Advertisement
Guest User

Win2k Scan

a guest
Mar 12th, 2018
107
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.66 KB | None | 0 0
  1. Starting Nmap 6.47 ( http://nmap.org ) at 2018-03-12 19:50 Eastern Daylight Time
  2. NSE: Loaded 118 scripts for scanning.
  3. NSE: Script Pre-scanning.
  4. Initiating Ping Scan at 19:50
  5. Scanning 192.168.14.128 [4 ports]
  6. Completed Ping Scan at 19:50, 0.06s elapsed (1 total hosts)
  7. Initiating Parallel DNS resolution of 1 host. at 19:50
  8. Completed Parallel DNS resolution of 1 host. at 19:50, 0.05s elapsed
  9. Initiating SYN Stealth Scan at 19:50
  10. Scanning 192.168.14.128 [1000 ports]
  11. Discovered open port 139/tcp on 192.168.14.128
  12. Discovered open port 135/tcp on 192.168.14.128
  13. Discovered open port 445/tcp on 192.168.14.128
  14. Discovered open port 1025/tcp on 192.168.14.128
  15. Discovered open port 12345/tcp on 192.168.14.128
  16. Completed SYN Stealth Scan at 19:50, 7.46s elapsed (1000 total ports)
  17. Initiating Service scan at 19:50
  18. Scanning 5 services on 192.168.14.128
  19. Completed Service scan at 19:51, 6.02s elapsed (5 services on 1 host)
  20. Initiating OS detection (try #1) against 192.168.14.128
  21. Initiating Traceroute at 19:51
  22. Completed Traceroute at 19:51, 1.03s elapsed
  23. Initiating Parallel DNS resolution of 2 hosts. at 19:51
  24. Completed Parallel DNS resolution of 2 hosts. at 19:51, 0.08s elapsed
  25. NSE: Script scanning 192.168.14.128.
  26. Initiating NSE at 19:51
  27. Completed NSE at 19:51, 38.20s elapsed
  28. Initiating NSE at 19:51
  29. Completed NSE at 19:51, 0.00s elapsed
  30. Nmap scan report for 192.168.14.128
  31. Host is up (0.30s latency).
  32. Not shown: 994 closed ports
  33. PORT STATE SERVICE VERSION
  34. 135/tcp open msrpc Microsoft Windows RPC
  35. 139/tcp open netbios-ssn
  36. 445/tcp open microsoft-ds Microsoft Windows XP microsoft-ds
  37. 514/tcp filtered shell
  38. 1025/tcp open msrpc Microsoft Windows RPC
  39. 12345/tcp open netbus NetBus trojan 1.70
  40. | netbus-info:
  41. | APPLICATIONS
  42. | Program Manager
  43. | INFO
  44. | Program Path: C:\Documents and Settings\Admin\Desktop\netbus\patch.exe
  45. | Restart persistent: Yes
  46. | Login ID: Admin
  47. | Clients connected to this host: 1
  48. | SETUP
  49. | TCP-port: 12345
  50. | Log traffic: 0
  51. | Password:
  52. | Notify to:
  53. | Notify from:
  54. | SMTP-server:
  55. | VOLUME
  56. | Wave: 128
  57. | Synth: 128
  58. |_ Cd: 0
  59. Device type: general purpose
  60. Running: Microsoft Windows 7|XP
  61. OS CPE: cpe:/o:microsoft:windows_7:::enterprise cpe:/o:microsoft:windows_xp::sp3
  62. OS details: Microsoft Windows 7 Enterprise, Microsoft Windows XP SP3
  63. Network Distance: 2 hops
  64. TCP Sequence Prediction: Difficulty=260 (Good luck!)
  65. IP ID Sequence Generation: Incremental
  66. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  67.  
  68. Host script results:
  69. | nbstat: NetBIOS name: LIAM-913FN14T9K, NetBIOS user: ADMIN, NetBIOS MAC: 00:0c:29:e7:3e:eb (VMware)
  70. | Names:
  71. | LIAM-913FN14T9K<00> Flags: <unique><active>
  72. | WORKGROUP<00> Flags: <group><active>
  73. | LIAM-913FN14T9K<20> Flags: <unique><active>
  74. | WORKGROUP<1e> Flags: <group><active>
  75. | LIAM-913FN14T9K<03> Flags: <unique><active>
  76. |_ ADMIN<03> Flags: <unique><active>
  77. | smb-security-mode:
  78. | Account that was used for smb scripts: guest
  79. | User-level authentication
  80. | SMB Security: Challenge/response passwords supported
  81. |_ Message signing disabled (dangerous, but default)
  82. |_smbv2-enabled: Server doesn't support SMBv2 protocol
  83.  
  84. TRACEROUTE (using port 5900/tcp)
  85. HOP RTT ADDRESS
  86. 1 0.00 ms 192.168.77.2
  87. 2 0.00 ms 192.168.14.128
  88.  
  89. NSE: Script Post-scanning.
  90. Read data files from: C:\Program Files\Nmap
  91. OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  92. Nmap done: 1 IP address (1 host up) scanned in 61.35 seconds
  93. Raw packets sent: 1180 (53.566KB) | Rcvd: 1226 (49.725KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement