Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-16 14:36 CET
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 14:36
- Completed NSE at 14:36, 0.00s elapsed
- Initiating NSE at 14:36
- Completed NSE at 14:36, 0.00s elapsed
- Initiating ARP Ping Scan at 14:36
- Scanning 10.11.200.239 [1 port]
- Completed ARP Ping Scan at 14:36, 0.00s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 14:36
- Completed Parallel DNS resolution of 1 host. at 14:36, 0.00s elapsed
- Initiating SYN Stealth Scan at 14:36
- Scanning 10.11.200.239 [1000 ports]
- Discovered open port 135/tcp on 10.11.200.239
- Discovered open port 445/tcp on 10.11.200.239
- Discovered open port 139/tcp on 10.11.200.239
- Discovered open port 49154/tcp on 10.11.200.239
- Discovered open port 49157/tcp on 10.11.200.239
- Discovered open port 49152/tcp on 10.11.200.239
- Discovered open port 49155/tcp on 10.11.200.239
- Discovered open port 5357/tcp on 10.11.200.239
- Discovered open port 49156/tcp on 10.11.200.239
- Discovered open port 49153/tcp on 10.11.200.239
- Completed SYN Stealth Scan at 14:36, 1.39s elapsed (1000 total ports)
- Initiating Service scan at 14:36
- Scanning 10 services on 10.11.200.239
- Service scan Timing: About 50.00% done; ETC: 14:38 (0:00:54 remaining)
- Completed Service scan at 14:37, 58.58s elapsed (10 services on 1 host)
- Initiating OS detection (try #1) against 10.11.200.239
- NSE: Script scanning 10.11.200.239.
- Initiating NSE at 14:37
- Completed NSE at 14:37, 5.61s elapsed
- Initiating NSE at 14:37
- Completed NSE at 14:37, 0.00s elapsed
- Nmap scan report for 10.11.200.239
- Host is up (0.00057s latency).
- Not shown: 990 closed ports
- PORT STATE SERVICE VERSION
- 135/tcp open msrpc Microsoft Windows RPC
- 139/tcp open netbios-ssn Microsoft Windows netbios-ssn
- 445/tcp open microsoft-ds Windows 7 Professional 7601 Service Pack 1 microsoft-ds (workgroup: WORKGROUP)
- 5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
- |_http-server-header: Microsoft-HTTPAPI/2.0
- |_http-title: Service Unavailable
- 49152/tcp open msrpc Microsoft Windows RPC
- 49153/tcp open msrpc Microsoft Windows RPC
- 49154/tcp open msrpc Microsoft Windows RPC
- 49155/tcp open msrpc Microsoft Windows RPC
- 49156/tcp open msrpc Microsoft Windows RPC
- 49157/tcp open msrpc Microsoft Windows RPC
- MAC Address: 08:00:27:58:A0:7C (Oracle VirtualBox virtual NIC)
- Device type: general purpose
- Running: Microsoft Windows 7|2008|8.1
- OS CPE: cpe:/o:microsoft:windows_7::- cpe:/o:microsoft:windows_7::sp1 cpe:/o:microsoft:windows_server_2008::sp1 cpe:/o:microsoft:windows_server_2008:r2 cpe:/o:microsoft:windows_8 cpe:/o:microsoft:windows_8.1
- OS details: Microsoft Windows 7 SP0 - SP1, Windows Server 2008 SP1, Windows Server 2008 R2, Windows 8, or Windows 8.1 Update 1
- Uptime guess: 0.099 days (since Fri Nov 16 12:15:35 2018)
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=260 (Good luck!)
- IP ID Sequence Generation: Incremental
- Service Info: Host: CS2LAB-PC; OS: Windows; CPE: cpe:/o:microsoft:windows
- Host script results:
- |_clock-skew: mean: -19m58s, deviation: 34m38s, median: 1s
- | nbstat: NetBIOS name: CS2LAB-PC, NetBIOS user: <unknown>, NetBIOS MAC: 08:00:27:58:a0:7c (Oracle VirtualBox virtual NIC)
- | Names:
- |_ CS2LAB-PC<20> Flags: <unique><active>
- | smb-os-discovery:
- | OS: Windows 7 Professional 7601 Service Pack 1 (Windows 7 Professional 6.1)
- | OS CPE: cpe:/o:microsoft:windows_7::sp1:professional
- | Computer name: cs2lab-PC
- | NetBIOS computer name: CS2LAB-PC\x00
- | Workgroup: WORKGROUP\x00
- |_ System time: 2018-11-16T14:37:51+01:00
- | smb-security-mode:
- | account_used: guest
- | authentication_level: user
- | challenge_response: supported
- |_ message_signing: disabled (dangerous, but default)
- | smb2-security-mode:
- | 2.02:
- |_ Message signing enabled but not required
- | smb2-time:
- | date: 2018-11-16 14:37:51
- |_ start_date: 2018-11-16 10:36:30
- TRACEROUTE
- HOP RTT ADDRESS
- 1 0.57 ms 10.11.200.239
- NSE: Script Post-scanning.
- Initiating NSE at 14:37
- Completed NSE at 14:37, 0.00s elapsed
- Initiating NSE at 14:37
- Completed NSE at 14:37, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 67.18 seconds
- Raw packets sent: 1146 (51.122KB) | Rcvd: 1017 (41.398KB)
- With NEtbus
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-16 14:41 CET
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 14:41
- Completed NSE at 14:41, 0.00s elapsed
- Initiating NSE at 14:41
- Completed NSE at 14:41, 0.00s elapsed
- Initiating ARP Ping Scan at 14:41
- Scanning 10.11.200.239 [1 port]
- Completed ARP Ping Scan at 14:41, 0.00s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 14:41
- Completed Parallel DNS resolution of 1 host. at 14:41, 0.00s elapsed
- Initiating SYN Stealth Scan at 14:41
- Scanning 10.11.200.239 [1000 ports]
- Discovered open port 445/tcp on 10.11.200.239
- Discovered open port 139/tcp on 10.11.200.239
- Discovered open port 135/tcp on 10.11.200.239
- Discovered open port 49157/tcp on 10.11.200.239
- Discovered open port 49154/tcp on 10.11.200.239
- Discovered open port 5357/tcp on 10.11.200.239
- Discovered open port 49152/tcp on 10.11.200.239
- Discovered open port 12345/tcp on 10.11.200.239
- Discovered open port 49156/tcp on 10.11.200.239
- Discovered open port 49153/tcp on 10.11.200.239
- Discovered open port 49155/tcp on 10.11.200.239
- Completed SYN Stealth Scan at 14:41, 1.81s elapsed (1000 total ports)
- Initiating Service scan at 14:41
- Scanning 11 services on 10.11.200.239
- Service scan Timing: About 54.55% done; ETC: 14:43 (0:00:45 remaining)
- Completed Service scan at 14:42, 58.56s elapsed (11 services on 1 host)
- Initiating OS detection (try #1) against 10.11.200.239
- NSE: Script scanning 10.11.200.239.
- Initiating NSE at 14:42
- Completed NSE at 14:42, 5.45s elapsed
- Initiating NSE at 14:42
- Completed NSE at 14:42, 0.02s elapsed
- Nmap scan report for 10.11.200.239
- Host is up (0.00057s latency).
- Not shown: 989 closed ports
- PORT STATE SERVICE VERSION
- 135/tcp open msrpc Microsoft Windows RPC
- 139/tcp open netbios-ssn Microsoft Windows netbios-ssn
- 445/tcp open microsoft-ds Windows 7 Professional 7601 Service Pack 1 microsoft-ds (workgroup: WORKGROUP)
- 5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
- |_http-server-header: Microsoft-HTTPAPI/2.0
- |_http-title: Service Unavailable
- 12345/tcp open netbus NetBus trojan 1.70
- | netbus-info:
- | ACL:
- |
- | APPLICATIONS:
- | Start
- | netbus (active)
- | C:\Windows\system32\cmd.exe
- | Program Manager
- | INFO:
- | Program Path: C:\Users\cs2lab\Desktop\SecurityPrograms\netbus\Patch.exe
- | Restart persistent: Yes
- | Login ID: cs2lab
- | Clients connected to this host: 1
- | SETUP:
- | TCP-port: 12345
- | Log traffic: 0
- | Password:
- | Notify to:
- | Notify from:
- | SMTP-server:
- | VOLUME:
- | Wave: 255
- | Synth: 0
- |_ Cd: 0
- 49152/tcp open msrpc Microsoft Windows RPC
- 49153/tcp open msrpc Microsoft Windows RPC
- 49154/tcp open msrpc Microsoft Windows RPC
- 49155/tcp open msrpc Microsoft Windows RPC
- 49156/tcp open msrpc Microsoft Windows RPC
- 49157/tcp open msrpc Microsoft Windows RPC
- MAC Address: 08:00:27:58:A0:7C (Oracle VirtualBox virtual NIC)
- Device type: general purpose
- Running: Microsoft Windows 7|2008|8.1
- OS CPE: cpe:/o:microsoft:windows_7::- cpe:/o:microsoft:windows_7::sp1 cpe:/o:microsoft:windows_server_2008::sp1 cpe:/o:microsoft:windows_server_2008:r2 cpe:/o:microsoft:windows_8 cpe:/o:microsoft:windows_8.1
- OS details: Microsoft Windows 7 SP0 - SP1, Windows Server 2008 SP1, Windows Server 2008 R2, Windows 8, or Windows 8.1 Update 1
- Uptime guess: 0.102 days (since Fri Nov 16 12:15:36 2018)
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=261 (Good luck!)
- IP ID Sequence Generation: Incremental
- Service Info: Host: CS2LAB-PC; OS: Windows; CPE: cpe:/o:microsoft:windows
- Host script results:
- |_clock-skew: mean: -19m58s, deviation: 34m38s, median: 1s
- | nbstat: NetBIOS name: CS2LAB-PC, NetBIOS user: <unknown>, NetBIOS MAC: 08:00:27:58:a0:7c (Oracle VirtualBox virtual NIC)
- | Names:
- |_ CS2LAB-PC<20> Flags: <unique><active>
- | smb-os-discovery:
- | OS: Windows 7 Professional 7601 Service Pack 1 (Windows 7 Professional 6.1)
- | OS CPE: cpe:/o:microsoft:windows_7::sp1:professional
- | Computer name: cs2lab-PC
- | NetBIOS computer name: CS2LAB-PC\x00
- | Workgroup: WORKGROUP\x00
- |_ System time: 2018-11-16T14:42:46+01:00
- | smb-security-mode:
- | account_used: guest
- | authentication_level: user
- | challenge_response: supported
- |_ message_signing: disabled (dangerous, but default)
- | smb2-security-mode:
- | 2.02:
- |_ Message signing enabled but not required
- | smb2-time:
- | date: 2018-11-16 14:42:46
- |_ start_date: 2018-11-16 10:36:30
- TRACEROUTE
- HOP RTT ADDRESS
- 1 0.57 ms 10.11.200.239
- NSE: Script Post-scanning.
- Initiating NSE at 14:42
- Completed NSE at 14:42, 0.00s elapsed
- Initiating NSE at 14:42
- Completed NSE at 14:42, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 67.44 seconds
- Raw packets sent: 1242 (55.346KB) | Rcvd: 1017 (41.402KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement