Advertisement
Guest User

Untitled

a guest
Dec 8th, 2021
60
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 13.35 KB | None | 0 0
  1. Starting Nmap 7.92 ( https://nmap.org ) at 2021-12-08 13:26 Mitteleuropäische Zeit
  2.  
  3. NSE: Loaded 155 scripts for scanning.
  4.  
  5. NSE: Script Pre-scanning.
  6.  
  7. Initiating NSE at 13:26
  8.  
  9. Completed NSE at 13:26, 0.00s elapsed
  10.  
  11. Initiating NSE at 13:26
  12.  
  13. Completed NSE at 13:26, 0.00s elapsed
  14.  
  15. Initiating NSE at 13:26
  16.  
  17. Completed NSE at 13:26, 0.00s elapsed
  18.  
  19. Initiating ARP Ping Scan at 13:26
  20.  
  21. Scanning 192.168.178.67 [1 port]
  22.  
  23. Completed ARP Ping Scan at 13:26, 0.06s elapsed (1 total hosts)
  24.  
  25. Initiating Parallel DNS resolution of 1 host. at 13:26
  26.  
  27. Completed Parallel DNS resolution of 1 host. at 13:26, 0.02s elapsed
  28.  
  29. Initiating SYN Stealth Scan at 13:26
  30.  
  31. Scanning 192.168.178.67 [1000 ports]
  32.  
  33. Discovered open port 22/tcp on 192.168.178.67
  34.  
  35. Discovered open port 80/tcp on 192.168.178.67
  36.  
  37. Discovered open port 5222/tcp on 192.168.178.67
  38.  
  39. Discovered open port 5061/tcp on 192.168.178.67
  40.  
  41. Discovered open port 5060/tcp on 192.168.178.67
  42.  
  43. Completed SYN Stealth Scan at 13:26, 5.18s elapsed (1000 total ports)
  44.  
  45. Initiating Service scan at 13:26
  46.  
  47. Scanning 5 services on 192.168.178.67
  48.  
  49. Completed Service scan at 13:27, 29.54s elapsed (5 services on 1 host)
  50.  
  51. Initiating OS detection (try #1) against 192.168.178.67
  52.  
  53. Retrying OS detection (try #2) against 192.168.178.67
  54.  
  55. NSE: Script scanning 192.168.178.67.
  56.  
  57. Initiating NSE at 13:27
  58.  
  59. Completed NSE at 13:27, 0.32s elapsed
  60.  
  61. Initiating NSE at 13:27
  62.  
  63. Completed NSE at 13:27, 1.41s elapsed
  64.  
  65. Initiating NSE at 13:27
  66.  
  67. Completed NSE at 13:27, 0.00s elapsed
  68.  
  69. Nmap scan report for 192.168.178.67
  70.  
  71. Host is up (0.0010s latency).
  72.  
  73. Not shown: 983 filtered tcp ports (no-response), 11 filtered tcp ports (host-prohibited)
  74.  
  75. PORT STATE SERVICE VERSION
  76.  
  77. 22/tcp open ssh OpenSSH 8.0 (protocol 2.0)
  78.  
  79. | ssh-hostkey:
  80.  
  81. | 3072 df:19:d5:02:c9:d5:75:7e:39:94:f8:13:27:c4:84:e6 (RSA)
  82.  
  83. | 256 17:46:12:53:3b:44:2e:ab:57:e1:61:99:9e:db:f4:0f (ECDSA)
  84.  
  85. |_ 256 57:5a:27:db:12:b6:e9:85:da:9a:fc:83:77:3f:89:71 (ED25519)
  86.  
  87. 80/tcp open http
  88.  
  89. | fingerprint-strings:
  90.  
  91. | GetRequest, HTTPOptions:
  92.  
  93. | HTTP/1.1 302
  94.  
  95. | Cache-Control: private
  96.  
  97. | Expires: Thu, 01 Jan 1970 00:00:00 GMT
  98.  
  99. | Location: https://localhost/
  100.  
  101. | Content-Length: 0
  102.  
  103. | Date: Wed, 08 Dec 2021 12:26:48 GMT
  104.  
  105. | Connection: close
  106.  
  107. | Server:
  108.  
  109. | RTSPRequest:
  110.  
  111. | HTTP/1.1 400
  112.  
  113. | Content-Type: text/html;charset=utf-8
  114.  
  115. | Content-Language: en
  116.  
  117. | Content-Length: 1891
  118.  
  119. | Date: Wed, 08 Dec 2021 12:26:48 GMT
  120.  
  121. | Connection: close
  122.  
  123. | Server:
  124.  
  125. | <!doctype html><html lang="en"><head><title>HTTP Status 400
  126.  
  127. | Request</title><style type="text/css">body {font-family:Tahoma,Arial,sans-serif;} h1, h2, h3, b {color:white;background-color:#525D76;} h1 {font-size:22px;} h2 {font-size:16px;} h3 {font-size:14px;} p {font-size:12px;} a {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><body><h1>HTTP Status 400
  128.  
  129. | Request</h1><hr class="line" /><p><b>Type</b> Exception Report</p><p><b>Message</b> Invalid character found in the HTTP protocol [RTSP&#47;1.00x0d0x0a0x0d0x0a...]</p><p><b>Description</b> The server cannot or will not process the request due to something that is perceived to be a client error (e.g., malformed request synta
  130.  
  131. | X11Probe:
  132.  
  133. | HTTP/1.1 400
  134.  
  135. | Content-Type: text/html;charset=utf-8
  136.  
  137. | Content-Language: en
  138.  
  139. | Content-Length: 1981
  140.  
  141. | Date: Wed, 08 Dec 2021 12:26:48 GMT
  142.  
  143. | Connection: close
  144.  
  145. | Server:
  146.  
  147. | <!doctype html><html lang="en"><head><title>HTTP Status 400
  148.  
  149. | Request</title><style type="text/css">body {font-family:Tahoma,Arial,sans-serif;} h1, h2, h3, b {color:white;background-color:#525D76;} h1 {font-size:22px;} h2 {font-size:16px;} h3 {font-size:14px;} p {font-size:12px;} a {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><body><h1>HTTP Status 400
  150.  
  151. |_ Request</h1><hr class="line" /><p><b>Type</b> Exception Report</p><p><b>Message</b> Invalid character found in method name [l0x000x0b0x000x000x000x000x000x000x000x000x00...]. HTTP method names must be tokens</p><p><b>Description</b> The server cannot or will not process the request due to something that is perceived to be
  152.  
  153. | http-methods:
  154.  
  155. |_ Supported Methods: GET HEAD POST OPTIONS
  156.  
  157. |_http-title: Did not follow redirect to https://192.168.178.67/
  158.  
  159. |_http-server-header: <empty>
  160.  
  161. 443/tcp closed https
  162.  
  163. 5060/tcp open sip STARFACE PBX (Status: 200 OK)
  164.  
  165. | fingerprint-strings:
  166.  
  167. | SIPOptions:
  168.  
  169. | SIP/2.0 200 OK
  170.  
  171. | Via: SIP/2.0/TCP nm;branch=foo;received=192.168.178.217;rport=57818
  172.  
  173. | From: <sip:nm@nm>;tag=root
  174.  
  175. | <sip:nm2@nm2>;tag=as70a7719b
  176.  
  177. | Call-ID: 50000
  178.  
  179. | CSeq: 42 OPTIONS
  180.  
  181. | Server: STARFACE PBX
  182.  
  183. | Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  184.  
  185. | Supported: replaces, timer
  186.  
  187. | Contact: <sip:192.168.178.67:5060;transport=tcp>
  188.  
  189. | Accept: application/sdp
  190.  
  191. |_ Content-Length: 0
  192.  
  193. |_sip-methods: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  194.  
  195. 5061/tcp open ssl/sip STARFACE PBX (Status: 200 OK)
  196.  
  197. | fingerprint-strings:
  198.  
  199. | SIPOptions:
  200.  
  201. | SIP/2.0 200 OK
  202.  
  203. | Via: SIP/2.0/TCP nm;branch=foo;received=192.168.178.217;rport=57850
  204.  
  205. | From: <sip:nm@nm>;tag=root
  206.  
  207. | <sip:nm2@nm2>;tag=as70a7719b
  208.  
  209. | Call-ID: 50000
  210.  
  211. | CSeq: 42 OPTIONS
  212.  
  213. | Server: STARFACE PBX
  214.  
  215. | Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  216.  
  217. | Supported: replaces, timer
  218.  
  219. | Contact: <sip:192.168.178.67:5060;transport=tls>
  220.  
  221. | Accept: application/sdp
  222.  
  223. |_ Content-Length: 0
  224.  
  225. | ssl-cert: Subject: commonName=192.168.178.67/organizationName=STARFACE CA/stateOrProvinceName=Baden-Wuerttemberg/countryName=DE
  226.  
  227. | Issuer: commonName=STARFACE CA/organizationName=STARFACE CA/stateOrProvinceName=Baden-Wuerttemberg/countryName=DE
  228.  
  229. | Public Key type: rsa
  230.  
  231. | Public Key bits: 4096
  232.  
  233. | Signature Algorithm: sha256WithRSAEncryption
  234.  
  235. | Not valid before: 2021-12-08T10:59:02
  236.  
  237. | Not valid after: 2041-12-03T10:59:02
  238.  
  239. | MD5: c050 5762 8659 4e79 7938 3efb f2ba cb9f
  240.  
  241. |_SHA-1: a8d5 bae6 3c52 ef56 20d7 da6f 4336 0f4d 5e14 5f12
  242.  
  243. 5222/tcp open jabber Ignite Realtime Openfire Jabber server 3.10.0 or later
  244.  
  245. | xmpp-info:
  246.  
  247. | STARTTLS Failed
  248.  
  249. | info:
  250.  
  251. | xmpp:
  252.  
  253. | server name: starface.metagmbh.de
  254.  
  255. | version: 1.0
  256.  
  257. | auth_mechanisms:
  258.  
  259. | errors:
  260.  
  261. | invalid-namespace
  262.  
  263. | (timeout)
  264.  
  265. | unknown:
  266.  
  267. | compression_methods:
  268.  
  269. | features:
  270.  
  271. | stream_id: AjraV
  272.  
  273. |_ capabilities:
  274.  
  275. |_ssl-date: TLS randomness does not represent time
  276.  
  277. 3 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
  278.  
  279. ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
  280.  
  281. SF-Port80-TCP:V=7.92%I=7%D=12/8%Time=61B0A488%P=i686-pc-windows-windows%r(
  282.  
  283. SF:GetRequest,C5,"HTTP/1\.1\x20302\x20\r\nCache-Control:\x20private\r\nExp
  284.  
  285. SF:ires:\x20Thu,\x2001\x20Jan\x201970\x2000:00:00\x20GMT\r\nLocation:\x20h
  286.  
  287. SF:ttps://localhost/\r\nContent-Length:\x200\r\nDate:\x20Wed,\x2008\x20Dec
  288.  
  289. SF:\x202021\x2012:26:48\x20GMT\r\nConnection:\x20close\r\nServer:\x20\x20\
  290.  
  291. SF:r\n\r\n")%r(HTTPOptions,C5,"HTTP/1\.1\x20302\x20\r\nCache-Control:\x20p
  292.  
  293. SF:rivate\r\nExpires:\x20Thu,\x2001\x20Jan\x201970\x2000:00:00\x20GMT\r\nL
  294.  
  295. SF:ocation:\x20https://localhost/\r\nContent-Length:\x200\r\nDate:\x20Wed,
  296.  
  297. SF:\x2008\x20Dec\x202021\x2012:26:48\x20GMT\r\nConnection:\x20close\r\nSer
  298.  
  299. SF:ver:\x20\x20\r\n\r\n")%r(RTSPRequest,80A,"HTTP/1\.1\x20400\x20\r\nConte
  300.  
  301. SF:nt-Type:\x20text/html;charset=utf-8\r\nContent-Language:\x20en\r\nConte
  302.  
  303. SF:nt-Length:\x201891\r\nDate:\x20Wed,\x2008\x20Dec\x202021\x2012:26:48\x2
  304.  
  305. SF:0GMT\r\nConnection:\x20close\r\nServer:\x20\x20\r\n\r\n<!doctype\x20htm
  306.  
  307. SF:l><html\x20lang=\"en\"><head><title>HTTP\x20Status\x20400\x20\xe2\x80\x
  308.  
  309. SF:93\x20Bad\x20Request</title><style\x20type=\"text/css\">body\x20{font-f
  310.  
  311. SF:amily:Tahoma,Arial,sans-serif;}\x20h1,\x20h2,\x20h3,\x20b\x20{color:whi
  312.  
  313. SF:te;background-color:#525D76;}\x20h1\x20{font-size:22px;}\x20h2\x20{font
  314.  
  315. SF:-size:16px;}\x20h3\x20{font-size:14px;}\x20p\x20{font-size:12px;}\x20a\
  316.  
  317. SF:x20{color:black;}\x20\.line\x20{height:1px;background-color:#525D76;bor
  318.  
  319. SF:der:none;}</style></head><body><h1>HTTP\x20Status\x20400\x20\xe2\x80\x9
  320.  
  321. SF:3\x20Bad\x20Request</h1><hr\x20class=\"line\"\x20/><p><b>Type</b>\x20Ex
  322.  
  323. SF:ception\x20Report</p><p><b>Message</b>\x20Invalid\x20character\x20found
  324.  
  325. SF:\x20in\x20the\x20HTTP\x20protocol\x20\[RTSP&#47;1\.00x0d0x0a0x0d0x0a\.\
  326.  
  327. SF:.\.\]</p><p><b>Description</b>\x20The\x20server\x20cannot\x20or\x20will
  328.  
  329. SF:\x20not\x20process\x20the\x20request\x20due\x20to\x20something\x20that\
  330.  
  331. SF:x20is\x20perceived\x20to\x20be\x20a\x20client\x20error\x20\(e\.g\.,\x20
  332.  
  333. SF:malformed\x20request\x20synta")%r(X11Probe,864,"HTTP/1\.1\x20400\x20\r\
  334.  
  335. SF:nContent-Type:\x20text/html;charset=utf-8\r\nContent-Language:\x20en\r\
  336.  
  337. SF:nContent-Length:\x201981\r\nDate:\x20Wed,\x2008\x20Dec\x202021\x2012:26
  338.  
  339. SF::48\x20GMT\r\nConnection:\x20close\r\nServer:\x20\x20\r\n\r\n<!doctype\
  340.  
  341. SF:x20html><html\x20lang=\"en\"><head><title>HTTP\x20Status\x20400\x20\xe2
  342.  
  343. SF:\x80\x93\x20Bad\x20Request</title><style\x20type=\"text/css\">body\x20{
  344.  
  345. SF:font-family:Tahoma,Arial,sans-serif;}\x20h1,\x20h2,\x20h3,\x20b\x20{col
  346.  
  347. SF:or:white;background-color:#525D76;}\x20h1\x20{font-size:22px;}\x20h2\x2
  348.  
  349. SF:0{font-size:16px;}\x20h3\x20{font-size:14px;}\x20p\x20{font-size:12px;}
  350.  
  351. SF:\x20a\x20{color:black;}\x20\.line\x20{height:1px;background-color:#525D
  352.  
  353. SF:76;border:none;}</style></head><body><h1>HTTP\x20Status\x20400\x20\xe2\
  354.  
  355. SF:x80\x93\x20Bad\x20Request</h1><hr\x20class=\"line\"\x20/><p><b>Type</b>
  356.  
  357. SF:\x20Exception\x20Report</p><p><b>Message</b>\x20Invalid\x20character\x2
  358.  
  359. SF:0found\x20in\x20method\x20name\x20\[l0x000x0b0x000x000x000x000x000x000x
  360.  
  361. SF:000x000x00\.\.\.\]\.\x20HTTP\x20method\x20names\x20must\x20be\x20tokens
  362.  
  363. SF:</p><p><b>Description</b>\x20The\x20server\x20cannot\x20or\x20will\x20n
  364.  
  365. SF:ot\x20process\x20the\x20request\x20due\x20to\x20something\x20that\x20is
  366.  
  367. SF:\x20perceived\x20to\x20be\x20");
  368.  
  369. ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
  370.  
  371. SF-Port5060-TCP:V=7.92%I=7%D=12/8%Time=61B0A494%P=i686-pc-windows-windows%
  372.  
  373. SF:r(SIPOptions,1A3,"SIP/2\.0\x20200\x20OK\r\nVia:\x20SIP/2\.0/TCP\x20nm;b
  374.  
  375. SF:ranch=foo;received=192\.168\.178\.217;rport=57818\r\nFrom:\x20<sip:nm@n
  376.  
  377. SF:m>;tag=root\r\nTo:\x20<sip:nm2@nm2>;tag=as70a7719b\r\nCall-ID:\x2050000
  378.  
  379. SF:\r\nCSeq:\x2042\x20OPTIONS\r\nServer:\x20STARFACE\x20PBX\r\nAllow:\x20I
  380.  
  381. SF:NVITE,\x20ACK,\x20CANCEL,\x20OPTIONS,\x20BYE,\x20REFER,\x20SUBSCRIBE,\x
  382.  
  383. SF:20NOTIFY,\x20INFO,\x20PUBLISH,\x20MESSAGE\r\nSupported:\x20replaces,\x2
  384.  
  385. SF:0timer\r\nContact:\x20<sip:192\.168\.178\.67:5060;transport=tcp>\r\nAcc
  386.  
  387. SF:ept:\x20application/sdp\r\nContent-Length:\x200\r\n\r\n");
  388.  
  389. ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
  390.  
  391. SF-Port5061-TCP:V=7.92%T=SSL%I=7%D=12/8%Time=61B0A49A%P=i686-pc-windows-wi
  392.  
  393. SF:ndows%r(SIPOptions,1A3,"SIP/2\.0\x20200\x20OK\r\nVia:\x20SIP/2\.0/TCP\x
  394.  
  395. SF:20nm;branch=foo;received=192\.168\.178\.217;rport=57850\r\nFrom:\x20<si
  396.  
  397. SF:p:nm@nm>;tag=root\r\nTo:\x20<sip:nm2@nm2>;tag=as70a7719b\r\nCall-ID:\x2
  398.  
  399. SF:050000\r\nCSeq:\x2042\x20OPTIONS\r\nServer:\x20STARFACE\x20PBX\r\nAllow
  400.  
  401. SF::\x20INVITE,\x20ACK,\x20CANCEL,\x20OPTIONS,\x20BYE,\x20REFER,\x20SUBSCR
  402.  
  403. SF:IBE,\x20NOTIFY,\x20INFO,\x20PUBLISH,\x20MESSAGE\r\nSupported:\x20replac
  404.  
  405. SF:es,\x20timer\r\nContact:\x20<sip:192\.168\.178\.67:5060;transport=tls>\
  406.  
  407. SF:r\nAccept:\x20application/sdp\r\nContent-Length:\x200\r\n\r\n");
  408.  
  409. MAC Address: 4A:E7:7D:BA:E2:5E (Unknown)
  410.  
  411. Device type: general purpose|WAP|storage-misc|media device|broadband router
  412.  
  413. Running (JUST GUESSING): Linux 3.X|4.X|2.6.X|2.4.X (94%), HP embedded (91%)
  414.  
  415. OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:2.4 cpe:/h:hp:p2000_g3 cpe:/o:linux:linux_kernel:2.4.35.4 cpe:/o:linux:linux_kernel:3.0
  416.  
  417. Aggressive OS guesses: Linux 3.12 - 4.10 (94%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (92%), Linux 2.6.32 - 3.10 (92%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (91%), OpenWrt White Russian 0.9 (Linux 2.4.30) (91%), Linux 3.18 (91%), HP P2000 G3 NAS device (91%), ProVision-ISR security DVR (90%), Linux 2.6.9 - 2.6.21 (89%), Linux 2.6.32 (89%)
  418.  
  419. No exact OS matches for host (test conditions non-ideal).
  420.  
  421. Network Distance: 1 hop
  422.  
  423. TCP Sequence Prediction: Difficulty=253 (Good luck!)
  424.  
  425. IP ID Sequence Generation: All zeros
  426.  
  427.  
  428.  
  429. TRACEROUTE
  430.  
  431. HOP RTT ADDRESS
  432.  
  433. 1 1.02 ms 192.168.178.67
  434.  
  435.  
  436.  
  437. NSE: Script Post-scanning.
  438.  
  439. Initiating NSE at 13:27
  440.  
  441. Completed NSE at 13:27, 0.00s elapsed
  442.  
  443. Initiating NSE at 13:27
  444.  
  445. Completed NSE at 13:27, 0.00s elapsed
  446.  
  447. Initiating NSE at 13:27
  448.  
  449. Completed NSE at 13:27, 0.00s elapsed
  450.  
  451. Read data files from: C:\Program Files (x86)\Nmap
  452.  
  453. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  454.  
  455. Nmap done: 1 IP address (1 host up) scanned in 43.69 seconds
  456.  
  457. Raw packets sent: 2044 (93.340KB) | Rcvd: 75 (5.864KB)
  458.  
  459.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement