Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- $ nmap -Pn -v -A -T4 10.0.0.86
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-04-18 07:34 EDT
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 07:34
- Completed NSE at 07:34, 0.00s elapsed
- Initiating NSE at 07:34
- Completed NSE at 07:34, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 07:34
- Completed Parallel DNS resolution of 1 host. at 07:34, 0.00s elapsed
- Initiating Connect Scan at 07:34
- Scanning 10.0.0.86 [1000 ports]
- Discovered open port 139/tcp on 10.0.0.86
- Discovered open port 53/tcp on 10.0.0.86
- Discovered open port 135/tcp on 10.0.0.86
- Discovered open port 445/tcp on 10.0.0.86
- Discovered open port 3389/tcp on 10.0.0.86
- Discovered open port 593/tcp on 10.0.0.86
- Discovered open port 464/tcp on 10.0.0.86
- Discovered open port 3269/tcp on 10.0.0.86
- Discovered open port 389/tcp on 10.0.0.86
- Discovered open port 636/tcp on 10.0.0.86
- Discovered open port 3268/tcp on 10.0.0.86
- Discovered open port 88/tcp on 10.0.0.86
- Completed Connect Scan at 07:34, 10.71s elapsed (1000 total ports)
- Initiating Service scan at 07:34
- Scanning 12 services on 10.0.0.86
- Stats: 0:01:29 elapsed; 0 hosts completed (1 up), 1 undergoing Service Scan
- Service scan Timing: About 91.67% done; ETC: 07:36 (0:00:07 remaining)
- Completed Service scan at 07:36, 136.17s elapsed (12 services on 1 host)
- NSE: Script scanning 10.0.0.86.
- Initiating NSE at 07:36
- Completed NSE at 07:38, 86.68s elapsed
- Initiating NSE at 07:38
- Completed NSE at 07:38, 1.01s elapsed
- Nmap scan report for 10.0.0.86
- Host is up (0.0023s latency).
- Not shown: 988 filtered ports
- PORT STATE SERVICE VERSION
- 53/tcp open domain?
- | fingerprint-strings:
- | DNSVersionBindReqTCP:
- | version
- |_ bind
- 88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2019-04-18 11:34:40Z)
- 135/tcp open msrpc Microsoft Windows RPC
- 139/tcp open netbios-ssn Microsoft Windows netbios-ssn
- 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: WIT-D03.local, Site: Default-First-Site-Name)
- 445/tcp open microsoft-ds?
- 464/tcp open kpasswd5?
- 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
- 636/tcp open tcpwrapped
- 3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: WIT-D03.local, Site: Default-First-Site-Name)
- 3269/tcp open tcpwrapped
- 3389/tcp open ms-wbt-server Microsoft Terminal Services
- | ssl-cert: Subject: commonName=Stephan03.WIT-D03.local
- | Issuer: commonName=Stephan03.WIT-D03.local
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-04-04T08:52:43
- | Not valid after: 2019-10-04T08:52:43
- | MD5: 1747 67b8 b9ad dd5b 7925 0875 8cd1 656d
- |_SHA-1: e495 4ad4 75f5 151a cf8c c0b4 9229 e6b4 4594 4641
- |_ssl-date: 2019-04-18T11:36:51+00:00; 0s from scanner time.
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port53-TCP:V=7.70%I=7%D=4/18%Time=5CB860D5%P=x86_64-pc-linux-gnu%r(DNSV
- SF:ersionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\
- SF:x04bind\0\0\x10\0\x03");
- Service Info: Host: STEPHAN03; OS: Windows; CPE: cpe:/o:microsoft:windows
- Host script results:
- | nbstat: NetBIOS name: STEPHAN03, NetBIOS user: <unknown>, NetBIOS MAC: 00:0d:3a:39:d6:df (Microsoft)
- | Names:
- | WIT-D03<00> Flags: <group><active>
- | STEPHAN03<00> Flags: <unique><active>
- | WIT-D03<1c> Flags: <group><active>
- | STEPHAN03<20> Flags: <unique><active>
- |_ WIT-D03<1b> Flags: <unique><active>
- | smb2-security-mode:
- | 2.02:
- |_ Message signing enabled and required
- | smb2-time:
- | date: 2019-04-18 07:36:51
- |_ start_date: 2019-04-18 07:30:22
- NSE: Script Post-scanning.
- Initiating NSE at 07:38
- Completed NSE at 07:38, 0.00s elapsed
- Initiating NSE at 07:38
- Completed NSE at 07:38, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 235.07 seconds
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement