Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@kali:~/Downloads# nmap -sV -p 1-65535 -T4 -v 192.168.39.53
- Starting Nmap 7.40 ( https://nmap.org ) at 2017-11-10 20:53 EST
- NSE: Loaded 40 scripts for scanning.
- Initiating ARP Ping Scan at 20:53
- Scanning 192.168.39.53 [1 port]
- Completed ARP Ping Scan at 20:53, 0.41s elapsed (1 total hosts)
- Nmap scan report for 192.168.39.53 [host down]
- Read data files from: /usr/bin/../share/nmap
- Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
- Nmap done: 1 IP address (0 hosts up) scanned in 0.60 seconds
- Raw packets sent: 2 (56B) | Rcvd: 0 (0B)
- root@kali:~/Downloads# nmap -sV -p 1-65535 -T4 -v 192.168.39.53
- Starting Nmap 7.40 ( https://nmap.org ) at 2017-11-10 20:53 EST
- NSE: Loaded 40 scripts for scanning.
- Initiating ARP Ping Scan at 20:53
- Scanning 192.168.39.53 [1 port]
- Completed ARP Ping Scan at 20:53, 0.32s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 20:53
- Completed Parallel DNS resolution of 1 host. at 20:53, 0.12s elapsed
- Initiating SYN Stealth Scan at 20:53
- Scanning 192.168.39.53 [65535 ports]
- Stats: 0:00:09 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 0.33% done
- Stats: 0:00:10 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 0.39% done
- Stats: 0:00:11 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 0.45% done
- SYN Stealth Scan Timing: About 4.03% done; ETC: 21:11 (0:16:40 remaining)
- Stats: 0:01:10 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 10.52% done; ETC: 21:05 (0:10:04 remaining)
- Stats: 0:01:13 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 11.08% done; ETC: 21:04 (0:09:46 remaining)
- Stats: 0:01:14 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 11.30% done; ETC: 21:04 (0:09:41 remaining)
- Discovered open port 4110/tcp on 192.168.39.53
- SYN Stealth Scan Timing: About 21.15% done; ETC: 21:02 (0:06:28 remaining)
- SYN Stealth Scan Timing: About 33.88% done; ETC: 21:00 (0:04:21 remaining)
- SYN Stealth Scan Timing: About 43.86% done; ETC: 21:00 (0:03:30 remaining)
- SYN Stealth Scan Timing: About 51.19% done; ETC: 21:00 (0:03:08 remaining)
- SYN Stealth Scan Timing: About 60.27% done; ETC: 21:00 (0:02:47 remaining)
- SYN Stealth Scan Timing: About 70.07% done; ETC: 21:00 (0:02:01 remaining)
- Stats: 0:05:12 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.02% done; ETC: 21:01 (0:02:01 remaining)
- Stats: 0:05:13 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.02% done; ETC: 21:01 (0:02:02 remaining)
- Stats: 0:05:51 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.05% done; ETC: 21:01 (0:02:16 remaining)
- SYN Stealth Scan Timing: About 72.05% done; ETC: 21:26 (0:09:07 remaining)
- Stats: 0:23:33 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.05% done; ETC: 21:26 (0:09:08 remaining)
- SYN Stealth Scan Timing: About 76.68% done; ETC: 21:25 (0:07:25 remaining)
- Discovered open port 4425/tcp on 192.168.39.53
- SYN Stealth Scan Timing: About 83.46% done; ETC: 21:23 (0:04:56 remaining)
- Discovered open port 4143/tcp on 192.168.39.53
- Discovered open port 4106/tcp on 192.168.39.53
- SYN Stealth Scan Timing: About 89.75% done; ETC: 21:22 (0:02:54 remaining)
- SYN Stealth Scan Timing: About 97.46% done; ETC: 21:20 (0:00:40 remaining)
- Completed SYN Stealth Scan at 21:20, 1577.73s elapsed (65535 total ports)
- Initiating Service scan at 21:20
- Scanning 4 services on 192.168.39.53
- Stats: 0:26:19 elapsed; 0 hosts completed (1 up), 1 undergoing Service Scan
- Service scan Timing: About 25.00% done; ETC: 21:20 (0:00:03 remaining)
- Stats: 0:27:03 elapsed; 0 hosts completed (1 up), 1 undergoing Service Scan
- Service scan Timing: About 75.00% done; ETC: 21:21 (0:00:15 remaining)
- Completed Service scan at 21:22, 155.59s elapsed (4 services on 1 host)
- NSE: Script scanning 192.168.39.53.
- Initiating NSE at 21:22
- Completed NSE at 21:22, 0.01s elapsed
- Initiating NSE at 21:22
- Completed NSE at 21:22, 3.25s elapsed
- Nmap scan report for 192.168.39.53
- Host is up (0.48s latency).
- Not shown: 65529 filtered ports
- PORT STATE SERVICE VERSION
- 4106/tcp open synchronite?
- 4110/tcp open pop3 Eudora Worldmail pop3d 6.1.19.0
- 4143/tcp open imap
- 4388/tcp closed unknown
- 4425/tcp open smtp MAILsweeper SMTP proxy
- 8080/tcp closed http-proxy
- 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port4106-TCP:V=7.40%I=7%D=11/10%Time=5A065E61%P=x86_64-pc-linux-gnu%r(N
- SF:ULL,58,"200\x20Ok,\x20\"WorldMail\x20Mail\x20Management\x20Server\x20\(
- SF:6\.1\.19\.0\)\x20ready\"\x20<396\.1494912257@pwk\.local>\r\n")%r(Generi
- SF:cLines,58,"200\x20Ok,\x20\"WorldMail\x20Mail\x20Management\x20Server\x2
- SF:0\(6\.1\.19\.0\)\x20ready\"\x20<396\.1494912257@pwk\.local>\r\n")%r(Get
- SF:Request,6F,"200\x20Ok,\x20\"WorldMail\x20Mail\x20Management\x20Server\x
- SF:20\(6\.1\.19\.0\)\x20ready\"\x20<396\.1494912268@pwk\.local>\r\n501\x20
- SF:\"Invalid\x20command\"\r\n")%r(HTTPOptions,6F,"200\x20Ok,\x20\"WorldMai
- SF:l\x20Mail\x20Management\x20Server\x20\(6\.1\.19\.0\)\x20ready\"\x20<396
- SF:\.1494912274@pwk\.local>\r\n501\x20\"Invalid\x20command\"\r\n")%r(RTSPR
- SF:equest,6F,"200\x20Ok,\x20\"WorldMail\x20Mail\x20Management\x20Server\x2
- SF:0\(6\.1\.19\.0\)\x20ready\"\x20<396\.1494912279@pwk\.local>\r\n501\x20\
- SF:"Invalid\x20command\"\r\n")%r(RPCCheck,58,"200\x20Ok,\x20\"WorldMail\x2
- SF:0Mail\x20Management\x20Server\x20\(6\.1\.19\.0\)\x20ready\"\x20<396\.14
- SF:94912285@pwk\.local>\r\n")%r(DNSVersionBindReq,58,"200\x20Ok,\x20\"Worl
- SF:dMail\x20Mail\x20Management\x20Server\x20\(6\.1\.19\.0\)\x20ready\"\x20
- SF:<396\.1494912290@pwk\.local>\r\n")%r(DNSStatusRequest,58,"200\x20Ok,\x2
- SF:0\"WorldMail\x20Mail\x20Management\x20Server\x20\(6\.1\.19\.0\)\x20read
- SF:y\"\x20<396\.1494912296@pwk\.local>\r\n")%r(Help,6F,"200\x20Ok,\x20\"Wo
- SF:rldMail\x20Mail\x20Management\x20Server\x20\(6\.1\.19\.0\)\x20ready\"\x
- SF:20<396\.1494912301@pwk\.local>\r\n501\x20\"Invalid\x20command\"\r\n")%r
- SF:(SSLSessionReq,58,"200\x20Ok,\x20\"WorldMail\x20Mail\x20Management\x20S
- SF:erver\x20\(6\.1\.19\.0\)\x20ready\"\x20<396\.1494912310@pwk\.local>\r\n
- SF:")%r(TLSSessionReq,58,"200\x20Ok,\x20\"WorldMail\x20Mail\x20Management\
- SF:x20Server\x20\(6\.1\.19\.0\)\x20ready\"\x20<396\.1494912315@pwk\.local>
- SF:\r\n")%r(Kerberos,58,"200\x20Ok,\x20\"WorldMail\x20Mail\x20Management\x
- SF:20Server\x20\(6\.1\.19\.0\)\x20ready\"\x20<396\.1494912321@pwk\.local>\
- SF:r\n")%r(SMBProgNeg,58,"200\x20Ok,\x20\"WorldMail\x20Mail\x20Management\
- SF:x20Server\x20\(6\.1\.19\.0\)\x20ready\"\x20<396\.1494912326@pwk\.local>
- SF:\r\n")%r(X11Probe,58,"200\x20Ok,\x20\"WorldMail\x20Mail\x20Management\x
- SF:20Server\x20\(6\.1\.19\.0\)\x20ready\"\x20<396\.1494912332@pwk\.local>\
- SF:r\n");
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port4143-TCP:V=7.40%I=7%D=11/10%Time=5A065E61%P=x86_64-pc-linux-gnu%r(N
- SF:ULL,2D,"\*\x20OK\x20\x20WorldMail\x20IMAP4\x20Server\x206\.1\.19\.0\x20
- SF:ready\r\n")%r(GenericLines,4A,"\*\x20OK\x20\x20WorldMail\x20IMAP4\x20Se
- SF:rver\x206\.1\.19\.0\x20ready\r\n\*\x20BAD\x20Null\x20command\x20\(no\x2
- SF:0tag\)\r\n")%r(GetRequest,71,"\*\x20OK\x20\x20WorldMail\x20IMAP4\x20Ser
- SF:ver\x206\.1\.19\.0\x20ready\r\nGET\x20BAD\x20command\x20\"/\"\x20unreco
- SF:gnized\x20or\x20not\x20valid\x20in\x20the\x20current\x20state\r\n");
- MAC Address: 00:50:56:89:53:C9 (VMware)
- Service Info: Host: pwk.local; OS: Windows; CPE: cpe:/o:microsoft:windows
- Read data files from: /usr/bin/../share/nmap
- Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 1737.42 seconds
- Raw packets sent: 131332 (5.779MB) | Rcvd: 265 (10.604KB)
- root@kali:~/Downloads#
Add Comment
Please, Sign In to add comment