Advertisement
Islam-Hacker

nmap -v -A soulsplit.com

Mar 7th, 2012
7,511
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.98 KB | None | 0 0
  1. JM511 - Saudi Arabia Hackers - [email protected]
  2. ---------------------------------------------
  3.  
  4. root@bt:/pentest/enumeration/web/whatweb# nmap -v -A soulsplit.com
  5.  
  6. Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-03-07 13:20 GMT
  7. NSE: Loaded 87 scripts for scanning.
  8. NSE: Script Pre-scanning.
  9. Initiating Ping Scan at 13:20
  10. Scanning soulsplit.com (213.152.181.11) [4 ports]
  11. Completed Ping Scan at 13:20, 0.05s elapsed (1 total hosts)
  12. Initiating Parallel DNS resolution of 1 host. at 13:20
  13. Completed Parallel DNS resolution of 1 host. at 13:20, 9.90s elapsed
  14. Initiating SYN Stealth Scan at 13:20
  15. Scanning soulsplit.com (213.152.181.11) [1000 ports]
  16. Discovered open port 80/tcp on 213.152.181.11
  17. Increasing send delay for 213.152.181.11 from 0 to 5 due to 136 out of 453 dropped probes since last increase.
  18. Completed SYN Stealth Scan at 13:20, 7.67s elapsed (1000 total ports)
  19. Initiating Service scan at 13:20
  20. Scanning 1 service on soulsplit.com (213.152.181.11)
  21. Completed Service scan at 13:20, 5.07s elapsed (1 service on 1 host)
  22. Initiating OS detection (try #1) against soulsplit.com (213.152.181.11)
  23. Retrying OS detection (try #2) against soulsplit.com (213.152.181.11)
  24. Initiating Traceroute at 13:20
  25. Completed Traceroute at 13:20, 0.06s elapsed
  26. Initiating Parallel DNS resolution of 10 hosts. at 13:20
  27. Completed Parallel DNS resolution of 10 hosts. at 13:21, 9.71s elapsed
  28. NSE: Script scanning 213.152.181.11.
  29. Initiating NSE at 13:21
  30. Completed NSE at 13:21, 9.56s elapsed
  31. Nmap scan report for soulsplit.com (213.152.181.11)
  32. Host is up (0.042s latency).
  33. Not shown: 999 closed ports
  34. PORT STATE SERVICE VERSION
  35. 80/tcp open tcpwrapped
  36. |_http-methods: No Allow or Public header in OPTIONS response (status code 302)
  37. Aggressive OS guesses: OpenBSD 4.3 (97%), FreeBSD 7.1-RELEASE - 9.0-CURRENT (93%), FreeBSD 7.0-RELEASE (92%), OpenBSD 4.0 (x86) (91%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (90%), Asus RT-N16 WAP (Linux 2.6) (89%), Tomato 1.28 (Linux 2.6.22) (89%), FreeBSD 8.1-RELEASE (89%), OpenWrt White Russian 0.9 (Linux 2.4.30) (89%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (89%)
  38. No exact OS matches for host (test conditions non-ideal).
  39. Uptime guess: 0.000 days (since Wed Mar 7 13:20:48 2012)
  40. Network Distance: 11 hops
  41. TCP Sequence Prediction: Difficulty=253 (Good luck!)
  42. IP ID Sequence Generation: Busy server or unknown class
  43.  
  44. TRACEROUTE (using port 111/tcp)
  45. HOP RTT ADDRESS
  46. 1 10.42 ms 192.168.1.1
  47. 2 31.92 ms host-92-20-64-1.as13285.net (92.20.64.1)
  48. 3 37.05 ms host-78-151-225-225.static.as13285.net (78.151.225.225)
  49. 4 33.98 ms host-78-151-225-224.static.as13285.net (78.151.225.224)
  50. 5 41.25 ms xe-11-2-0-rt001.sov.as13285.net (62.24.240.5)
  51. 6 45.26 ms xe-11-2-0-rt001.the.as13285.net (62.24.240.13)
  52. 7 36.06 ms host-78-144-0-148.as13285.net (78.144.0.148)
  53. 8 35.06 ms host-78-144-0-145.as13285.net (78.144.0.145)
  54. 9 41.50 ms xe-2-2.R1-RTM.global-layer.com (109.202.96.102)
  55. 10 46.39 ms xe-2-2.R1-RTM.global-layer.com (109.202.96.102)
  56. 11 40.28 ms 213.152.181.11
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement