Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-21 22:14 Central Europe Standard Time
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 22:14
- Completed NSE at 22:14, 0.00s elapsed
- Initiating NSE at 22:14
- Completed NSE at 22:14, 0.00s elapsed
- Initiating Ping Scan at 22:14
- Scanning 192.168.88.10 [4 ports]
- Completed Ping Scan at 22:14, 0.23s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 22:14
- Completed Parallel DNS resolution of 1 host. at 22:14, 0.01s elapsed
- Initiating SYN Stealth Scan at 22:14
- Scanning 192.168.88.10 [1000 ports]
- Discovered open port 135/tcp on 192.168.88.10
- Discovered open port 445/tcp on 192.168.88.10
- Discovered open port 3389/tcp on 192.168.88.10
- Discovered open port 443/tcp on 192.168.88.10
- Discovered open port 139/tcp on 192.168.88.10
- Discovered open port 3306/tcp on 192.168.88.10
- Discovered open port 80/tcp on 192.168.88.10
- Discovered open port 5050/tcp on 192.168.88.10
- Discovered open port 8081/tcp on 192.168.88.10
- Completed SYN Stealth Scan at 22:14, 8.07s elapsed (1000 total ports)
- Initiating Service scan at 22:14
- Scanning 9 services on 192.168.88.10
- Completed Service scan at 22:14, 12.11s elapsed (9 services on 1 host)
- Initiating OS detection (try #1) against 192.168.88.10
- Retrying OS detection (try #2) against 192.168.88.10
- Initiating Traceroute at 22:14
- Completed Traceroute at 22:14, 0.02s elapsed
- Initiating Parallel DNS resolution of 3 hosts. at 22:14
- Completed Parallel DNS resolution of 3 hosts. at 22:14, 0.01s elapsed
- NSE: Script scanning 192.168.88.10.
- Initiating NSE at 22:14
- Completed NSE at 22:15, 47.41s elapsed
- Initiating NSE at 22:15
- Completed NSE at 22:15, 0.07s elapsed
- Nmap scan report for 192.168.88.10
- Host is up (0.012s latency).
- Not shown: 991 filtered ports
- PORT STATE SERVICE VERSION
- 80/tcp open http Apache httpd 2.4.23 ((Win32) OpenSSL/1.0.2h PHP/5.6.24)
- |_http-favicon: Unknown favicon MD5: 6EB4A43CB64C97F76562AF703893C8FD
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: Apache/2.4.23 (Win32) OpenSSL/1.0.2h PHP/5.6.24
- | http-title: b\xC3\xA9la
- |_Requested resource was http://192.168.88.10/Muximux/
- 135/tcp open msrpc Microsoft Windows RPC
- 139/tcp open netbios-ssn Microsoft Windows netbios-ssn
- 443/tcp open ssl/http Apache httpd 2.4.23 ((Win32) OpenSSL/1.0.2h PHP/5.6.24)
- |_http-favicon: Unknown favicon MD5: 6EB4A43CB64C97F76562AF703893C8FD
- | http-methods:
- |_ Supported Methods: GET HEAD POST
- |_http-server-header: Apache/2.4.23 (Win32) OpenSSL/1.0.2h PHP/5.6.24
- | http-title: b\xC3\xA9la
- |_Requested resource was https://192.168.88.10/Muximux/
- | ssl-cert: Subject: commonName=localhost
- | Issuer: commonName=localhost
- | Public Key type: rsa
- | Public Key bits: 1024
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2009-11-10T23:48:47
- | Not valid after: 2019-11-08T23:48:47
- | MD5: a0a4 4cc9 9e84 b26f 9e63 9f9e d229 dee0
- |_SHA-1: b023 8c54 7a90 5bfa 119c 4e8b acca eacf 3649 1ff6
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- | http/1.1
- |_ http/1.1
- 445/tcp open microsoft-ds?
- 3306/tcp open mysql MySQL 5.6.38-log
- | mysql-info:
- | Protocol: 10
- | Version: 5.6.38-log
- | Thread ID: 6
- | Capabilities flags: 63487
- | Some Capabilities: Support41Auth, LongColumnFlag, Speaks41ProtocolOld, SupportsTransactions, ODBCClient, ConnectWithDatabase, IgnoreSigpipes, Speaks41ProtocolNew, InteractiveClient, SupportsCompression, IgnoreSpaceBeforeParenthesis, FoundRows, LongPassword, SupportsLoadDataLocal, DontAllowDatabaseTableColumn, SupportsMultipleStatments, SupportsAuthPlugins, SupportsMultipleResults
- | Status: Autocommit
- | Salt: W-v/#aCg_&<<W!>Sf+@>
- |_ Auth Plugin Name: 83
- 3389/tcp open ms-wbt-server Microsoft Terminal Services
- | ssl-cert: Subject: commonName=HOLOCRON
- | Issuer: commonName=HOLOCRON
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-10-02T15:04:31
- | Not valid after: 2019-04-03T15:04:31
- | MD5: 842a 08eb fc64 d41b 1b02 c77e 2de2 19f3
- |_SHA-1: 65e6 8eb8 1ee8 1d46 24c7 aa7d 9beb cbb6 8056 ae94
- |_ssl-date: 2019-01-21T21:14:40+00:00; -1s from scanner time.
- 5050/tcp open http Tornado httpd 4.1
- |_http-favicon: Unknown favicon MD5: E2146B5015E106623AC6C682170A2C0F
- | http-methods:
- |_ Supported Methods: GET
- |_http-server-header: TornadoServer/4.1
- | http-title: CouchPotato
- |_Requested resource was /login/?next=%2F
- |_http-trane-info: Problem with XML parsing of /evox/about
- 8081/tcp open http Tornado httpd 4.5.1
- | http-methods:
- |_ Supported Methods: GET POST
- | http-robots.txt: 1 disallowed entry
- |_/
- | http-title: SickRage - Home
- |_Requested resource was /home/
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: specialized|general purpose
- Running (JUST GUESSING): AVtech embedded (87%), Microsoft Windows XP (87%), FreeBSD 6.X|10.X (86%)
- OS CPE: cpe:/o:microsoft:windows_xp::sp2 cpe:/o:freebsd:freebsd:6.2 cpe:/o:freebsd:freebsd:10.3
- Aggressive OS guesses: AVtech Room Alert 26W environmental monitor (87%), Microsoft Windows XP SP2 (87%), FreeBSD 6.2-RELEASE (86%), FreeBSD 10.3-STABLE (85%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 3 hops
- TCP Sequence Prediction: Difficulty=258 (Good luck!)
- IP ID Sequence Generation: Incremental
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- Host script results:
- | smb2-security-mode:
- | 2.02:
- |_ Message signing enabled but not required
- | smb2-time:
- | date: 2019-01-21 22:14:39
- |_ start_date: N/A
- TRACEROUTE (using port 135/tcp)
- HOP RTT ADDRESS
- 1 0.00 ms 192.168.66.1
- 2 16.00 ms 192.168.88.1
- 3 15.00 ms 192.168.88.10
- NSE: Script Post-scanning.
- Initiating NSE at 22:15
- Completed NSE at 22:15, 0.00s elapsed
- Initiating NSE at 22:15
- Completed NSE at 22:15, 0.00s elapsed
- Read data files from: C:\Program Files (x86)\Nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 74.31 seconds
- Raw packets sent: 3082 (139.916KB) | Rcvd: 64 (3.248KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement