-8).
  1310.  
  1311. | ssl-cert: Subject: commonName=guaws.local
  1312.  
  1313. | Issuer: commonName=guaws.local
  1314.  
  1315. | Public Key type: rsa
  1316.  
  1317. | Public Key bits: 2048
  1318.  
  1319. | Signature Algorithm: sha256WithRSAEncryption
  1320.  
  1321. | Not valid before: 2018-09-27T16:49:27
  1322.  
  1323. | Not valid after: 2028-09-24T16:49:27
  1324.  
  1325. | MD5: 35f1 9b98 ed9d 2122 85ac 1ce9 cd6f 246f
  1326.  
  1327. |_SHA-1: fceb 8e25 839c 8ff9 10d8 8a19 3a54 9c75 02f1 0186
  1328.  
  1329. |_ssl-date: TLS randomness does not represent time
  1330.  
  1331. | tls-alpn:
  1332.  
  1333. |_ http/1.1
  1334.  
  1335. | tls-nextprotoneg:
  1336.  
  1337. |_ http/1.1
  1338.  
  1339. MAC Address: 02:C6:88:FC:45:B4 (Unknown)
  1340.  
  1341. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1342.  
  1343. Device type: general purpose|PBX
  1344.  
  1345. Running (JUST GUESSING): Linux 3.X (95%), Vodavi embedded (87%)
  1346.  
  1347. OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/h:vodavi:xts-ip
  1348.  
  1349. Aggressive OS guesses: Linux 3.10 - 3.13 (95%), Linux 3.8 (88%), Vodavi XTS-IP PBX (87%)
  1350.  
  1351. No exact OS matches for host (test conditions non-ideal).
  1352.  
  1353. Uptime guess: 9.857 days (since Tue Apr 16 12:09:32 2019)
  1354.  
  1355. Network Distance: 1 hop
  1356.  
  1357. TCP Sequence Prediction: Difficulty=262 (Good luck!)
  1358.  
  1359. IP ID Sequence Generation: All zeros
  1360.  
  1361.  
  1362.  
  1363. TRACEROUTE
  1364.  
  1365. HOP RTT ADDRESS
  1366.  
  1367. 1 0.22 ms 10.2.0.9
  1368.  
  1369.  
  1370.  
  1371. Initiating SYN Stealth Scan at 08:43
  1372.  
  1373. Scanning 10.2.0.8 [1000 ports]
  1374.  
  1375. Discovered open port 139/tcp on 10.2.0.8
  1376.  
  1377. Discovered open port 445/tcp on 10.2.0.8
  1378.  
  1379. Discovered open port 135/tcp on 10.2.0.8
  1380.  
  1381. Discovered open port 3389/tcp on 10.2.0.8
  1382.  
  1383. Completed SYN Stealth Scan at 08:43, 1.31s elapsed (1000 total ports)
  1384.  
  1385. Initiating Service scan at 08:43
  1386.  
  1387. Scanning 4 services on 10.2.0.8
  1388.  
  1389. Completed Service scan at 08:44, 11.03s elapsed (4 services on 1 host)
  1390.  
  1391. Initiating OS detection (try #1) against 10.2.0.8
  1392.  
  1393. Retrying OS detection (try #2) against 10.2.0.8
  1394.  
  1395. Retrying OS detection (try #3) against 10.2.0.8
  1396.  
  1397. Retrying OS detection (try #4) against 10.2.0.8
  1398.  
  1399. Retrying OS detection (try #5) against 10.2.0.8
  1400.  
  1401. NSE: Script scanning 10.2.0.8.
  1402.  
  1403. Initiating NSE at 08:44
  1404.  
  1405. Completed NSE at 08:44, 30.12s elapsed
  1406.  
  1407. Initiating NSE at 08:44
  1408.  
  1409. Completed NSE at 08:44, 0.00s elapsed
  1410.  
  1411. Nmap scan report for 10.2.0.8
  1412.  
  1413. Host is up (0.00s latency).
  1414.  
  1415. Not shown: 996 closed ports
  1416.  
  1417. PORT STATE SERVICE VERSION
  1418.  
  1419. 135/tcp open msrpc Microsoft Windows RPC
  1420.  
  1421. 139/tcp open netbios-ssn Microsoft Windows netbios-ssn
  1422.  
  1423. 445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
  1424.  
  1425. 3389/tcp open ms-wbt-server Microsoft Terminal Services
  1426.  
  1427. | ssl-cert: Subject: commonName=TARGETWINDOWS01
  1428.  
  1429. | Issuer: commonName=TARGETWINDOWS01
  1430.  
  1431. | Public Key type: rsa
  1432.  
  1433. | Public Key bits: 2048
  1434.  
  1435. | Signature Algorithm: sha256WithRSAEncryption
  1436.  
  1437. | Not valid before: 2019-04-25T15:34:01
  1438.  
  1439. | Not valid after: 2019-10-25T15:34:01
  1440.  
  1441. | MD5: 6ad1 20ca 3c9f a7dd 023f fd4a d85b 23f4
  1442.  
  1443. |_SHA-1: e45d 7fbf f510 ee05 7f06 b057 c2ea 91d5 61c1 7422
  1444.  
  1445. |_ssl-date: 2019-04-26T15:44:17+00:00; 0s from scanner time.
  1446.  
  1447. No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
  1448.  
  1449. TCP/IP fingerprint:
  1450.  
  1451. OS:SCAN(V=7.70%E=4%D=4/26%OT=135%CT=1%CU=32420%PV=Y%DS=0%DC=L%G=Y%TM=5CC327
  1452.  
  1453. OS:6F%P=i686-pc-windows-windows)SEQ(SP=FF%GCD=1%ISR=108%TI=I%CI=I%II=I%SS=S
  1454.  
  1455. OS:%TS=A)SEQ(SP=100%GCD=1%ISR=108%TI=I%CI=I%II=I%TS=A)OPS(O1=M5B4NW8ST11%O2
  1456.  
  1457. OS:=M5B4NW8ST11%O3=M5B4NW8NNT11%O4=M5B4NW8ST11%O5=M5B4NW8ST11%O6=M5B4ST11)W
  1458.  
  1459. OS:IN(W1=2000%W2=2000%W3=2000%W4=2000%W5=2000%W6=2000)ECN(R=Y%DF=Y%T=80%W=2
  1460.  
  1461. OS:000%O=M5B4NW8NNS%CC=Y%Q=)T1(R=Y%DF=Y%T=80%S=O%A=S+%F=AS%RD=0%Q=)T2(R=Y%D
  1462.  
  1463. OS:F=Y%T=80%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)T3(R=Y%DF=Y%T=80%W=0%S=Z%A=O%F=AR%O
  1464.  
  1465. OS:=%RD=0%Q=)T4(R=Y%DF=Y%T=80%W=0%S=A%A=O%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=80%W
  1466.  
  1467. OS:=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=80%W=0%S=A%A=O%F=R%O=%RD=0%Q=)
  1468.  
  1469. OS:T7(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=80%IPL=164%U
  1470.  
  1471. OS:N=0%RIPL=G%RID=G%RIPCK=Z%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=80%CD=Z)
  1472.  
  1473.  
  1474.  
  1475. Uptime guess: 0.008 days (since Fri Apr 26 08:33:21 2019)
  1476.  
  1477. Network Distance: 0 hops
  1478.  
  1479. TCP Sequence Prediction: Difficulty=256 (Good luck!)
  1480.  
  1481. IP ID Sequence Generation: Incremental
  1482.  
  1483. Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows
  1484.  
  1485.  
  1486.  
  1487. Host script results:
  1488.  
  1489. | smb-security-mode:
  1490.  
  1491. | authentication_level: user
  1492.  
  1493. | challenge_response: supported
  1494.  
  1495. |_ message_signing: disabled (dangerous, but default)
  1496.  
  1497. | smb2-security-mode:
  1498.  
  1499. | 2.02:
  1500.  
  1501. |_ Message signing enabled but not required
  1502.  
  1503. | smb2-time:
  1504.  
  1505. | date: 2019-04-26 08:44:20
  1506.  
  1507. |_ start_date: 2019-04-26 08:33:58
  1508.  
  1509.  
  1510.  
  1511. NSE: Script Post-scanning.
  1512.  
  1513. Initiating NSE at 08:44
  1514.  
  1515. Completed NSE at 08:44, 0.00s elapsed
  1516.  
  1517. Initiating NSE at 08:44
  1518.  
  1519. Completed NSE at 08:44, 0.00s elapsed
  1520.  
  1521. Post-scan script results:
  1522.  
  1523. | clock-skew:
  1524.  
  1525. | 0s:
  1526.  
  1527. | 10.2.0.5
  1528.  
  1529. |_ 10.2.0.8
  1530.  
  1531. Read data files from: C:\Program Files (x86)\Nmap
  1532.  
  1533. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1534.  
  1535. Nmap done: 256 IP addresses (7 hosts up) scanned in 241.38 seconds
  1536.  
  1537. Raw packets sent: 11013 (502.748KB) | Rcvd: 7784 (347.619KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement