Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting Nmap 7.31 ( https://nmap.org ) at 2016-12-11 20:29 Eastern Standard Time
- NSE: Loaded 142 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 20:29
- Completed NSE at 20:29, 0.03s elapsed
- Initiating NSE at 20:29
- Completed NSE at 20:29, 0.00s elapsed
- Initiating ARP Ping Scan at 20:29
- Scanning 255 hosts [1 port/host]
- Completed ARP Ping Scan at 20:29, 4.39s elapsed (255 total hosts)
- Initiating Parallel DNS resolution of 255 hosts. at 20:29
- Completed Parallel DNS resolution of 255 hosts. at 20:29, 0.06s elapsed
- Nmap scan report for 192.168.0.0 [host down]
- Nmap scan report for 192.168.0.3 [host down]
- Nmap scan report for 192.168.0.4 [host down]
- Nmap scan report for 192.168.0.5 [host down]
- Nmap scan report for 192.168.0.6 [host down]
- Nmap scan report for 192.168.0.7 [host down]
- Nmap scan report for 192.168.0.8 [host down]
- Nmap scan report for 192.168.0.9 [host down]
- Nmap scan report for 192.168.0.12 [host down]
- Nmap scan report for 192.168.0.14 [host down]
- Nmap scan report for 192.168.0.16 [host down]
- Nmap scan report for 192.168.0.18 [host down]
- Nmap scan report for 192.168.0.20 [host down]
- Nmap scan report for 192.168.0.21 [host down]
- Nmap scan report for 192.168.0.22 [host down]
- Nmap scan report for 192.168.0.23 [host down]
- Nmap scan report for 192.168.0.24 [host down]
- Nmap scan report for 192.168.0.25 [host down]
- Nmap scan report for 192.168.0.26 [host down]
- Nmap scan report for 192.168.0.27 [host down]
- Nmap scan report for 192.168.0.28 [host down]
- Nmap scan report for 192.168.0.29 [host down]
- Nmap scan report for 192.168.0.30 [host down]
- Nmap scan report for 192.168.0.31 [host down]
- Nmap scan report for 192.168.0.32 [host down]
- Nmap scan report for 192.168.0.33 [host down]
- Nmap scan report for 192.168.0.34 [host down]
- Nmap scan report for 192.168.0.35 [host down]
- Nmap scan report for 192.168.0.36 [host down]
- Nmap scan report for 192.168.0.37 [host down]
- Nmap scan report for 192.168.0.38 [host down]
- Nmap scan report for 192.168.0.39 [host down]
- Nmap scan report for 192.168.0.40 [host down]
- Nmap scan report for 192.168.0.41 [host down]
- Nmap scan report for 192.168.0.42 [host down]
- Nmap scan report for 192.168.0.43 [host down]
- Nmap scan report for 192.168.0.44 [host down]
- Nmap scan report for 192.168.0.45 [host down]
- Nmap scan report for 192.168.0.46 [host down]
- Nmap scan report for 192.168.0.47 [host down]
- Nmap scan report for 192.168.0.48 [host down]
- Nmap scan report for 192.168.0.49 [host down]
- Nmap scan report for 192.168.0.50 [host down]
- Nmap scan report for 192.168.0.51 [host down]
- Nmap scan report for 192.168.0.52 [host down]
- Nmap scan report for 192.168.0.53 [host down]
- Nmap scan report for 192.168.0.54 [host down]
- Nmap scan report for 192.168.0.55 [host down]
- Nmap scan report for 192.168.0.56 [host down]
- Nmap scan report for 192.168.0.57 [host down]
- Nmap scan report for 192.168.0.58 [host down]
- Nmap scan report for 192.168.0.59 [host down]
- Nmap scan report for 192.168.0.60 [host down]
- Nmap scan report for 192.168.0.61 [host down]
- Nmap scan report for 192.168.0.62 [host down]
- Nmap scan report for 192.168.0.63 [host down]
- Nmap scan report for 192.168.0.64 [host down]
- Nmap scan report for 192.168.0.65 [host down]
- Nmap scan report for 192.168.0.66 [host down]
- Nmap scan report for 192.168.0.67 [host down]
- Nmap scan report for 192.168.0.68 [host down]
- Nmap scan report for 192.168.0.69 [host down]
- Nmap scan report for 192.168.0.70 [host down]
- Nmap scan report for 192.168.0.71 [host down]
- Nmap scan report for 192.168.0.72 [host down]
- Nmap scan report for 192.168.0.73 [host down]
- Nmap scan report for 192.168.0.74 [host down]
- Nmap scan report for 192.168.0.75 [host down]
- Nmap scan report for 192.168.0.76 [host down]
- Nmap scan report for 192.168.0.77 [host down]
- Nmap scan report for 192.168.0.78 [host down]
- Nmap scan report for 192.168.0.79 [host down]
- Nmap scan report for 192.168.0.80 [host down]
- Nmap scan report for 192.168.0.81 [host down]
- Nmap scan report for 192.168.0.82 [host down]
- Nmap scan report for 192.168.0.83 [host down]
- Nmap scan report for 192.168.0.84 [host down]
- Nmap scan report for 192.168.0.85 [host down]
- Nmap scan report for 192.168.0.86 [host down]
- Nmap scan report for 192.168.0.87 [host down]
- Nmap scan report for 192.168.0.88 [host down]
- Nmap scan report for 192.168.0.89 [host down]
- Nmap scan report for 192.168.0.90 [host down]
- Nmap scan report for 192.168.0.91 [host down]
- Nmap scan report for 192.168.0.92 [host down]
- Nmap scan report for 192.168.0.93 [host down]
- Nmap scan report for 192.168.0.94 [host down]
- Nmap scan report for 192.168.0.95 [host down]
- Nmap scan report for 192.168.0.96 [host down]
- Nmap scan report for 192.168.0.97 [host down]
- Nmap scan report for 192.168.0.98 [host down]
- Nmap scan report for 192.168.0.99 [host down]
- Nmap scan report for 192.168.0.100 [host down]
- Nmap scan report for 192.168.0.101 [host down]
- Nmap scan report for 192.168.0.102 [host down]
- Nmap scan report for 192.168.0.103 [host down]
- Nmap scan report for 192.168.0.104 [host down]
- Nmap scan report for 192.168.0.105 [host down]
- Nmap scan report for 192.168.0.106 [host down]
- Nmap scan report for 192.168.0.107 [host down]
- Nmap scan report for 192.168.0.108 [host down]
- Nmap scan report for 192.168.0.109 [host down]
- Nmap scan report for 192.168.0.110 [host down]
- Nmap scan report for 192.168.0.111 [host down]
- Nmap scan report for 192.168.0.112 [host down]
- Nmap scan report for 192.168.0.113 [host down]
- Nmap scan report for 192.168.0.114 [host down]
- Nmap scan report for 192.168.0.115 [host down]
- Nmap scan report for 192.168.0.116 [host down]
- Nmap scan report for 192.168.0.117 [host down]
- Nmap scan report for 192.168.0.118 [host down]
- Nmap scan report for 192.168.0.119 [host down]
- Nmap scan report for 192.168.0.120 [host down]
- Nmap scan report for 192.168.0.121 [host down]
- Nmap scan report for 192.168.0.122 [host down]
- Nmap scan report for 192.168.0.123 [host down]
- Nmap scan report for 192.168.0.124 [host down]
- Nmap scan report for 192.168.0.125 [host down]
- Nmap scan report for 192.168.0.126 [host down]
- Nmap scan report for 192.168.0.127 [host down]
- Nmap scan report for 192.168.0.128 [host down]
- Nmap scan report for 192.168.0.129 [host down]
- Nmap scan report for 192.168.0.130 [host down]
- Nmap scan report for 192.168.0.131 [host down]
- Nmap scan report for 192.168.0.132 [host down]
- Nmap scan report for 192.168.0.133 [host down]
- Nmap scan report for 192.168.0.134 [host down]
- Nmap scan report for 192.168.0.135 [host down]
- Nmap scan report for 192.168.0.136 [host down]
- Nmap scan report for 192.168.0.137 [host down]
- Nmap scan report for 192.168.0.138 [host down]
- Nmap scan report for 192.168.0.139 [host down]
- Nmap scan report for 192.168.0.140 [host down]
- Nmap scan report for 192.168.0.141 [host down]
- Nmap scan report for 192.168.0.142 [host down]
- Nmap scan report for 192.168.0.143 [host down]
- Nmap scan report for 192.168.0.144 [host down]
- Nmap scan report for 192.168.0.145 [host down]
- Nmap scan report for 192.168.0.146 [host down]
- Nmap scan report for 192.168.0.147 [host down]
- Nmap scan report for 192.168.0.148 [host down]
- Nmap scan report for 192.168.0.149 [host down]
- Nmap scan report for 192.168.0.150 [host down]
- Nmap scan report for 192.168.0.151 [host down]
- Nmap scan report for 192.168.0.152 [host down]
- Nmap scan report for 192.168.0.153 [host down]
- Nmap scan report for 192.168.0.154 [host down]
- Nmap scan report for 192.168.0.155 [host down]
- Nmap scan report for 192.168.0.156 [host down]
- Nmap scan report for 192.168.0.157 [host down]
- Nmap scan report for 192.168.0.158 [host down]
- Nmap scan report for 192.168.0.159 [host down]
- Nmap scan report for 192.168.0.160 [host down]
- Nmap scan report for 192.168.0.161 [host down]
- Nmap scan report for 192.168.0.162 [host down]
- Nmap scan report for 192.168.0.163 [host down]
- Nmap scan report for 192.168.0.164 [host down]
- Nmap scan report for 192.168.0.165 [host down]
- Nmap scan report for 192.168.0.166 [host down]
- Nmap scan report for 192.168.0.167 [host down]
- Nmap scan report for 192.168.0.168 [host down]
- Nmap scan report for 192.168.0.169 [host down]
- Nmap scan report for 192.168.0.170 [host down]
- Nmap scan report for 192.168.0.171 [host down]
- Nmap scan report for 192.168.0.172 [host down]
- Nmap scan report for 192.168.0.173 [host down]
- Nmap scan report for 192.168.0.174 [host down]
- Nmap scan report for 192.168.0.175 [host down]
- Nmap scan report for 192.168.0.176 [host down]
- Nmap scan report for 192.168.0.177 [host down]
- Nmap scan report for 192.168.0.178 [host down]
- Nmap scan report for 192.168.0.179 [host down]
- Nmap scan report for 192.168.0.180 [host down]
- Nmap scan report for 192.168.0.181 [host down]
- Nmap scan report for 192.168.0.182 [host down]
- Nmap scan report for 192.168.0.183 [host down]
- Nmap scan report for 192.168.0.184 [host down]
- Nmap scan report for 192.168.0.185 [host down]
- Nmap scan report for 192.168.0.186 [host down]
- Nmap scan report for 192.168.0.187 [host down]
- Nmap scan report for 192.168.0.188 [host down]
- Nmap scan report for 192.168.0.189 [host down]
- Nmap scan report for 192.168.0.190 [host down]
- Nmap scan report for 192.168.0.191 [host down]
- Nmap scan report for 192.168.0.192 [host down]
- Nmap scan report for 192.168.0.193 [host down]
- Nmap scan report for 192.168.0.194 [host down]
- Nmap scan report for 192.168.0.195 [host down]
- Nmap scan report for 192.168.0.196 [host down]
- Nmap scan report for 192.168.0.197 [host down]
- Nmap scan report for 192.168.0.198 [host down]
- Nmap scan report for 192.168.0.199 [host down]
- Nmap scan report for 192.168.0.200 [host down]
- Nmap scan report for 192.168.0.201 [host down]
- Nmap scan report for 192.168.0.202 [host down]
- Nmap scan report for 192.168.0.203 [host down]
- Nmap scan report for 192.168.0.204 [host down]
- Nmap scan report for 192.168.0.205 [host down]
- Nmap scan report for 192.168.0.206 [host down]
- Nmap scan report for 192.168.0.207 [host down]
- Nmap scan report for 192.168.0.208 [host down]
- Nmap scan report for 192.168.0.209 [host down]
- Nmap scan report for 192.168.0.210 [host down]
- Nmap scan report for 192.168.0.211 [host down]
- Nmap scan report for 192.168.0.212 [host down]
- Nmap scan report for 192.168.0.213 [host down]
- Nmap scan report for 192.168.0.214 [host down]
- Nmap scan report for 192.168.0.215 [host down]
- Nmap scan report for 192.168.0.216 [host down]
- Nmap scan report for 192.168.0.217 [host down]
- Nmap scan report for 192.168.0.218 [host down]
- Nmap scan report for 192.168.0.219 [host down]
- Nmap scan report for 192.168.0.220 [host down]
- Nmap scan report for 192.168.0.221 [host down]
- Nmap scan report for 192.168.0.222 [host down]
- Nmap scan report for 192.168.0.223 [host down]
- Nmap scan report for 192.168.0.224 [host down]
- Nmap scan report for 192.168.0.225 [host down]
- Nmap scan report for 192.168.0.226 [host down]
- Nmap scan report for 192.168.0.227 [host down]
- Nmap scan report for 192.168.0.228 [host down]
- Nmap scan report for 192.168.0.229 [host down]
- Nmap scan report for 192.168.0.230 [host down]
- Nmap scan report for 192.168.0.231 [host down]
- Nmap scan report for 192.168.0.232 [host down]
- Nmap scan report for 192.168.0.233 [host down]
- Nmap scan report for 192.168.0.234 [host down]
- Nmap scan report for 192.168.0.235 [host down]
- Nmap scan report for 192.168.0.236 [host down]
- Nmap scan report for 192.168.0.237 [host down]
- Nmap scan report for 192.168.0.238 [host down]
- Nmap scan report for 192.168.0.239 [host down]
- Nmap scan report for 192.168.0.240 [host down]
- Nmap scan report for 192.168.0.241 [host down]
- Nmap scan report for 192.168.0.242 [host down]
- Nmap scan report for 192.168.0.243 [host down]
- Nmap scan report for 192.168.0.244 [host down]
- Nmap scan report for 192.168.0.245 [host down]
- Nmap scan report for 192.168.0.246 [host down]
- Nmap scan report for 192.168.0.247 [host down]
- Nmap scan report for 192.168.0.248 [host down]
- Nmap scan report for 192.168.0.249 [host down]
- Nmap scan report for 192.168.0.250 [host down]
- Nmap scan report for 192.168.0.251 [host down]
- Nmap scan report for 192.168.0.252 [host down]
- Nmap scan report for 192.168.0.253 [host down]
- Nmap scan report for 192.168.0.254 [host down]
- Nmap scan report for 192.168.0.255 [host down]
- Initiating Parallel DNS resolution of 1 host. at 20:29
- Completed Parallel DNS resolution of 1 host. at 20:29, 0.03s elapsed
- Initiating SYN Stealth Scan at 20:29
- Scanning 7 hosts [1000 ports/host]
- Discovered open port 139/tcp on 192.168.0.2
- Discovered open port 53/tcp on 192.168.0.1
- Discovered open port 139/tcp on 192.168.0.1
- Discovered open port 445/tcp on 192.168.0.2
- Discovered open port 445/tcp on 192.168.0.1
- Discovered open port 139/tcp on 192.168.0.17
- Discovered open port 80/tcp on 192.168.0.1
- Discovered open port 445/tcp on 192.168.0.17
- Discovered open port 80/tcp on 192.168.0.17
- Discovered open port 443/tcp on 192.168.0.1
- Discovered open port 3689/tcp on 192.168.0.19
- Discovered open port 49152/tcp on 192.168.0.2
- Completed SYN Stealth Scan against 192.168.0.2 in 0.45s (6 hosts left)
- Discovered open port 135/tcp on 192.168.0.17
- Discovered open port 443/tcp on 192.168.0.17
- Increasing send delay for 192.168.0.13 from 0 to 5 due to 34 out of 84 dropped probes since last increase.
- Increasing send delay for 192.168.0.15 from 0 to 5 due to 34 out of 84 dropped probes since last increase.
- Increasing send delay for 192.168.0.19 from 0 to 5 due to 40 out of 99 dropped probes since last increase.
- Discovered open port 5000/tcp on 192.168.0.19
- Discovered open port 7100/tcp on 192.168.0.19
- Discovered open port 6646/tcp on 192.168.0.17
- Increasing send delay for 192.168.0.19 from 5 to 10 due to max_successful_tryno increase to 5
- Increasing send delay for 192.168.0.15 from 5 to 10 due to max_successful_tryno increase to 5
- Completed SYN Stealth Scan against 192.168.0.17 in 25.17s (5 hosts left)
- Completed SYN Stealth Scan against 192.168.0.1 in 26.14s (4 hosts left)
- Increasing send delay for 192.168.0.13 from 5 to 10 due to max_successful_tryno increase to 5
- Completed SYN Stealth Scan against 192.168.0.10 in 29.04s (3 hosts left)
- Warning: 192.168.0.19 giving up on port because retransmission cap hit (6).
- Warning: 192.168.0.15 giving up on port because retransmission cap hit (6).
- Discovered open port 7000/tcp on 192.168.0.19
- Discovered open port 62078/tcp on 192.168.0.15
- Discovered open port 62078/tcp on 192.168.0.19
- Completed SYN Stealth Scan against 192.168.0.15 in 42.06s (2 hosts left)
- Discovered open port 62078/tcp on 192.168.0.13
- Warning: 192.168.0.13 giving up on port because retransmission cap hit (6).
- Completed SYN Stealth Scan against 192.168.0.19 in 45.06s (1 host left)
- Completed SYN Stealth Scan at 20:30, 46.21s elapsed (7000 total ports)
- Initiating Service scan at 20:30
- Scanning 21 services on 7 hosts
- Completed Service scan at 20:32, 121.91s elapsed (21 services on 7 hosts)
- Initiating OS detection (try #1) against 7 hosts
- Retrying OS detection (try #2) against 3 hosts
- Retrying OS detection (try #3) against hitronhub.home (192.168.0.1)
- Retrying OS detection (try #4) against hitronhub.home (192.168.0.1)
- Retrying OS detection (try #5) against hitronhub.home (192.168.0.1)
- NSE: Script scanning 7 hosts.
- Initiating NSE at 20:32
- Completed NSE at 20:33, 82.28s elapsed
- Initiating NSE at 20:33
- Completed NSE at 20:33, 0.04s elapsed
- Nmap scan report for hitronhub.home (192.168.0.1)
- Host is up (0.0022s latency).
- Not shown: 993 closed ports
- PORT STATE SERVICE VERSION
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 53/tcp open domain dnsmasq 2.63rc6
- | dns-nsid:
- |_ bind.version: dnsmasq-2.63rc6
- 80/tcp open http GoAhead WebServer
- |_http-favicon: Unknown favicon MD5: BCC03687212F9BDA1A9B7D70AA5B6215
- | http-methods:
- |_ Supported Methods: HEAD
- | http-title: Site doesn't have a title (text/html).
- |_Requested resource was http://hitronhub.home/login.html
- 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: HIRON)
- 443/tcp open ssl/http GoAhead WebServer
- |_http-server-header: GoAhead-Webs
- | ssl-cert: Subject: commonName=00:FC:8D:3B:4A:50/organizationName=Hitron Technologies/countryName=TW
- | Issuer: commonName=CableLabs, Inc. Cable Modem Root Certificate Authority/organizationName=CableLabs, Inc./countryName=US
- | Public Key type: rsa
- | Public Key bits: 1024
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2015-05-26T00:00:00
- | Not valid after: 2035-05-25T23:59:59
- | MD5: 971e 7268 341a dcb7 f044 1927 71f2 5d2f
- |_SHA-1: 521e aa4e b4ac 271c e046 5361 bd92 1e38 b167 0512
- 445/tcp open netbios-ssn Samba smbd 3.0.37 (workgroup: HIRON)
- MAC Address: 00:FC:8D:3B:4A:52 (Hitron Technologies.)
- No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
- TCP/IP fingerprint:
- OS:SCAN(V=7.31%E=4%D=12/11%OT=53%CT=1%CU=30275%PV=Y%DS=1%DC=D%G=Y%M=00FC8D%
- OS:TM=584DFE7D%P=i686-pc-windows-windows)SEQ(SP=C7%GCD=1%ISR=D1%TI=Z%CI=Z%I
- OS:I=I%TS=7)SEQ(CI=Z%II=I%TS=8)SEQ(TI=Z%CI=Z%II=I%TS=8)OPS(O1=M5B4ST11NW2%O
- OS:2=M5B4ST11NW2%O3=M5B4NNT11NW2%O4=M5B4ST11NW2%O5=M5B4ST11NW2%O6=M5B4ST11)
- OS:WIN(W1=3890%W2=3890%W3=3890%W4=3890%W5=3890%W6=3890)ECN(R=Y%DF=Y%T=40%W=
- OS:3908%O=M5B4NNSNW2%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)
- OS:T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%
- OS:S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(
- OS:R=N)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R
- OS:=Y%DFI=N%T=40%CD=S)
- Uptime guess: 37.403 days (since Fri Nov 04 11:53:28 2016)
- Network Distance: 1 hop
- IP ID Sequence Generation: All zeros
- Host script results:
- |_clock-skew: mean: 1m41s, deviation: 1d-1h-1m-1s, median: 1m41s
- | nbstat: NetBIOS name: INTEL_CE_LINUX, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
- | Names:
- | INTEL_CE_LINUX<00> Flags: <unique><active>
- | INTEL_CE_LINUX<03> Flags: <unique><active>
- | INTEL_CE_LINUX<20> Flags: <unique><active>
- | \x01\x02__MSBROWSE__\x02<01> Flags: <group><active>
- | HIRON<1d> Flags: <unique><active>
- | HIRON<1e> Flags: <group><active>
- |_ HIRON<00> Flags: <group><active>
- | smb-os-discovery:
- | OS: Unix (Samba 3.0.37)
- | NetBIOS computer name:
- | Workgroup: HIRON\x00
- |_ System time: 2016-12-12T01:34:17+00:00
- | smb-security-mode:
- | account_used: guest
- | authentication_level: share (dangerous)
- | challenge_response: supported
- |_ message_signing: disabled (dangerous, but default)
- |_smbv2-enabled: Server doesn't support SMBv2 protocol
- TRACEROUTE
- HOP RTT ADDRESS
- 1 2.15 ms hitronhub.home (192.168.0.1)
- Nmap scan report for 192.168.0.2
- Host is up (0.00039s latency).
- Not shown: 997 closed ports
- PORT STATE SERVICE VERSION
- 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: HIRON)
- 445/tcp open netbios-ssn Samba smbd 3.0.37 (workgroup: HIRON)
- 49152/tcp open http Linksys E8350 WAP or TP-LINK router
- | http-methods:
- |_ Supported Methods: GET POST
- |_http-title: Site doesn't have a title.
- MAC Address: 00:FC:8D:3B:4A:58 (Hitron Technologies.)
- Device type: general purpose
- Running: Linux 2.6.X|3.X
- OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
- OS details: Linux 2.6.38 - 3.0
- Uptime guess: 56.104 days (since Sun Oct 16 19:04:32 2016)
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=203 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: CPE: cpe:/h:linksys:e8350
- Host script results:
- |_clock-skew: mean: 1m42s, deviation: 1d-1h-1m-1s, median: 1m42s
- | nbstat: NetBIOS name: INTEL_CE_LINUX, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
- | Names:
- | INTEL_CE_LINUX<00> Flags: <unique><active>
- | INTEL_CE_LINUX<03> Flags: <unique><active>
- | INTEL_CE_LINUX<20> Flags: <unique><active>
- | \x01\x02__MSBROWSE__\x02<01> Flags: <group><active>
- | HIRON<1d> Flags: <unique><active>
- | HIRON<1e> Flags: <group><active>
- |_ HIRON<00> Flags: <group><active>
- | smb-os-discovery:
- | OS: Unix (Samba 3.0.37)
- | NetBIOS computer name:
- | Workgroup: HIRON\x00
- |_ System time: 2016-12-12T01:34:17+00:00
- | smb-security-mode:
- | account_used: guest
- | authentication_level: share (dangerous)
- | challenge_response: supported
- |_ message_signing: disabled (dangerous, but default)
- |_smbv2-enabled: Server doesn't support SMBv2 protocol
- TRACEROUTE
- HOP RTT ADDRESS
- 1 0.39 ms 192.168.0.2
- Nmap scan report for 192.168.0.10
- Host is up (0.0010s latency).
- All 1000 scanned ports on 192.168.0.10 are filtered
- MAC Address: 38:1C:1A:B8:7A:24 (Cisco Systems)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 1 hop
- TRACEROUTE
- HOP RTT ADDRESS
- 1 1.02 ms 192.168.0.10
- Nmap scan report for 192.168.0.13
- Host is up (0.010s latency).
- Not shown: 986 closed ports
- PORT STATE SERVICE VERSION
- 1417/tcp filtered timbuktu-srv1
- 1583/tcp filtered simbaexpress
- 2003/tcp filtered finger
- 2034/tcp filtered scoremgr
- 2800/tcp filtered acc-raid
- 5190/tcp filtered aol
- 5730/tcp filtered unieng
- 6009/tcp filtered X11:9
- 8089/tcp filtered unknown
- 8292/tcp filtered blp3
- 10621/tcp filtered unknown
- 32779/tcp filtered sometimes-rpc21
- 51103/tcp filtered unknown
- 62078/tcp open tcpwrapped
- MAC Address: B4:4B:D2:89:37:A9 (Unknown)
- OS details: Apple Mac OS X 10.7.0 (Lion) - 10.11 (El Capitan) or iOS 4.1 - 9 (Darwin 10.0.0 - 15.0.0)
- Uptime guess: 2.037 days (since Fri Dec 09 19:40:02 2016)
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=245 (Good luck!)
- IP ID Sequence Generation: Randomized
- TRACEROUTE
- HOP RTT ADDRESS
- 1 10.25 ms 192.168.0.13
- Nmap scan report for 192.168.0.15
- Host is up (0.025s latency).
- Not shown: 965 closed ports, 34 filtered ports
- PORT STATE SERVICE VERSION
- 62078/tcp open tcpwrapped
- MAC Address: 0C:51:01:8E:10:16 (Unknown)
- OS details: Apple Mac OS X 10.7.0 (Lion) - 10.11 (El Capitan) or iOS 4.1 - 9 (Darwin 10.0.0 - 15.0.0)
- Uptime guess: 6.143 days (since Mon Dec 05 17:07:47 2016)
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=257 (Good luck!)
- IP ID Sequence Generation: Randomized
- TRACEROUTE
- HOP RTT ADDRESS
- 1 25.50 ms 192.168.0.15
- Nmap scan report for 192.168.0.17
- Host is up (0.011s latency).
- Not shown: 994 filtered ports
- PORT STATE SERVICE VERSION
- 80/tcp open http
- | http-methods:
- |_ Supported Methods: GET
- |_http-title: Site doesn't have a title.
- 135/tcp open msrpc Microsoft Windows RPC
- 139/tcp open netbios-ssn Microsoft Windows netbios-ssn
- 443/tcp open https
- | http-methods:
- |_ Supported Methods: GET
- |_http-title: Site doesn't have a title.
- 445/tcp open microsoft-ds Microsoft Windows 7 - 10 microsoft-ds
- 6646/tcp open tcpwrapped
- 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port80-TCP:V=7.31%I=7%D=12/11%Time=584DFDAD%P=i686-pc-windows-windows%r
- SF:(GetRequest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(HTTPOption
- SF:s,58,"\x02L\x9b\x0f\x0cK\xbf\x83\xb9\x1d\(W,G3\\\xd4Hp\x0eL\x1d3\xfeB\x
- SF:a6_cm\x85\x1b\x7f\xbb\xf1\xc7\xe5\xa1\xff\xe3\*\x17\xc1G~\xd6\x0f\xbdJo
- SF:X\x01\x80&\xfcg\xdd~%S\x1f\xfc\x0b\x19\x07y\xa6\]}4\x05\t2\x88\xbb\xa9\
- SF:xadi\xcd\xc9\xe138\xb8\x118\(L\x04")%r(RTSPRequest,50,"9!\x0e\xba\xa8\x
- SF:85-@_\xd4u\x1d\xa2\xf4v\+\x04k5\x9e\xfc\x10\?O\)`\xba\n6Y\x85\x84j\xcf<
- SF:Ey\xa6\xa2\x8eU\x91\xeb\x034C\x07G67\xdb\x98\xae\x89\xcb\x05%\x99l8`V\x
- SF:10\(XV\x17\xceG2\xfd\xd8\xf4\$I\+5\xf1\?\xac")%r(FourOhFourRequest,1A,"
- SF:HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(RPCCheck,36,"C\xcd4\xf8}\"
- SF:q3\xb8\x96\xaa\x08!\xf0\xe2\xfa\x8b\x1e\(\xfcd\x95\xba\x9e\x95\xc1F\xe1
- SF:\"\xe6w\xeb\x04\x8e8\xf0\)\xac\x0bt\xef\[\x97C\x94\xa6\x1a\xbb\xb3\xce\
- SF:xaf\x14\xabW")%r(DNSVersionBindReq,52,"\xcew>\|\]\x17\x1e'\xc5\x02\xc8\
- SF:xa96H\xfb\x05\xd6\x0b\xacE\xb6\xef\xaa\x82aS1\x08\xcc&\xb1\xf3\xa1\xba\
- SF:xe8\xe0\xb1\x9c2l\xac\x01\.8\"\xe4H\*\xf2\x81\xe7A\xa8\xb4\xf9\xe0_\xcf
- SF:\x19l\xdb\x07A\xca\x92\x0cP\x8fr\x14\xd0A\|\x86\xb8\xf4\xee\xa5K\xcfW\x
- SF:04")%r(DNSStatusRequest,67,"'\xaa\xb7\x89\x93\xfa/'<\x0e\xbb\xebV\x14\x
- SF:c5}O\xe8\x94`\x18\x9a3\x0e\xfd\^@\xc9\xca\xbb\xf4a>s\xc4\]x\xf0gj1n_\x8
- SF:3\\\x1e\x9c\xfdYLE\xb4\xb8\xb7#y\x19\xc9\\;\xc6B\xe8\x88\x89\x1e_\x0f\x
- SF:b3\xcf\x88\"\xe8\x18\xc5k\x8c\xde\x80\+\xa8\x857\x95c\x04\x81\xef\xc2\x
- SF:df\xcdO3\xfc\xd6\x11\x82\x84\xcd\(\x8e\(\xbd")%r(SSLSessionReq,62,"v\xe
- SF:1\x1b=E,\xcd\xd0\xda\x1f\x82\]NP``\xb0\xb7K\x192\xe6\x87\xa3\xadoTy\x03
- SF:\xc590Pc\x1a\xe8~\xde\xf0\.l\x7f\xdbK\xd5\xe7Qzs\xf1\xd1\xa8\xbcd\x87M\
- SF:x9c\x05\xde\x05k\x93\xe0\xef\xb6\xeb\xa9\xeb\.\x9e\xae\x88\xe0\t5\xa9\x
- SF:d1\x81{W,-a\]\]\xea\xd7\x12\xb12\xbf\x18\xdfy\xaa\xbf\x86&")%r(TLSSessi
- SF:onReq,3C,"9\xd7\x1a5\)\xdf\xf1\"\x0el\xd8\^\x12\xc4\xed\xbe\xcc\xff\[\x
- SF:b0\[\x11\xde>\x8a\x95\t\xec@@\xc1\x82Ki\]J\x1e\xb1\x0e\xb8\xe0\xd2\xe2\
- SF:xb8\x05\x05\x18\x03o\x92\x94\x1f\x12q\xe8\xb6ep\xf8\?")%r(Kerberos,76,"
- SF:a\xdb\xb5\xb2\xd0gR\xb5\xec\x04\xad\x04\xe2\xdfu\xe8\|\x13L\xe8\xf0SR\x
- SF:91\xab:\x02c\xecP\xf7Jt\x08\x86\xa2\r\"\x0co\xad{\]F\xb9\x0fSm\xab\x7f\
- SF:x07%\x82\xb2SD2~q\xf5\xe6\xa2\x92/!Z\x07\x86qG\xcd\.E\xd1\.Dgs\x98q\xb7
- SF:\^u6\xe1\x08\xd8\xca\xf5\xfa\xdb\xba\x8f\xba\x03G0\xb0\xda\xc7WV\x90\xb
- SF:f2\xd9\xfc\x18\xcd\xd7YI\$#\x94\xe7\xbd\x20");
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port443-TCP:V=7.31%I=7%D=12/11%Time=584DFDB2%P=i686-pc-windows-windows%
- SF:r(SSLSessionReq,3C,"Na\xca\x8d{\xe0u\x7fa\x94\xafLU{u\xab\xae\x0e\x0f\n
- SF:\x84\xa7r\xad\x14O\x0ck\xa9\x1d\x80\xe9\xc0\xc2\[\xa8\xe7''\x17\xfd\x1e
- SF:\xab\]\xb6{\xd0\xb7\xd5\xd4\xb7E\"\x15\x89\\5\xcc\xba\x16")%r(TLSSessio
- SF:nReq,3E,"\x87\x90\xa0\x19\x02\xb1,d\xef\x91\xbch&\xcf\x16w\x9f\x90\x04U
- SF:x\x0e\xeeX\x97\xf8\xf5\xb4\xd6;I\x8a\x0e\x20\x04=\xe5\xb6C\x08\x02V'\xb
- SF:d\)\x97e9\xe2\xa4\xd1'\x80\xa3\xe3\t\0\x03j\xea\x80\^")%r(SSLv23Session
- SF:Req,5E,"m1\xef\x8b\xf4j\xd9j\xec\xd4\x96{\xc7\xcc\xa2o3,3\x03ln\xdd\xc5
- SF:S\xc2z\xf6\xa4\xfa\xb6\xc1\x9f\x1fL\x80FTj\xfe\x90o\x15\+\+\x1eS~\xb1\x
- SF:ffb\x91p\xb4\x8a\*\$IV\xcfO\xecKX\x1a\x92~\xd8\xec\x87\xd3>\x9f\*\x1b\x
- SF:96\xbd\xd9#\x9d\x8f\xb8=\xb4SG\xf3\xd4\xb64\x02C\x8e\x06")%r(OpenVPN,3B
- SF:,"\x191\?\x04\x1eY\xac\x02~}\+\xa5\xe2\xd0\\~\xe9\xfb\x85\xda\x8bU\+\x1
- SF:4\x98\x9fF\xbc\xfa9\n;_ud\x8b\xe3{W\xaf\xf7\xa2\xdeo\xfb\x9b\?\xe1\x81b
- SF:S\x0b\x82f\xbc\xb5\xf6\xe4\xde")%r(GetRequest,1A,"HTTP/1\.0\x20404\x20N
- SF:ot\x20Found\r\n\r\n")%r(HTTPOptions,6E,"\xe3O\xf6\x9a\x08\?\xfa\x1c3Y\x
- SF:e4Ht\xe8\x18\xfb\xfe\xb8\xd8\x0c\[\x85\xc8D\[\x8b\x97\xdc\xe6@vK\x1d\xc
- SF:eG\xe6\xd6\"R\?\xf8\xd0\xa1\x12v\xf1i\x19\xfa:\x94\x80\xe0_\xca\xb6\xa3
- SF:\xa6\x92\xca\x9a\xba\x90\xf8\x9d#`v\xdcb\xa0\xaah\xab%\x1en\xcb9\x9c\"%
- SF:A\xad\xd2IR\^\xfa\xc1\xeb0\x1a\x93\x18<\xfb\r\xd0\xa5\xec\xea2@\x8e\[\x
- SF:f4\x11\x14\?")%r(RTSPRequest,39,"\x95hde\xdc\xcf>\xbe3x\xc3\r\xb5-\x9ft
- SF:\xf6<\xbbJ<8\xfa\xd8\xc7`\x14,\x86d1\xbaqQ\xa3\xbd\xa0\x8e\xb7\xf6p\x05
- SF:6\xd8\x0f:C\xe0\xd3\x83P\.A\xe0d\x86\xe6")%r(RPCCheck,47,"E\xf9_wp\xa6\
- SF:x08t\xa0\*\xce\x89E\x15W\xaf6t&\xb6\xb8\r\x80@\x15\x87\xb9\xc2'\xa6\xa3
- SF:\x10\xd2\xf1u\xf2\xf7W\xb7\xc9\xd3h\x0f\x85\xa1rh\x085a\xdaT\xb74\x83\x
- SF:a4\xb2Z\x7fZ\xda\x1f\xfb\x8c\x8e\|\nZ\\\xf1\xef")%r(DNSVersionBindReq,5
- SF:F,">\xd3\x82\xa0S\xaa\x154\x1c~\xd6\xbd\xcbi\xd0\xa3\xd8\x86Zs,\0\x04\x
- SF:8e\0\x18\x8f\x92\xbc\xdc\xb4\xacm\x02k\xf4\x95\x9c\xb8\xa7\xc3\x04\xb5/
- SF:>\xad\xebn\\\^u\xc0\xb3\xf6\xc8oN\xa7\xed\x87\x99h\xb3_\xdd\xa7=-\xe0\x
- SF:fb\xb5'\xba\x8ak\xa9fL#\xacLbOG\x10\x81\x88\xa4\xe2\xa6\xda\xd8`\xd5/")
- SF:%r(DNSStatusRequest,6F,"\x10nHE\x8a\xa0\xba\xa1\x84n\xcdfiwtc\xde%\x18\
- SF:xbc\x1aP\xb4\xe0tX\xfa\x88\x9e\xa9\xc8\x938\xa9\xa5\x92\?\xd5\x07d\x99d
- SF:\xfa\xb3swz\xd0\xeb\xfe\xf8\xfd\xd2\x1c\x8f\xb9\xb2\xc6\xd2\x9c\x1bK\xf
- SF:4>\xfc\xdc\x1a\(\r-w\x90a\xcb\x8d\x95\^\xc0\x7fJFo!\xc4\xa1\xc4\xcf\x8b
- SF:\xb0\x9b\xc0\x18\x1c\x07\xa7\r\xb4\xde\x84\x94\xf3\xe6\xfb\x8e\xd8qd\xb
- SF:a\x8a\xf5\xff");
- MAC Address: DC:53:60:B1:34:0B (Intel Corporate)
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Microsoft Windows Phone 7.5 or 8.0 (94%), Microsoft Windows 10 build 10586 (93%), Microsoft Windows Server 2008 R2 or Windows 8.1 (93%), Microsoft Windows 7 Professional or Windows 8 (93%), Microsoft Windows Vista SP0 or SP1, Windows Server 2008 SP1, or Windows 7 (93%), Microsoft Windows Embedded Standard 7 (93%), Microsoft Windows Vista SP2, Windows 7 SP1, or Windows Server 2008 (93%), Microsoft Windows Server 2008 R2 (91%), Microsoft Windows Server 2008 SP1 (91%), Microsoft Windows 7 (91%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 14.153 days (since Sun Nov 27 16:53:19 2016)
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=262 (Good luck!)
- IP ID Sequence Generation: Incremental
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- Host script results:
- |_clock-skew: mean: -17s, deviation: 1d-1h-1m-1s, median: -17s
- | nbstat: NetBIOS name: DESKTOP-FVDE69L, NetBIOS user: <unknown>, NetBIOS MAC: dc:53:60:b1:34:0b (Intel Corporate)
- | Names:
- | DESKTOP-FVDE69L<20> Flags: <unique><active>
- | DESKTOP-FVDE69L<00> Flags: <unique><active>
- |_ WORKGROUP<00> Flags: <group><active>
- | smb-security-mode:
- | account_used: guest
- | authentication_level: user
- | challenge_response: supported
- |_ message_signing: disabled (dangerous, but default)
- |_smbv2-enabled: Server supports SMBv2 protocol
- TRACEROUTE
- HOP RTT ADDRESS
- 1 11.05 ms 192.168.0.17
- Nmap scan report for 192.168.0.19
- Host is up (0.036s latency).
- Not shown: 977 closed ports
- PORT STATE SERVICE VERSION
- 1022/tcp filtered exp2
- 1032/tcp filtered iad3
- 1107/tcp filtered isoipsigport-2
- 1236/tcp filtered bvcontrol
- 1309/tcp filtered jtag-server
- 1494/tcp filtered citrix-ica
- 1521/tcp filtered oracle
- 2021/tcp filtered servexec
- 2107/tcp filtered msmq-mgmt
- 3260/tcp filtered iscsi
- 3301/tcp filtered unknown
- 3367/tcp filtered satvid-datalnk
- 3689/tcp open daap Apple iTunes DAAP 11.1b37
- 5000/tcp open rtsp Apple AirTunes rtspd 210.98 (Apple TV)
- |_rtsp-methods: ANNOUNCE, SETUP, RECORD, PAUSE, FLUSH, TEARDOWN, OPTIONS, GET_PARAMETER, SET_PARAMETER, POST, GET
- 5877/tcp filtered unknown
- 5910/tcp filtered cm
- 7000/tcp open http Apple AirPlay httpd
- | http-methods:
- | Supported Methods: GET OPTIONS POST PUT
- |_ Potentially risky methods: PUT
- |_http-title: Site doesn't have a title.
- 7100/tcp open http Apple AirPlay httpd
- |_http-title: Site doesn't have a title.
- 9503/tcp filtered unknown
- 9878/tcp filtered kca-service
- 49999/tcp filtered unknown
- 50003/tcp filtered unknown
- 62078/tcp open tcpwrapped
- MAC Address: B8:78:2E:10:96:5A (Apple)
- OS details: Apple Mac OS X 10.7.0 (Lion) - 10.11 (El Capitan) or iOS 4.1 - 9 (Darwin 10.0.0 - 15.0.0)
- Uptime guess: 18.308 days (since Wed Nov 23 13:10:32 2016)
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=262 (Good luck!)
- IP ID Sequence Generation: Randomized
- Service Info: OSs: OS X, Mac OS X; Device: media device; CPE: cpe:/o:apple:mac_os_x
- TRACEROUTE
- HOP RTT ADDRESS
- 1 36.32 ms 192.168.0.19
- Initiating Ping Scan at 20:33
- Scanning 4096 hosts [4 ports/host]
- Ping Scan Timing: About 1.84% done; ETC: 21:01 (0:27:36 remaining)
- Ping Scan Timing: About 5.13% done; ETC: 21:01 (0:26:11 remaining)
- Ping Scan Timing: About 10.05% done; ETC: 21:01 (0:24:46 remaining)
- Ping Scan Timing: About 15.14% done; ETC: 21:01 (0:23:21 remaining)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement