Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting Nmap 7.92 ( https://nmap.org ) at 2021-12-08 13:26 Mitteleuropäische Zeit
- NSE: Loaded 155 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 13:26
- Completed NSE at 13:26, 0.00s elapsed
- Initiating NSE at 13:26
- Completed NSE at 13:26, 0.00s elapsed
- Initiating NSE at 13:26
- Completed NSE at 13:26, 0.00s elapsed
- Initiating ARP Ping Scan at 13:26
- Scanning 192.168.178.67 [1 port]
- Completed ARP Ping Scan at 13:26, 0.06s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 13:26
- Completed Parallel DNS resolution of 1 host. at 13:26, 0.02s elapsed
- Initiating SYN Stealth Scan at 13:26
- Scanning 192.168.178.67 [1000 ports]
- Discovered open port 22/tcp on 192.168.178.67
- Discovered open port 80/tcp on 192.168.178.67
- Discovered open port 5222/tcp on 192.168.178.67
- Discovered open port 5061/tcp on 192.168.178.67
- Discovered open port 5060/tcp on 192.168.178.67
- Completed SYN Stealth Scan at 13:26, 5.18s elapsed (1000 total ports)
- Initiating Service scan at 13:26
- Scanning 5 services on 192.168.178.67
- Completed Service scan at 13:27, 29.54s elapsed (5 services on 1 host)
- Initiating OS detection (try #1) against 192.168.178.67
- Retrying OS detection (try #2) against 192.168.178.67
- NSE: Script scanning 192.168.178.67.
- Initiating NSE at 13:27
- Completed NSE at 13:27, 0.32s elapsed
- Initiating NSE at 13:27
- Completed NSE at 13:27, 1.41s elapsed
- Initiating NSE at 13:27
- Completed NSE at 13:27, 0.00s elapsed
- Nmap scan report for 192.168.178.67
- Host is up (0.0010s latency).
- Not shown: 983 filtered tcp ports (no-response), 11 filtered tcp ports (host-prohibited)
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH 8.0 (protocol 2.0)
- | ssh-hostkey:
- | 3072 df:19:d5:02:c9:d5:75:7e:39:94:f8:13:27:c4:84:e6 (RSA)
- | 256 17:46:12:53:3b:44:2e:ab:57:e1:61:99:9e:db:f4:0f (ECDSA)
- |_ 256 57:5a:27:db:12:b6:e9:85:da:9a:fc:83:77:3f:89:71 (ED25519)
- 80/tcp open http
- | fingerprint-strings:
- | GetRequest, HTTPOptions:
- | HTTP/1.1 302
- | Cache-Control: private
- | Expires: Thu, 01 Jan 1970 00:00:00 GMT
- | Location: https://localhost/
- | Content-Length: 0
- | Date: Wed, 08 Dec 2021 12:26:48 GMT
- | Connection: close
- | Server:
- | RTSPRequest:
- | HTTP/1.1 400
- | Content-Type: text/html;charset=utf-8
- | Content-Language: en
- | Content-Length: 1891
- | Date: Wed, 08 Dec 2021 12:26:48 GMT
- | Connection: close
- | Server:
- | <!doctype html><html lang="en"><head><title>HTTP Status 400
- | Request</title><style type="text/css">body {font-family:Tahoma,Arial,sans-serif;} h1, h2, h3, b {color:white;background-color:#525D76;} h1 {font-size:22px;} h2 {font-size:16px;} h3 {font-size:14px;} p {font-size:12px;} a {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><body><h1>HTTP Status 400
- | Request</h1><hr class="line" /><p><b>Type</b> Exception Report</p><p><b>Message</b> Invalid character found in the HTTP protocol [RTSP/1.00x0d0x0a0x0d0x0a...]</p><p><b>Description</b> The server cannot or will not process the request due to something that is perceived to be a client error (e.g., malformed request synta
- | X11Probe:
- | HTTP/1.1 400
- | Content-Type: text/html;charset=utf-8
- | Content-Language: en
- | Content-Length: 1981
- | Date: Wed, 08 Dec 2021 12:26:48 GMT
- | Connection: close
- | Server:
- | <!doctype html><html lang="en"><head><title>HTTP Status 400
- | Request</title><style type="text/css">body {font-family:Tahoma,Arial,sans-serif;} h1, h2, h3, b {color:white;background-color:#525D76;} h1 {font-size:22px;} h2 {font-size:16px;} h3 {font-size:14px;} p {font-size:12px;} a {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><body><h1>HTTP Status 400
- |_ Request</h1><hr class="line" /><p><b>Type</b> Exception Report</p><p><b>Message</b> Invalid character found in method name [l0x000x0b0x000x000x000x000x000x000x000x000x00...]. HTTP method names must be tokens</p><p><b>Description</b> The server cannot or will not process the request due to something that is perceived to be
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-title: Did not follow redirect to https://192.168.178.67/
- |_http-server-header: <empty>
- 443/tcp closed https
- 5060/tcp open sip STARFACE PBX (Status: 200 OK)
- | fingerprint-strings:
- | SIPOptions:
- | SIP/2.0 200 OK
- | Via: SIP/2.0/TCP nm;branch=foo;received=192.168.178.217;rport=57818
- | From: <sip:nm@nm>;tag=root
- | <sip:nm2@nm2>;tag=as70a7719b
- | Call-ID: 50000
- | CSeq: 42 OPTIONS
- | Server: STARFACE PBX
- | Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
- | Supported: replaces, timer
- | Contact: <sip:192.168.178.67:5060;transport=tcp>
- | Accept: application/sdp
- |_ Content-Length: 0
- |_sip-methods: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
- 5061/tcp open ssl/sip STARFACE PBX (Status: 200 OK)
- | fingerprint-strings:
- | SIPOptions:
- | SIP/2.0 200 OK
- | Via: SIP/2.0/TCP nm;branch=foo;received=192.168.178.217;rport=57850
- | From: <sip:nm@nm>;tag=root
- | <sip:nm2@nm2>;tag=as70a7719b
- | Call-ID: 50000
- | CSeq: 42 OPTIONS
- | Server: STARFACE PBX
- | Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
- | Supported: replaces, timer
- | Contact: <sip:192.168.178.67:5060;transport=tls>
- | Accept: application/sdp
- |_ Content-Length: 0
- | ssl-cert: Subject: commonName=192.168.178.67/organizationName=STARFACE CA/stateOrProvinceName=Baden-Wuerttemberg/countryName=DE
- | Issuer: commonName=STARFACE CA/organizationName=STARFACE CA/stateOrProvinceName=Baden-Wuerttemberg/countryName=DE
- | Public Key type: rsa
- | Public Key bits: 4096
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2021-12-08T10:59:02
- | Not valid after: 2041-12-03T10:59:02
- | MD5: c050 5762 8659 4e79 7938 3efb f2ba cb9f
- |_SHA-1: a8d5 bae6 3c52 ef56 20d7 da6f 4336 0f4d 5e14 5f12
- 5222/tcp open jabber Ignite Realtime Openfire Jabber server 3.10.0 or later
- | xmpp-info:
- | STARTTLS Failed
- | info:
- | xmpp:
- | server name: starface.metagmbh.de
- | version: 1.0
- | auth_mechanisms:
- | errors:
- | invalid-namespace
- | (timeout)
- | unknown:
- | compression_methods:
- | features:
- | stream_id: AjraV
- |_ capabilities:
- |_ssl-date: TLS randomness does not represent time
- 3 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port80-TCP:V=7.92%I=7%D=12/8%Time=61B0A488%P=i686-pc-windows-windows%r(
- SF:GetRequest,C5,"HTTP/1\.1\x20302\x20\r\nCache-Control:\x20private\r\nExp
- SF:ires:\x20Thu,\x2001\x20Jan\x201970\x2000:00:00\x20GMT\r\nLocation:\x20h
- SF:ttps://localhost/\r\nContent-Length:\x200\r\nDate:\x20Wed,\x2008\x20Dec
- SF:\x202021\x2012:26:48\x20GMT\r\nConnection:\x20close\r\nServer:\x20\x20\
- SF:r\n\r\n")%r(HTTPOptions,C5,"HTTP/1\.1\x20302\x20\r\nCache-Control:\x20p
- SF:rivate\r\nExpires:\x20Thu,\x2001\x20Jan\x201970\x2000:00:00\x20GMT\r\nL
- SF:ocation:\x20https://localhost/\r\nContent-Length:\x200\r\nDate:\x20Wed,
- SF:\x2008\x20Dec\x202021\x2012:26:48\x20GMT\r\nConnection:\x20close\r\nSer
- SF:ver:\x20\x20\r\n\r\n")%r(RTSPRequest,80A,"HTTP/1\.1\x20400\x20\r\nConte
- SF:nt-Type:\x20text/html;charset=utf-8\r\nContent-Language:\x20en\r\nConte
- SF:nt-Length:\x201891\r\nDate:\x20Wed,\x2008\x20Dec\x202021\x2012:26:48\x2
- SF:0GMT\r\nConnection:\x20close\r\nServer:\x20\x20\r\n\r\n<!doctype\x20htm
- SF:l><html\x20lang=\"en\"><head><title>HTTP\x20Status\x20400\x20\xe2\x80\x
- SF:93\x20Bad\x20Request</title><style\x20type=\"text/css\">body\x20{font-f
- SF:amily:Tahoma,Arial,sans-serif;}\x20h1,\x20h2,\x20h3,\x20b\x20{color:whi
- SF:te;background-color:#525D76;}\x20h1\x20{font-size:22px;}\x20h2\x20{font
- SF:-size:16px;}\x20h3\x20{font-size:14px;}\x20p\x20{font-size:12px;}\x20a\
- SF:x20{color:black;}\x20\.line\x20{height:1px;background-color:#525D76;bor
- SF:der:none;}</style></head><body><h1>HTTP\x20Status\x20400\x20\xe2\x80\x9
- SF:3\x20Bad\x20Request</h1><hr\x20class=\"line\"\x20/><p><b>Type</b>\x20Ex
- SF:ception\x20Report</p><p><b>Message</b>\x20Invalid\x20character\x20found
- SF:\x20in\x20the\x20HTTP\x20protocol\x20\[RTSP/1\.00x0d0x0a0x0d0x0a\.\
- SF:.\.\]</p><p><b>Description</b>\x20The\x20server\x20cannot\x20or\x20will
- SF:\x20not\x20process\x20the\x20request\x20due\x20to\x20something\x20that\
- SF:x20is\x20perceived\x20to\x20be\x20a\x20client\x20error\x20\(e\.g\.,\x20
- SF:malformed\x20request\x20synta")%r(X11Probe,864,"HTTP/1\.1\x20400\x20\r\
- SF:nContent-Type:\x20text/html;charset=utf-8\r\nContent-Language:\x20en\r\
- SF:nContent-Length:\x201981\r\nDate:\x20Wed,\x2008\x20Dec\x202021\x2012:26
- SF::48\x20GMT\r\nConnection:\x20close\r\nServer:\x20\x20\r\n\r\n<!doctype\
- SF:x20html><html\x20lang=\"en\"><head><title>HTTP\x20Status\x20400\x20\xe2
- SF:\x80\x93\x20Bad\x20Request</title><style\x20type=\"text/css\">body\x20{
- SF:font-family:Tahoma,Arial,sans-serif;}\x20h1,\x20h2,\x20h3,\x20b\x20{col
- SF:or:white;background-color:#525D76;}\x20h1\x20{font-size:22px;}\x20h2\x2
- SF:0{font-size:16px;}\x20h3\x20{font-size:14px;}\x20p\x20{font-size:12px;}
- SF:\x20a\x20{color:black;}\x20\.line\x20{height:1px;background-color:#525D
- SF:76;border:none;}</style></head><body><h1>HTTP\x20Status\x20400\x20\xe2\
- SF:x80\x93\x20Bad\x20Request</h1><hr\x20class=\"line\"\x20/><p><b>Type</b>
- SF:\x20Exception\x20Report</p><p><b>Message</b>\x20Invalid\x20character\x2
- SF:0found\x20in\x20method\x20name\x20\[l0x000x0b0x000x000x000x000x000x000x
- SF:000x000x00\.\.\.\]\.\x20HTTP\x20method\x20names\x20must\x20be\x20tokens
- SF:</p><p><b>Description</b>\x20The\x20server\x20cannot\x20or\x20will\x20n
- SF:ot\x20process\x20the\x20request\x20due\x20to\x20something\x20that\x20is
- SF:\x20perceived\x20to\x20be\x20");
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port5060-TCP:V=7.92%I=7%D=12/8%Time=61B0A494%P=i686-pc-windows-windows%
- SF:r(SIPOptions,1A3,"SIP/2\.0\x20200\x20OK\r\nVia:\x20SIP/2\.0/TCP\x20nm;b
- SF:ranch=foo;received=192\.168\.178\.217;rport=57818\r\nFrom:\x20<sip:nm@n
- SF:m>;tag=root\r\nTo:\x20<sip:nm2@nm2>;tag=as70a7719b\r\nCall-ID:\x2050000
- SF:\r\nCSeq:\x2042\x20OPTIONS\r\nServer:\x20STARFACE\x20PBX\r\nAllow:\x20I
- SF:NVITE,\x20ACK,\x20CANCEL,\x20OPTIONS,\x20BYE,\x20REFER,\x20SUBSCRIBE,\x
- SF:20NOTIFY,\x20INFO,\x20PUBLISH,\x20MESSAGE\r\nSupported:\x20replaces,\x2
- SF:0timer\r\nContact:\x20<sip:192\.168\.178\.67:5060;transport=tcp>\r\nAcc
- SF:ept:\x20application/sdp\r\nContent-Length:\x200\r\n\r\n");
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port5061-TCP:V=7.92%T=SSL%I=7%D=12/8%Time=61B0A49A%P=i686-pc-windows-wi
- SF:ndows%r(SIPOptions,1A3,"SIP/2\.0\x20200\x20OK\r\nVia:\x20SIP/2\.0/TCP\x
- SF:20nm;branch=foo;received=192\.168\.178\.217;rport=57850\r\nFrom:\x20<si
- SF:p:nm@nm>;tag=root\r\nTo:\x20<sip:nm2@nm2>;tag=as70a7719b\r\nCall-ID:\x2
- SF:050000\r\nCSeq:\x2042\x20OPTIONS\r\nServer:\x20STARFACE\x20PBX\r\nAllow
- SF::\x20INVITE,\x20ACK,\x20CANCEL,\x20OPTIONS,\x20BYE,\x20REFER,\x20SUBSCR
- SF:IBE,\x20NOTIFY,\x20INFO,\x20PUBLISH,\x20MESSAGE\r\nSupported:\x20replac
- SF:es,\x20timer\r\nContact:\x20<sip:192\.168\.178\.67:5060;transport=tls>\
- SF:r\nAccept:\x20application/sdp\r\nContent-Length:\x200\r\n\r\n");
- MAC Address: 4A:E7:7D:BA:E2:5E (Unknown)
- Device type: general purpose|WAP|storage-misc|media device|broadband router
- Running (JUST GUESSING): Linux 3.X|4.X|2.6.X|2.4.X (94%), HP embedded (91%)
- OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:2.4 cpe:/h:hp:p2000_g3 cpe:/o:linux:linux_kernel:2.4.35.4 cpe:/o:linux:linux_kernel:3.0
- Aggressive OS guesses: Linux 3.12 - 4.10 (94%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (92%), Linux 2.6.32 - 3.10 (92%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (91%), OpenWrt White Russian 0.9 (Linux 2.4.30) (91%), Linux 3.18 (91%), HP P2000 G3 NAS device (91%), ProVision-ISR security DVR (90%), Linux 2.6.9 - 2.6.21 (89%), Linux 2.6.32 (89%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=253 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE
- HOP RTT ADDRESS
- 1 1.02 ms 192.168.178.67
- NSE: Script Post-scanning.
- Initiating NSE at 13:27
- Completed NSE at 13:27, 0.00s elapsed
- Initiating NSE at 13:27
- Completed NSE at 13:27, 0.00s elapsed
- Initiating NSE at 13:27
- Completed NSE at 13:27, 0.00s elapsed
- Read data files from: C:\Program Files (x86)\Nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 43.69 seconds
- Raw packets sent: 2044 (93.340KB) | Rcvd: 75 (5.864KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement