Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting Nmap 6.47 ( http://nmap.org ) at 2018-03-12 19:50 Eastern Daylight Time
- NSE: Loaded 118 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating Ping Scan at 19:50
- Scanning 192.168.14.128 [4 ports]
- Completed Ping Scan at 19:50, 0.06s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 19:50
- Completed Parallel DNS resolution of 1 host. at 19:50, 0.05s elapsed
- Initiating SYN Stealth Scan at 19:50
- Scanning 192.168.14.128 [1000 ports]
- Discovered open port 139/tcp on 192.168.14.128
- Discovered open port 135/tcp on 192.168.14.128
- Discovered open port 445/tcp on 192.168.14.128
- Discovered open port 1025/tcp on 192.168.14.128
- Discovered open port 12345/tcp on 192.168.14.128
- Completed SYN Stealth Scan at 19:50, 7.46s elapsed (1000 total ports)
- Initiating Service scan at 19:50
- Scanning 5 services on 192.168.14.128
- Completed Service scan at 19:51, 6.02s elapsed (5 services on 1 host)
- Initiating OS detection (try #1) against 192.168.14.128
- Initiating Traceroute at 19:51
- Completed Traceroute at 19:51, 1.03s elapsed
- Initiating Parallel DNS resolution of 2 hosts. at 19:51
- Completed Parallel DNS resolution of 2 hosts. at 19:51, 0.08s elapsed
- NSE: Script scanning 192.168.14.128.
- Initiating NSE at 19:51
- Completed NSE at 19:51, 38.20s elapsed
- Initiating NSE at 19:51
- Completed NSE at 19:51, 0.00s elapsed
- Nmap scan report for 192.168.14.128
- Host is up (0.30s latency).
- Not shown: 994 closed ports
- PORT STATE SERVICE VERSION
- 135/tcp open msrpc Microsoft Windows RPC
- 139/tcp open netbios-ssn
- 445/tcp open microsoft-ds Microsoft Windows XP microsoft-ds
- 514/tcp filtered shell
- 1025/tcp open msrpc Microsoft Windows RPC
- 12345/tcp open netbus NetBus trojan 1.70
- | netbus-info:
- | APPLICATIONS
- | Program Manager
- | INFO
- | Program Path: C:\Documents and Settings\Admin\Desktop\netbus\patch.exe
- | Restart persistent: Yes
- | Login ID: Admin
- | Clients connected to this host: 1
- | SETUP
- | TCP-port: 12345
- | Log traffic: 0
- | Password:
- | Notify to:
- | Notify from:
- | SMTP-server:
- | VOLUME
- | Wave: 128
- | Synth: 128
- |_ Cd: 0
- Device type: general purpose
- Running: Microsoft Windows 7|XP
- OS CPE: cpe:/o:microsoft:windows_7:::enterprise cpe:/o:microsoft:windows_xp::sp3
- OS details: Microsoft Windows 7 Enterprise, Microsoft Windows XP SP3
- Network Distance: 2 hops
- TCP Sequence Prediction: Difficulty=260 (Good luck!)
- IP ID Sequence Generation: Incremental
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- Host script results:
- | nbstat: NetBIOS name: LIAM-913FN14T9K, NetBIOS user: ADMIN, NetBIOS MAC: 00:0c:29:e7:3e:eb (VMware)
- | Names:
- | LIAM-913FN14T9K<00> Flags: <unique><active>
- | WORKGROUP<00> Flags: <group><active>
- | LIAM-913FN14T9K<20> Flags: <unique><active>
- | WORKGROUP<1e> Flags: <group><active>
- | LIAM-913FN14T9K<03> Flags: <unique><active>
- |_ ADMIN<03> Flags: <unique><active>
- | smb-security-mode:
- | Account that was used for smb scripts: guest
- | User-level authentication
- | SMB Security: Challenge/response passwords supported
- |_ Message signing disabled (dangerous, but default)
- |_smbv2-enabled: Server doesn't support SMBv2 protocol
- TRACEROUTE (using port 5900/tcp)
- HOP RTT ADDRESS
- 1 0.00 ms 192.168.77.2
- 2 0.00 ms 192.168.14.128
- NSE: Script Post-scanning.
- Read data files from: C:\Program Files\Nmap
- OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 61.35 seconds
- Raw packets sent: 1180 (53.566KB) | Rcvd: 1226 (49.725KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement