Advertisement
Guest User

Untitled

a guest
Dec 11th, 2016
669
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 32.67 KB | None | 0 0
  1.  
  2.  
  3. Starting Nmap 7.31 ( https://nmap.org ) at 2016-12-11 20:29 Eastern Standard Time
  4.  
  5. NSE: Loaded 142 scripts for scanning.
  6.  
  7. NSE: Script Pre-scanning.
  8.  
  9. Initiating NSE at 20:29
  10.  
  11. Completed NSE at 20:29, 0.03s elapsed
  12.  
  13. Initiating NSE at 20:29
  14.  
  15. Completed NSE at 20:29, 0.00s elapsed
  16.  
  17. Initiating ARP Ping Scan at 20:29
  18.  
  19. Scanning 255 hosts [1 port/host]
  20.  
  21. Completed ARP Ping Scan at 20:29, 4.39s elapsed (255 total hosts)
  22.  
  23. Initiating Parallel DNS resolution of 255 hosts. at 20:29
  24.  
  25. Completed Parallel DNS resolution of 255 hosts. at 20:29, 0.06s elapsed
  26.  
  27. Nmap scan report for 192.168.0.0 [host down]
  28.  
  29. Nmap scan report for 192.168.0.3 [host down]
  30.  
  31. Nmap scan report for 192.168.0.4 [host down]
  32.  
  33. Nmap scan report for 192.168.0.5 [host down]
  34.  
  35. Nmap scan report for 192.168.0.6 [host down]
  36.  
  37. Nmap scan report for 192.168.0.7 [host down]
  38.  
  39. Nmap scan report for 192.168.0.8 [host down]
  40.  
  41. Nmap scan report for 192.168.0.9 [host down]
  42.  
  43. Nmap scan report for 192.168.0.12 [host down]
  44.  
  45. Nmap scan report for 192.168.0.14 [host down]
  46.  
  47. Nmap scan report for 192.168.0.16 [host down]
  48.  
  49. Nmap scan report for 192.168.0.18 [host down]
  50.  
  51. Nmap scan report for 192.168.0.20 [host down]
  52.  
  53. Nmap scan report for 192.168.0.21 [host down]
  54.  
  55. Nmap scan report for 192.168.0.22 [host down]
  56.  
  57. Nmap scan report for 192.168.0.23 [host down]
  58.  
  59. Nmap scan report for 192.168.0.24 [host down]
  60.  
  61. Nmap scan report for 192.168.0.25 [host down]
  62.  
  63. Nmap scan report for 192.168.0.26 [host down]
  64.  
  65. Nmap scan report for 192.168.0.27 [host down]
  66.  
  67. Nmap scan report for 192.168.0.28 [host down]
  68.  
  69. Nmap scan report for 192.168.0.29 [host down]
  70.  
  71. Nmap scan report for 192.168.0.30 [host down]
  72.  
  73. Nmap scan report for 192.168.0.31 [host down]
  74.  
  75. Nmap scan report for 192.168.0.32 [host down]
  76.  
  77. Nmap scan report for 192.168.0.33 [host down]
  78.  
  79. Nmap scan report for 192.168.0.34 [host down]
  80.  
  81. Nmap scan report for 192.168.0.35 [host down]
  82.  
  83. Nmap scan report for 192.168.0.36 [host down]
  84.  
  85. Nmap scan report for 192.168.0.37 [host down]
  86.  
  87. Nmap scan report for 192.168.0.38 [host down]
  88.  
  89. Nmap scan report for 192.168.0.39 [host down]
  90.  
  91. Nmap scan report for 192.168.0.40 [host down]
  92.  
  93. Nmap scan report for 192.168.0.41 [host down]
  94.  
  95. Nmap scan report for 192.168.0.42 [host down]
  96.  
  97. Nmap scan report for 192.168.0.43 [host down]
  98.  
  99. Nmap scan report for 192.168.0.44 [host down]
  100.  
  101. Nmap scan report for 192.168.0.45 [host down]
  102.  
  103. Nmap scan report for 192.168.0.46 [host down]
  104.  
  105. Nmap scan report for 192.168.0.47 [host down]
  106.  
  107. Nmap scan report for 192.168.0.48 [host down]
  108.  
  109. Nmap scan report for 192.168.0.49 [host down]
  110.  
  111. Nmap scan report for 192.168.0.50 [host down]
  112.  
  113. Nmap scan report for 192.168.0.51 [host down]
  114.  
  115. Nmap scan report for 192.168.0.52 [host down]
  116.  
  117. Nmap scan report for 192.168.0.53 [host down]
  118.  
  119. Nmap scan report for 192.168.0.54 [host down]
  120.  
  121. Nmap scan report for 192.168.0.55 [host down]
  122.  
  123. Nmap scan report for 192.168.0.56 [host down]
  124.  
  125. Nmap scan report for 192.168.0.57 [host down]
  126.  
  127. Nmap scan report for 192.168.0.58 [host down]
  128.  
  129. Nmap scan report for 192.168.0.59 [host down]
  130.  
  131. Nmap scan report for 192.168.0.60 [host down]
  132.  
  133. Nmap scan report for 192.168.0.61 [host down]
  134.  
  135. Nmap scan report for 192.168.0.62 [host down]
  136.  
  137. Nmap scan report for 192.168.0.63 [host down]
  138.  
  139. Nmap scan report for 192.168.0.64 [host down]
  140.  
  141. Nmap scan report for 192.168.0.65 [host down]
  142.  
  143. Nmap scan report for 192.168.0.66 [host down]
  144.  
  145. Nmap scan report for 192.168.0.67 [host down]
  146.  
  147. Nmap scan report for 192.168.0.68 [host down]
  148.  
  149. Nmap scan report for 192.168.0.69 [host down]
  150.  
  151. Nmap scan report for 192.168.0.70 [host down]
  152.  
  153. Nmap scan report for 192.168.0.71 [host down]
  154.  
  155. Nmap scan report for 192.168.0.72 [host down]
  156.  
  157. Nmap scan report for 192.168.0.73 [host down]
  158.  
  159. Nmap scan report for 192.168.0.74 [host down]
  160.  
  161. Nmap scan report for 192.168.0.75 [host down]
  162.  
  163. Nmap scan report for 192.168.0.76 [host down]
  164.  
  165. Nmap scan report for 192.168.0.77 [host down]
  166.  
  167. Nmap scan report for 192.168.0.78 [host down]
  168.  
  169. Nmap scan report for 192.168.0.79 [host down]
  170.  
  171. Nmap scan report for 192.168.0.80 [host down]
  172.  
  173. Nmap scan report for 192.168.0.81 [host down]
  174.  
  175. Nmap scan report for 192.168.0.82 [host down]
  176.  
  177. Nmap scan report for 192.168.0.83 [host down]
  178.  
  179. Nmap scan report for 192.168.0.84 [host down]
  180.  
  181. Nmap scan report for 192.168.0.85 [host down]
  182.  
  183. Nmap scan report for 192.168.0.86 [host down]
  184.  
  185. Nmap scan report for 192.168.0.87 [host down]
  186.  
  187. Nmap scan report for 192.168.0.88 [host down]
  188.  
  189. Nmap scan report for 192.168.0.89 [host down]
  190.  
  191. Nmap scan report for 192.168.0.90 [host down]
  192.  
  193. Nmap scan report for 192.168.0.91 [host down]
  194.  
  195. Nmap scan report for 192.168.0.92 [host down]
  196.  
  197. Nmap scan report for 192.168.0.93 [host down]
  198.  
  199. Nmap scan report for 192.168.0.94 [host down]
  200.  
  201. Nmap scan report for 192.168.0.95 [host down]
  202.  
  203. Nmap scan report for 192.168.0.96 [host down]
  204.  
  205. Nmap scan report for 192.168.0.97 [host down]
  206.  
  207. Nmap scan report for 192.168.0.98 [host down]
  208.  
  209. Nmap scan report for 192.168.0.99 [host down]
  210.  
  211. Nmap scan report for 192.168.0.100 [host down]
  212.  
  213. Nmap scan report for 192.168.0.101 [host down]
  214.  
  215. Nmap scan report for 192.168.0.102 [host down]
  216.  
  217. Nmap scan report for 192.168.0.103 [host down]
  218.  
  219. Nmap scan report for 192.168.0.104 [host down]
  220.  
  221. Nmap scan report for 192.168.0.105 [host down]
  222.  
  223. Nmap scan report for 192.168.0.106 [host down]
  224.  
  225. Nmap scan report for 192.168.0.107 [host down]
  226.  
  227. Nmap scan report for 192.168.0.108 [host down]
  228.  
  229. Nmap scan report for 192.168.0.109 [host down]
  230.  
  231. Nmap scan report for 192.168.0.110 [host down]
  232.  
  233. Nmap scan report for 192.168.0.111 [host down]
  234.  
  235. Nmap scan report for 192.168.0.112 [host down]
  236.  
  237. Nmap scan report for 192.168.0.113 [host down]
  238.  
  239. Nmap scan report for 192.168.0.114 [host down]
  240.  
  241. Nmap scan report for 192.168.0.115 [host down]
  242.  
  243. Nmap scan report for 192.168.0.116 [host down]
  244.  
  245. Nmap scan report for 192.168.0.117 [host down]
  246.  
  247. Nmap scan report for 192.168.0.118 [host down]
  248.  
  249. Nmap scan report for 192.168.0.119 [host down]
  250.  
  251. Nmap scan report for 192.168.0.120 [host down]
  252.  
  253. Nmap scan report for 192.168.0.121 [host down]
  254.  
  255. Nmap scan report for 192.168.0.122 [host down]
  256.  
  257. Nmap scan report for 192.168.0.123 [host down]
  258.  
  259. Nmap scan report for 192.168.0.124 [host down]
  260.  
  261. Nmap scan report for 192.168.0.125 [host down]
  262.  
  263. Nmap scan report for 192.168.0.126 [host down]
  264.  
  265. Nmap scan report for 192.168.0.127 [host down]
  266.  
  267. Nmap scan report for 192.168.0.128 [host down]
  268.  
  269. Nmap scan report for 192.168.0.129 [host down]
  270.  
  271. Nmap scan report for 192.168.0.130 [host down]
  272.  
  273. Nmap scan report for 192.168.0.131 [host down]
  274.  
  275. Nmap scan report for 192.168.0.132 [host down]
  276.  
  277. Nmap scan report for 192.168.0.133 [host down]
  278.  
  279. Nmap scan report for 192.168.0.134 [host down]
  280.  
  281. Nmap scan report for 192.168.0.135 [host down]
  282.  
  283. Nmap scan report for 192.168.0.136 [host down]
  284.  
  285. Nmap scan report for 192.168.0.137 [host down]
  286.  
  287. Nmap scan report for 192.168.0.138 [host down]
  288.  
  289. Nmap scan report for 192.168.0.139 [host down]
  290.  
  291. Nmap scan report for 192.168.0.140 [host down]
  292.  
  293. Nmap scan report for 192.168.0.141 [host down]
  294.  
  295. Nmap scan report for 192.168.0.142 [host down]
  296.  
  297. Nmap scan report for 192.168.0.143 [host down]
  298.  
  299. Nmap scan report for 192.168.0.144 [host down]
  300.  
  301. Nmap scan report for 192.168.0.145 [host down]
  302.  
  303. Nmap scan report for 192.168.0.146 [host down]
  304.  
  305. Nmap scan report for 192.168.0.147 [host down]
  306.  
  307. Nmap scan report for 192.168.0.148 [host down]
  308.  
  309. Nmap scan report for 192.168.0.149 [host down]
  310.  
  311. Nmap scan report for 192.168.0.150 [host down]
  312.  
  313. Nmap scan report for 192.168.0.151 [host down]
  314.  
  315. Nmap scan report for 192.168.0.152 [host down]
  316.  
  317. Nmap scan report for 192.168.0.153 [host down]
  318.  
  319. Nmap scan report for 192.168.0.154 [host down]
  320.  
  321. Nmap scan report for 192.168.0.155 [host down]
  322.  
  323. Nmap scan report for 192.168.0.156 [host down]
  324.  
  325. Nmap scan report for 192.168.0.157 [host down]
  326.  
  327. Nmap scan report for 192.168.0.158 [host down]
  328.  
  329. Nmap scan report for 192.168.0.159 [host down]
  330.  
  331. Nmap scan report for 192.168.0.160 [host down]
  332.  
  333. Nmap scan report for 192.168.0.161 [host down]
  334.  
  335. Nmap scan report for 192.168.0.162 [host down]
  336.  
  337. Nmap scan report for 192.168.0.163 [host down]
  338.  
  339. Nmap scan report for 192.168.0.164 [host down]
  340.  
  341. Nmap scan report for 192.168.0.165 [host down]
  342.  
  343. Nmap scan report for 192.168.0.166 [host down]
  344.  
  345. Nmap scan report for 192.168.0.167 [host down]
  346.  
  347. Nmap scan report for 192.168.0.168 [host down]
  348.  
  349. Nmap scan report for 192.168.0.169 [host down]
  350.  
  351. Nmap scan report for 192.168.0.170 [host down]
  352.  
  353. Nmap scan report for 192.168.0.171 [host down]
  354.  
  355. Nmap scan report for 192.168.0.172 [host down]
  356.  
  357. Nmap scan report for 192.168.0.173 [host down]
  358.  
  359. Nmap scan report for 192.168.0.174 [host down]
  360.  
  361. Nmap scan report for 192.168.0.175 [host down]
  362.  
  363. Nmap scan report for 192.168.0.176 [host down]
  364.  
  365. Nmap scan report for 192.168.0.177 [host down]
  366.  
  367. Nmap scan report for 192.168.0.178 [host down]
  368.  
  369. Nmap scan report for 192.168.0.179 [host down]
  370.  
  371. Nmap scan report for 192.168.0.180 [host down]
  372.  
  373. Nmap scan report for 192.168.0.181 [host down]
  374.  
  375. Nmap scan report for 192.168.0.182 [host down]
  376.  
  377. Nmap scan report for 192.168.0.183 [host down]
  378.  
  379. Nmap scan report for 192.168.0.184 [host down]
  380.  
  381. Nmap scan report for 192.168.0.185 [host down]
  382.  
  383. Nmap scan report for 192.168.0.186 [host down]
  384.  
  385. Nmap scan report for 192.168.0.187 [host down]
  386.  
  387. Nmap scan report for 192.168.0.188 [host down]
  388.  
  389. Nmap scan report for 192.168.0.189 [host down]
  390.  
  391. Nmap scan report for 192.168.0.190 [host down]
  392.  
  393. Nmap scan report for 192.168.0.191 [host down]
  394.  
  395. Nmap scan report for 192.168.0.192 [host down]
  396.  
  397. Nmap scan report for 192.168.0.193 [host down]
  398.  
  399. Nmap scan report for 192.168.0.194 [host down]
  400.  
  401. Nmap scan report for 192.168.0.195 [host down]
  402.  
  403. Nmap scan report for 192.168.0.196 [host down]
  404.  
  405. Nmap scan report for 192.168.0.197 [host down]
  406.  
  407. Nmap scan report for 192.168.0.198 [host down]
  408.  
  409. Nmap scan report for 192.168.0.199 [host down]
  410.  
  411. Nmap scan report for 192.168.0.200 [host down]
  412.  
  413. Nmap scan report for 192.168.0.201 [host down]
  414.  
  415. Nmap scan report for 192.168.0.202 [host down]
  416.  
  417. Nmap scan report for 192.168.0.203 [host down]
  418.  
  419. Nmap scan report for 192.168.0.204 [host down]
  420.  
  421. Nmap scan report for 192.168.0.205 [host down]
  422.  
  423. Nmap scan report for 192.168.0.206 [host down]
  424.  
  425. Nmap scan report for 192.168.0.207 [host down]
  426.  
  427. Nmap scan report for 192.168.0.208 [host down]
  428.  
  429. Nmap scan report for 192.168.0.209 [host down]
  430.  
  431. Nmap scan report for 192.168.0.210 [host down]
  432.  
  433. Nmap scan report for 192.168.0.211 [host down]
  434.  
  435. Nmap scan report for 192.168.0.212 [host down]
  436.  
  437. Nmap scan report for 192.168.0.213 [host down]
  438.  
  439. Nmap scan report for 192.168.0.214 [host down]
  440.  
  441. Nmap scan report for 192.168.0.215 [host down]
  442.  
  443. Nmap scan report for 192.168.0.216 [host down]
  444.  
  445. Nmap scan report for 192.168.0.217 [host down]
  446.  
  447. Nmap scan report for 192.168.0.218 [host down]
  448.  
  449. Nmap scan report for 192.168.0.219 [host down]
  450.  
  451. Nmap scan report for 192.168.0.220 [host down]
  452.  
  453. Nmap scan report for 192.168.0.221 [host down]
  454.  
  455. Nmap scan report for 192.168.0.222 [host down]
  456.  
  457. Nmap scan report for 192.168.0.223 [host down]
  458.  
  459. Nmap scan report for 192.168.0.224 [host down]
  460.  
  461. Nmap scan report for 192.168.0.225 [host down]
  462.  
  463. Nmap scan report for 192.168.0.226 [host down]
  464.  
  465. Nmap scan report for 192.168.0.227 [host down]
  466.  
  467. Nmap scan report for 192.168.0.228 [host down]
  468.  
  469. Nmap scan report for 192.168.0.229 [host down]
  470.  
  471. Nmap scan report for 192.168.0.230 [host down]
  472.  
  473. Nmap scan report for 192.168.0.231 [host down]
  474.  
  475. Nmap scan report for 192.168.0.232 [host down]
  476.  
  477. Nmap scan report for 192.168.0.233 [host down]
  478.  
  479. Nmap scan report for 192.168.0.234 [host down]
  480.  
  481. Nmap scan report for 192.168.0.235 [host down]
  482.  
  483. Nmap scan report for 192.168.0.236 [host down]
  484.  
  485. Nmap scan report for 192.168.0.237 [host down]
  486.  
  487. Nmap scan report for 192.168.0.238 [host down]
  488.  
  489. Nmap scan report for 192.168.0.239 [host down]
  490.  
  491. Nmap scan report for 192.168.0.240 [host down]
  492.  
  493. Nmap scan report for 192.168.0.241 [host down]
  494.  
  495. Nmap scan report for 192.168.0.242 [host down]
  496.  
  497. Nmap scan report for 192.168.0.243 [host down]
  498.  
  499. Nmap scan report for 192.168.0.244 [host down]
  500.  
  501. Nmap scan report for 192.168.0.245 [host down]
  502.  
  503. Nmap scan report for 192.168.0.246 [host down]
  504.  
  505. Nmap scan report for 192.168.0.247 [host down]
  506.  
  507. Nmap scan report for 192.168.0.248 [host down]
  508.  
  509. Nmap scan report for 192.168.0.249 [host down]
  510.  
  511. Nmap scan report for 192.168.0.250 [host down]
  512.  
  513. Nmap scan report for 192.168.0.251 [host down]
  514.  
  515. Nmap scan report for 192.168.0.252 [host down]
  516.  
  517. Nmap scan report for 192.168.0.253 [host down]
  518.  
  519. Nmap scan report for 192.168.0.254 [host down]
  520.  
  521. Nmap scan report for 192.168.0.255 [host down]
  522.  
  523. Initiating Parallel DNS resolution of 1 host. at 20:29
  524.  
  525. Completed Parallel DNS resolution of 1 host. at 20:29, 0.03s elapsed
  526.  
  527. Initiating SYN Stealth Scan at 20:29
  528.  
  529. Scanning 7 hosts [1000 ports/host]
  530.  
  531. Discovered open port 139/tcp on 192.168.0.2
  532.  
  533. Discovered open port 53/tcp on 192.168.0.1
  534.  
  535. Discovered open port 139/tcp on 192.168.0.1
  536.  
  537. Discovered open port 445/tcp on 192.168.0.2
  538.  
  539. Discovered open port 445/tcp on 192.168.0.1
  540.  
  541. Discovered open port 139/tcp on 192.168.0.17
  542.  
  543. Discovered open port 80/tcp on 192.168.0.1
  544.  
  545. Discovered open port 445/tcp on 192.168.0.17
  546.  
  547. Discovered open port 80/tcp on 192.168.0.17
  548.  
  549. Discovered open port 443/tcp on 192.168.0.1
  550.  
  551. Discovered open port 3689/tcp on 192.168.0.19
  552.  
  553. Discovered open port 49152/tcp on 192.168.0.2
  554.  
  555. Completed SYN Stealth Scan against 192.168.0.2 in 0.45s (6 hosts left)
  556.  
  557. Discovered open port 135/tcp on 192.168.0.17
  558.  
  559. Discovered open port 443/tcp on 192.168.0.17
  560.  
  561. Increasing send delay for 192.168.0.13 from 0 to 5 due to 34 out of 84 dropped probes since last increase.
  562.  
  563. Increasing send delay for 192.168.0.15 from 0 to 5 due to 34 out of 84 dropped probes since last increase.
  564.  
  565. Increasing send delay for 192.168.0.19 from 0 to 5 due to 40 out of 99 dropped probes since last increase.
  566.  
  567. Discovered open port 5000/tcp on 192.168.0.19
  568.  
  569. Discovered open port 7100/tcp on 192.168.0.19
  570.  
  571. Discovered open port 6646/tcp on 192.168.0.17
  572.  
  573. Increasing send delay for 192.168.0.19 from 5 to 10 due to max_successful_tryno increase to 5
  574.  
  575. Increasing send delay for 192.168.0.15 from 5 to 10 due to max_successful_tryno increase to 5
  576.  
  577. Completed SYN Stealth Scan against 192.168.0.17 in 25.17s (5 hosts left)
  578.  
  579. Completed SYN Stealth Scan against 192.168.0.1 in 26.14s (4 hosts left)
  580.  
  581. Increasing send delay for 192.168.0.13 from 5 to 10 due to max_successful_tryno increase to 5
  582.  
  583. Completed SYN Stealth Scan against 192.168.0.10 in 29.04s (3 hosts left)
  584.  
  585. Warning: 192.168.0.19 giving up on port because retransmission cap hit (6).
  586.  
  587. Warning: 192.168.0.15 giving up on port because retransmission cap hit (6).
  588.  
  589. Discovered open port 7000/tcp on 192.168.0.19
  590.  
  591. Discovered open port 62078/tcp on 192.168.0.15
  592.  
  593. Discovered open port 62078/tcp on 192.168.0.19
  594.  
  595. Completed SYN Stealth Scan against 192.168.0.15 in 42.06s (2 hosts left)
  596.  
  597. Discovered open port 62078/tcp on 192.168.0.13
  598.  
  599. Warning: 192.168.0.13 giving up on port because retransmission cap hit (6).
  600.  
  601. Completed SYN Stealth Scan against 192.168.0.19 in 45.06s (1 host left)
  602.  
  603. Completed SYN Stealth Scan at 20:30, 46.21s elapsed (7000 total ports)
  604.  
  605. Initiating Service scan at 20:30
  606.  
  607. Scanning 21 services on 7 hosts
  608.  
  609. Completed Service scan at 20:32, 121.91s elapsed (21 services on 7 hosts)
  610.  
  611. Initiating OS detection (try #1) against 7 hosts
  612.  
  613. Retrying OS detection (try #2) against 3 hosts
  614.  
  615. Retrying OS detection (try #3) against hitronhub.home (192.168.0.1)
  616.  
  617. Retrying OS detection (try #4) against hitronhub.home (192.168.0.1)
  618.  
  619. Retrying OS detection (try #5) against hitronhub.home (192.168.0.1)
  620.  
  621. NSE: Script scanning 7 hosts.
  622.  
  623. Initiating NSE at 20:32
  624.  
  625. Completed NSE at 20:33, 82.28s elapsed
  626.  
  627. Initiating NSE at 20:33
  628.  
  629. Completed NSE at 20:33, 0.04s elapsed
  630.  
  631. Nmap scan report for hitronhub.home (192.168.0.1)
  632.  
  633. Host is up (0.0022s latency).
  634.  
  635. Not shown: 993 closed ports
  636.  
  637. PORT STATE SERVICE VERSION
  638.  
  639. 22/tcp filtered ssh
  640.  
  641. 23/tcp filtered telnet
  642.  
  643. 53/tcp open domain dnsmasq 2.63rc6
  644.  
  645. | dns-nsid:
  646.  
  647. |_ bind.version: dnsmasq-2.63rc6
  648.  
  649. 80/tcp open http GoAhead WebServer
  650.  
  651. |_http-favicon: Unknown favicon MD5: BCC03687212F9BDA1A9B7D70AA5B6215
  652.  
  653. | http-methods:
  654.  
  655. |_ Supported Methods: HEAD
  656.  
  657. | http-title: Site doesn't have a title (text/html).
  658.  
  659. |_Requested resource was http://hitronhub.home/login.html
  660.  
  661. 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: HIRON)
  662.  
  663. 443/tcp open ssl/http GoAhead WebServer
  664.  
  665. |_http-server-header: GoAhead-Webs
  666.  
  667. | ssl-cert: Subject: commonName=00:FC:8D:3B:4A:50/organizationName=Hitron Technologies/countryName=TW
  668.  
  669. | Issuer: commonName=CableLabs, Inc. Cable Modem Root Certificate Authority/organizationName=CableLabs, Inc./countryName=US
  670.  
  671. | Public Key type: rsa
  672.  
  673. | Public Key bits: 1024
  674.  
  675. | Signature Algorithm: sha1WithRSAEncryption
  676.  
  677. | Not valid before: 2015-05-26T00:00:00
  678.  
  679. | Not valid after: 2035-05-25T23:59:59
  680.  
  681. | MD5: 971e 7268 341a dcb7 f044 1927 71f2 5d2f
  682.  
  683. |_SHA-1: 521e aa4e b4ac 271c e046 5361 bd92 1e38 b167 0512
  684.  
  685. 445/tcp open netbios-ssn Samba smbd 3.0.37 (workgroup: HIRON)
  686.  
  687. MAC Address: 00:FC:8D:3B:4A:52 (Hitron Technologies.)
  688.  
  689. No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
  690.  
  691. TCP/IP fingerprint:
  692.  
  693. OS:SCAN(V=7.31%E=4%D=12/11%OT=53%CT=1%CU=30275%PV=Y%DS=1%DC=D%G=Y%M=00FC8D%
  694.  
  695. OS:TM=584DFE7D%P=i686-pc-windows-windows)SEQ(SP=C7%GCD=1%ISR=D1%TI=Z%CI=Z%I
  696.  
  697. OS:I=I%TS=7)SEQ(CI=Z%II=I%TS=8)SEQ(TI=Z%CI=Z%II=I%TS=8)OPS(O1=M5B4ST11NW2%O
  698.  
  699. OS:2=M5B4ST11NW2%O3=M5B4NNT11NW2%O4=M5B4ST11NW2%O5=M5B4ST11NW2%O6=M5B4ST11)
  700.  
  701. OS:WIN(W1=3890%W2=3890%W3=3890%W4=3890%W5=3890%W6=3890)ECN(R=Y%DF=Y%T=40%W=
  702.  
  703. OS:3908%O=M5B4NNSNW2%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)
  704.  
  705. OS:T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%
  706.  
  707. OS:S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(
  708.  
  709. OS:R=N)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R
  710.  
  711. OS:=Y%DFI=N%T=40%CD=S)
  712.  
  713.  
  714.  
  715. Uptime guess: 37.403 days (since Fri Nov 04 11:53:28 2016)
  716.  
  717. Network Distance: 1 hop
  718.  
  719. IP ID Sequence Generation: All zeros
  720.  
  721.  
  722.  
  723. Host script results:
  724.  
  725. |_clock-skew: mean: 1m41s, deviation: 1d-1h-1m-1s, median: 1m41s
  726.  
  727. | nbstat: NetBIOS name: INTEL_CE_LINUX, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
  728.  
  729. | Names:
  730.  
  731. | INTEL_CE_LINUX<00> Flags: <unique><active>
  732.  
  733. | INTEL_CE_LINUX<03> Flags: <unique><active>
  734.  
  735. | INTEL_CE_LINUX<20> Flags: <unique><active>
  736.  
  737. | \x01\x02__MSBROWSE__\x02<01> Flags: <group><active>
  738.  
  739. | HIRON<1d> Flags: <unique><active>
  740.  
  741. | HIRON<1e> Flags: <group><active>
  742.  
  743. |_ HIRON<00> Flags: <group><active>
  744.  
  745. | smb-os-discovery:
  746.  
  747. | OS: Unix (Samba 3.0.37)
  748.  
  749. | NetBIOS computer name:
  750.  
  751. | Workgroup: HIRON\x00
  752.  
  753. |_ System time: 2016-12-12T01:34:17+00:00
  754.  
  755. | smb-security-mode:
  756.  
  757. | account_used: guest
  758.  
  759. | authentication_level: share (dangerous)
  760.  
  761. | challenge_response: supported
  762.  
  763. |_ message_signing: disabled (dangerous, but default)
  764.  
  765. |_smbv2-enabled: Server doesn't support SMBv2 protocol
  766.  
  767.  
  768.  
  769. TRACEROUTE
  770.  
  771. HOP RTT ADDRESS
  772.  
  773. 1 2.15 ms hitronhub.home (192.168.0.1)
  774.  
  775.  
  776.  
  777. Nmap scan report for 192.168.0.2
  778.  
  779. Host is up (0.00039s latency).
  780.  
  781. Not shown: 997 closed ports
  782.  
  783. PORT STATE SERVICE VERSION
  784.  
  785. 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: HIRON)
  786.  
  787. 445/tcp open netbios-ssn Samba smbd 3.0.37 (workgroup: HIRON)
  788.  
  789. 49152/tcp open http Linksys E8350 WAP or TP-LINK router
  790.  
  791. | http-methods:
  792.  
  793. |_ Supported Methods: GET POST
  794.  
  795. |_http-title: Site doesn't have a title.
  796.  
  797. MAC Address: 00:FC:8D:3B:4A:58 (Hitron Technologies.)
  798.  
  799. Device type: general purpose
  800.  
  801. Running: Linux 2.6.X|3.X
  802.  
  803. OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
  804.  
  805. OS details: Linux 2.6.38 - 3.0
  806.  
  807. Uptime guess: 56.104 days (since Sun Oct 16 19:04:32 2016)
  808.  
  809. Network Distance: 1 hop
  810.  
  811. TCP Sequence Prediction: Difficulty=203 (Good luck!)
  812.  
  813. IP ID Sequence Generation: All zeros
  814.  
  815. Service Info: CPE: cpe:/h:linksys:e8350
  816.  
  817.  
  818.  
  819. Host script results:
  820.  
  821. |_clock-skew: mean: 1m42s, deviation: 1d-1h-1m-1s, median: 1m42s
  822.  
  823. | nbstat: NetBIOS name: INTEL_CE_LINUX, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
  824.  
  825. | Names:
  826.  
  827. | INTEL_CE_LINUX<00> Flags: <unique><active>
  828.  
  829. | INTEL_CE_LINUX<03> Flags: <unique><active>
  830.  
  831. | INTEL_CE_LINUX<20> Flags: <unique><active>
  832.  
  833. | \x01\x02__MSBROWSE__\x02<01> Flags: <group><active>
  834.  
  835. | HIRON<1d> Flags: <unique><active>
  836.  
  837. | HIRON<1e> Flags: <group><active>
  838.  
  839. |_ HIRON<00> Flags: <group><active>
  840.  
  841. | smb-os-discovery:
  842.  
  843. | OS: Unix (Samba 3.0.37)
  844.  
  845. | NetBIOS computer name:
  846.  
  847. | Workgroup: HIRON\x00
  848.  
  849. |_ System time: 2016-12-12T01:34:17+00:00
  850.  
  851. | smb-security-mode:
  852.  
  853. | account_used: guest
  854.  
  855. | authentication_level: share (dangerous)
  856.  
  857. | challenge_response: supported
  858.  
  859. |_ message_signing: disabled (dangerous, but default)
  860.  
  861. |_smbv2-enabled: Server doesn't support SMBv2 protocol
  862.  
  863.  
  864.  
  865. TRACEROUTE
  866.  
  867. HOP RTT ADDRESS
  868.  
  869. 1 0.39 ms 192.168.0.2
  870.  
  871.  
  872.  
  873. Nmap scan report for 192.168.0.10
  874.  
  875. Host is up (0.0010s latency).
  876.  
  877. All 1000 scanned ports on 192.168.0.10 are filtered
  878.  
  879. MAC Address: 38:1C:1A:B8:7A:24 (Cisco Systems)
  880.  
  881. Too many fingerprints match this host to give specific OS details
  882.  
  883. Network Distance: 1 hop
  884.  
  885.  
  886.  
  887. TRACEROUTE
  888.  
  889. HOP RTT ADDRESS
  890.  
  891. 1 1.02 ms 192.168.0.10
  892.  
  893.  
  894.  
  895. Nmap scan report for 192.168.0.13
  896.  
  897. Host is up (0.010s latency).
  898.  
  899. Not shown: 986 closed ports
  900.  
  901. PORT STATE SERVICE VERSION
  902.  
  903. 1417/tcp filtered timbuktu-srv1
  904.  
  905. 1583/tcp filtered simbaexpress
  906.  
  907. 2003/tcp filtered finger
  908.  
  909. 2034/tcp filtered scoremgr
  910.  
  911. 2800/tcp filtered acc-raid
  912.  
  913. 5190/tcp filtered aol
  914.  
  915. 5730/tcp filtered unieng
  916.  
  917. 6009/tcp filtered X11:9
  918.  
  919. 8089/tcp filtered unknown
  920.  
  921. 8292/tcp filtered blp3
  922.  
  923. 10621/tcp filtered unknown
  924.  
  925. 32779/tcp filtered sometimes-rpc21
  926.  
  927. 51103/tcp filtered unknown
  928.  
  929. 62078/tcp open tcpwrapped
  930.  
  931. MAC Address: B4:4B:D2:89:37:A9 (Unknown)
  932.  
  933. OS details: Apple Mac OS X 10.7.0 (Lion) - 10.11 (El Capitan) or iOS 4.1 - 9 (Darwin 10.0.0 - 15.0.0)
  934.  
  935. Uptime guess: 2.037 days (since Fri Dec 09 19:40:02 2016)
  936.  
  937. Network Distance: 1 hop
  938.  
  939. TCP Sequence Prediction: Difficulty=245 (Good luck!)
  940.  
  941. IP ID Sequence Generation: Randomized
  942.  
  943.  
  944.  
  945. TRACEROUTE
  946.  
  947. HOP RTT ADDRESS
  948.  
  949. 1 10.25 ms 192.168.0.13
  950.  
  951.  
  952.  
  953. Nmap scan report for 192.168.0.15
  954.  
  955. Host is up (0.025s latency).
  956.  
  957. Not shown: 965 closed ports, 34 filtered ports
  958.  
  959. PORT STATE SERVICE VERSION
  960.  
  961. 62078/tcp open tcpwrapped
  962.  
  963. MAC Address: 0C:51:01:8E:10:16 (Unknown)
  964.  
  965. OS details: Apple Mac OS X 10.7.0 (Lion) - 10.11 (El Capitan) or iOS 4.1 - 9 (Darwin 10.0.0 - 15.0.0)
  966.  
  967. Uptime guess: 6.143 days (since Mon Dec 05 17:07:47 2016)
  968.  
  969. Network Distance: 1 hop
  970.  
  971. TCP Sequence Prediction: Difficulty=257 (Good luck!)
  972.  
  973. IP ID Sequence Generation: Randomized
  974.  
  975.  
  976.  
  977. TRACEROUTE
  978.  
  979. HOP RTT ADDRESS
  980.  
  981. 1 25.50 ms 192.168.0.15
  982.  
  983.  
  984.  
  985. Nmap scan report for 192.168.0.17
  986.  
  987. Host is up (0.011s latency).
  988.  
  989. Not shown: 994 filtered ports
  990.  
  991. PORT STATE SERVICE VERSION
  992.  
  993. 80/tcp open http
  994.  
  995. | http-methods:
  996.  
  997. |_ Supported Methods: GET
  998.  
  999. |_http-title: Site doesn't have a title.
  1000.  
  1001. 135/tcp open msrpc Microsoft Windows RPC
  1002.  
  1003. 139/tcp open netbios-ssn Microsoft Windows netbios-ssn
  1004.  
  1005. 443/tcp open https
  1006.  
  1007. | http-methods:
  1008.  
  1009. |_ Supported Methods: GET
  1010.  
  1011. |_http-title: Site doesn't have a title.
  1012.  
  1013. 445/tcp open microsoft-ds Microsoft Windows 7 - 10 microsoft-ds
  1014.  
  1015. 6646/tcp open tcpwrapped
  1016.  
  1017. 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
  1018.  
  1019. ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
  1020.  
  1021. SF-Port80-TCP:V=7.31%I=7%D=12/11%Time=584DFDAD%P=i686-pc-windows-windows%r
  1022.  
  1023. SF:(GetRequest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(HTTPOption
  1024.  
  1025. SF:s,58,"\x02L\x9b\x0f\x0cK\xbf\x83\xb9\x1d\(W,G3\\\xd4Hp\x0eL\x1d3\xfeB\x
  1026.  
  1027. SF:a6_cm\x85\x1b\x7f\xbb\xf1\xc7\xe5\xa1\xff\xe3\*\x17\xc1G~\xd6\x0f\xbdJo
  1028.  
  1029. SF:X\x01\x80&\xfcg\xdd~%S\x1f\xfc\x0b\x19\x07y\xa6\]}4\x05\t2\x88\xbb\xa9\
  1030.  
  1031. SF:xadi\xcd\xc9\xe138\xb8\x118\(L\x04")%r(RTSPRequest,50,"9!\x0e\xba\xa8\x
  1032.  
  1033. SF:85-@_\xd4u\x1d\xa2\xf4v\+\x04k5\x9e\xfc\x10\?O\)`\xba\n6Y\x85\x84j\xcf<
  1034.  
  1035. SF:Ey\xa6\xa2\x8eU\x91\xeb\x034C\x07G67\xdb\x98\xae\x89\xcb\x05%\x99l8`V\x
  1036.  
  1037. SF:10\(XV\x17\xceG2\xfd\xd8\xf4\$I\+5\xf1\?\xac")%r(FourOhFourRequest,1A,"
  1038.  
  1039. SF:HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(RPCCheck,36,"C\xcd4\xf8}\"
  1040.  
  1041. SF:q3\xb8\x96\xaa\x08!\xf0\xe2\xfa\x8b\x1e\(\xfcd\x95\xba\x9e\x95\xc1F\xe1
  1042.  
  1043. SF:\"\xe6w\xeb\x04\x8e8\xf0\)\xac\x0bt\xef\[\x97C\x94\xa6\x1a\xbb\xb3\xce\
  1044.  
  1045. SF:xaf\x14\xabW")%r(DNSVersionBindReq,52,"\xcew>\|\]\x17\x1e'\xc5\x02\xc8\
  1046.  
  1047. SF:xa96H\xfb\x05\xd6\x0b\xacE\xb6\xef\xaa\x82aS1\x08\xcc&\xb1\xf3\xa1\xba\
  1048.  
  1049. SF:xe8\xe0\xb1\x9c2l\xac\x01\.8\"\xe4H\*\xf2\x81\xe7A\xa8\xb4\xf9\xe0_\xcf
  1050.  
  1051. SF:\x19l\xdb\x07A\xca\x92\x0cP\x8fr\x14\xd0A\|\x86\xb8\xf4\xee\xa5K\xcfW\x
  1052.  
  1053. SF:04")%r(DNSStatusRequest,67,"'\xaa\xb7\x89\x93\xfa/'<\x0e\xbb\xebV\x14\x
  1054.  
  1055. SF:c5}O\xe8\x94`\x18\x9a3\x0e\xfd\^@\xc9\xca\xbb\xf4a>s\xc4\]x\xf0gj1n_\x8
  1056.  
  1057. SF:3\\\x1e\x9c\xfdYLE\xb4\xb8\xb7#y\x19\xc9\\;\xc6B\xe8\x88\x89\x1e_\x0f\x
  1058.  
  1059. SF:b3\xcf\x88\"\xe8\x18\xc5k\x8c\xde\x80\+\xa8\x857\x95c\x04\x81\xef\xc2\x
  1060.  
  1061. SF:df\xcdO3\xfc\xd6\x11\x82\x84\xcd\(\x8e\(\xbd")%r(SSLSessionReq,62,"v\xe
  1062.  
  1063. SF:1\x1b=E,\xcd\xd0\xda\x1f\x82\]NP``\xb0\xb7K\x192\xe6\x87\xa3\xadoTy\x03
  1064.  
  1065. SF:\xc590Pc\x1a\xe8~\xde\xf0\.l\x7f\xdbK\xd5\xe7Qzs\xf1\xd1\xa8\xbcd\x87M\
  1066.  
  1067. SF:x9c\x05\xde\x05k\x93\xe0\xef\xb6\xeb\xa9\xeb\.\x9e\xae\x88\xe0\t5\xa9\x
  1068.  
  1069. SF:d1\x81{W,-a\]\]\xea\xd7\x12\xb12\xbf\x18\xdfy\xaa\xbf\x86&")%r(TLSSessi
  1070.  
  1071. SF:onReq,3C,"9\xd7\x1a5\)\xdf\xf1\"\x0el\xd8\^\x12\xc4\xed\xbe\xcc\xff\[\x
  1072.  
  1073. SF:b0\[\x11\xde>\x8a\x95\t\xec@@\xc1\x82Ki\]J\x1e\xb1\x0e\xb8\xe0\xd2\xe2\
  1074.  
  1075. SF:xb8\x05\x05\x18\x03o\x92\x94\x1f\x12q\xe8\xb6ep\xf8\?")%r(Kerberos,76,"
  1076.  
  1077. SF:a\xdb\xb5\xb2\xd0gR\xb5\xec\x04\xad\x04\xe2\xdfu\xe8\|\x13L\xe8\xf0SR\x
  1078.  
  1079. SF:91\xab:\x02c\xecP\xf7Jt\x08\x86\xa2\r\"\x0co\xad{\]F\xb9\x0fSm\xab\x7f\
  1080.  
  1081. SF:x07%\x82\xb2SD2~q\xf5\xe6\xa2\x92/!Z\x07\x86qG\xcd\.E\xd1\.Dgs\x98q\xb7
  1082.  
  1083. SF:\^u6\xe1\x08\xd8\xca\xf5\xfa\xdb\xba\x8f\xba\x03G0\xb0\xda\xc7WV\x90\xb
  1084.  
  1085. SF:f2\xd9\xfc\x18\xcd\xd7YI\$#\x94\xe7\xbd\x20");
  1086.  
  1087. ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
  1088.  
  1089. SF-Port443-TCP:V=7.31%I=7%D=12/11%Time=584DFDB2%P=i686-pc-windows-windows%
  1090.  
  1091. SF:r(SSLSessionReq,3C,"Na\xca\x8d{\xe0u\x7fa\x94\xafLU{u\xab\xae\x0e\x0f\n
  1092.  
  1093. SF:\x84\xa7r\xad\x14O\x0ck\xa9\x1d\x80\xe9\xc0\xc2\[\xa8\xe7''\x17\xfd\x1e
  1094.  
  1095. SF:\xab\]\xb6{\xd0\xb7\xd5\xd4\xb7E\"\x15\x89\\5\xcc\xba\x16")%r(TLSSessio
  1096.  
  1097. SF:nReq,3E,"\x87\x90\xa0\x19\x02\xb1,d\xef\x91\xbch&\xcf\x16w\x9f\x90\x04U
  1098.  
  1099. SF:x\x0e\xeeX\x97\xf8\xf5\xb4\xd6;I\x8a\x0e\x20\x04=\xe5\xb6C\x08\x02V'\xb
  1100.  
  1101. SF:d\)\x97e9\xe2\xa4\xd1'\x80\xa3\xe3\t\0\x03j\xea\x80\^")%r(SSLv23Session
  1102.  
  1103. SF:Req,5E,"m1\xef\x8b\xf4j\xd9j\xec\xd4\x96{\xc7\xcc\xa2o3,3\x03ln\xdd\xc5
  1104.  
  1105. SF:S\xc2z\xf6\xa4\xfa\xb6\xc1\x9f\x1fL\x80FTj\xfe\x90o\x15\+\+\x1eS~\xb1\x
  1106.  
  1107. SF:ffb\x91p\xb4\x8a\*\$IV\xcfO\xecKX\x1a\x92~\xd8\xec\x87\xd3>\x9f\*\x1b\x
  1108.  
  1109. SF:96\xbd\xd9#\x9d\x8f\xb8=\xb4SG\xf3\xd4\xb64\x02C\x8e\x06")%r(OpenVPN,3B
  1110.  
  1111. SF:,"\x191\?\x04\x1eY\xac\x02~}\+\xa5\xe2\xd0\\~\xe9\xfb\x85\xda\x8bU\+\x1
  1112.  
  1113. SF:4\x98\x9fF\xbc\xfa9\n;_ud\x8b\xe3{W\xaf\xf7\xa2\xdeo\xfb\x9b\?\xe1\x81b
  1114.  
  1115. SF:S\x0b\x82f\xbc\xb5\xf6\xe4\xde")%r(GetRequest,1A,"HTTP/1\.0\x20404\x20N
  1116.  
  1117. SF:ot\x20Found\r\n\r\n")%r(HTTPOptions,6E,"\xe3O\xf6\x9a\x08\?\xfa\x1c3Y\x
  1118.  
  1119. SF:e4Ht\xe8\x18\xfb\xfe\xb8\xd8\x0c\[\x85\xc8D\[\x8b\x97\xdc\xe6@vK\x1d\xc
  1120.  
  1121. SF:eG\xe6\xd6\"R\?\xf8\xd0\xa1\x12v\xf1i\x19\xfa:\x94\x80\xe0_\xca\xb6\xa3
  1122.  
  1123. SF:\xa6\x92\xca\x9a\xba\x90\xf8\x9d#`v\xdcb\xa0\xaah\xab%\x1en\xcb9\x9c\"%
  1124.  
  1125. SF:A\xad\xd2IR\^\xfa\xc1\xeb0\x1a\x93\x18<\xfb\r\xd0\xa5\xec\xea2@\x8e\[\x
  1126.  
  1127. SF:f4\x11\x14\?")%r(RTSPRequest,39,"\x95hde\xdc\xcf>\xbe3x\xc3\r\xb5-\x9ft
  1128.  
  1129. SF:\xf6<\xbbJ<8\xfa\xd8\xc7`\x14,\x86d1\xbaqQ\xa3\xbd\xa0\x8e\xb7\xf6p\x05
  1130.  
  1131. SF:6\xd8\x0f:C\xe0\xd3\x83P\.A\xe0d\x86\xe6")%r(RPCCheck,47,"E\xf9_wp\xa6\
  1132.  
  1133. SF:x08t\xa0\*\xce\x89E\x15W\xaf6t&\xb6\xb8\r\x80@\x15\x87\xb9\xc2'\xa6\xa3
  1134.  
  1135. SF:\x10\xd2\xf1u\xf2\xf7W\xb7\xc9\xd3h\x0f\x85\xa1rh\x085a\xdaT\xb74\x83\x
  1136.  
  1137. SF:a4\xb2Z\x7fZ\xda\x1f\xfb\x8c\x8e\|\nZ\\\xf1\xef")%r(DNSVersionBindReq,5
  1138.  
  1139. SF:F,">\xd3\x82\xa0S\xaa\x154\x1c~\xd6\xbd\xcbi\xd0\xa3\xd8\x86Zs,\0\x04\x
  1140.  
  1141. SF:8e\0\x18\x8f\x92\xbc\xdc\xb4\xacm\x02k\xf4\x95\x9c\xb8\xa7\xc3\x04\xb5/
  1142.  
  1143. SF:>\xad\xebn\\\^u\xc0\xb3\xf6\xc8oN\xa7\xed\x87\x99h\xb3_\xdd\xa7=-\xe0\x
  1144.  
  1145. SF:fb\xb5'\xba\x8ak\xa9fL#\xacLbOG\x10\x81\x88\xa4\xe2\xa6\xda\xd8`\xd5/")
  1146.  
  1147. SF:%r(DNSStatusRequest,6F,"\x10nHE\x8a\xa0\xba\xa1\x84n\xcdfiwtc\xde%\x18\
  1148.  
  1149. SF:xbc\x1aP\xb4\xe0tX\xfa\x88\x9e\xa9\xc8\x938\xa9\xa5\x92\?\xd5\x07d\x99d
  1150.  
  1151. SF:\xfa\xb3swz\xd0\xeb\xfe\xf8\xfd\xd2\x1c\x8f\xb9\xb2\xc6\xd2\x9c\x1bK\xf
  1152.  
  1153. SF:4>\xfc\xdc\x1a\(\r-w\x90a\xcb\x8d\x95\^\xc0\x7fJFo!\xc4\xa1\xc4\xcf\x8b
  1154.  
  1155. SF:\xb0\x9b\xc0\x18\x1c\x07\xa7\r\xb4\xde\x84\x94\xf3\xe6\xfb\x8e\xd8qd\xb
  1156.  
  1157. SF:a\x8a\xf5\xff");
  1158.  
  1159. MAC Address: DC:53:60:B1:34:0B (Intel Corporate)
  1160.  
  1161. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1162.  
  1163. Aggressive OS guesses: Microsoft Windows Phone 7.5 or 8.0 (94%), Microsoft Windows 10 build 10586 (93%), Microsoft Windows Server 2008 R2 or Windows 8.1 (93%), Microsoft Windows 7 Professional or Windows 8 (93%), Microsoft Windows Vista SP0 or SP1, Windows Server 2008 SP1, or Windows 7 (93%), Microsoft Windows Embedded Standard 7 (93%), Microsoft Windows Vista SP2, Windows 7 SP1, or Windows Server 2008 (93%), Microsoft Windows Server 2008 R2 (91%), Microsoft Windows Server 2008 SP1 (91%), Microsoft Windows 7 (91%)
  1164.  
  1165. No exact OS matches for host (test conditions non-ideal).
  1166.  
  1167. Uptime guess: 14.153 days (since Sun Nov 27 16:53:19 2016)
  1168.  
  1169. Network Distance: 1 hop
  1170.  
  1171. TCP Sequence Prediction: Difficulty=262 (Good luck!)
  1172.  
  1173. IP ID Sequence Generation: Incremental
  1174.  
  1175. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  1176.  
  1177.  
  1178.  
  1179. Host script results:
  1180.  
  1181. |_clock-skew: mean: -17s, deviation: 1d-1h-1m-1s, median: -17s
  1182.  
  1183. | nbstat: NetBIOS name: DESKTOP-FVDE69L, NetBIOS user: <unknown>, NetBIOS MAC: dc:53:60:b1:34:0b (Intel Corporate)
  1184.  
  1185. | Names:
  1186.  
  1187. | DESKTOP-FVDE69L<20> Flags: <unique><active>
  1188.  
  1189. | DESKTOP-FVDE69L<00> Flags: <unique><active>
  1190.  
  1191. |_ WORKGROUP<00> Flags: <group><active>
  1192.  
  1193. | smb-security-mode:
  1194.  
  1195. | account_used: guest
  1196.  
  1197. | authentication_level: user
  1198.  
  1199. | challenge_response: supported
  1200.  
  1201. |_ message_signing: disabled (dangerous, but default)
  1202.  
  1203. |_smbv2-enabled: Server supports SMBv2 protocol
  1204.  
  1205.  
  1206.  
  1207. TRACEROUTE
  1208.  
  1209. HOP RTT ADDRESS
  1210.  
  1211. 1 11.05 ms 192.168.0.17
  1212.  
  1213.  
  1214.  
  1215. Nmap scan report for 192.168.0.19
  1216.  
  1217. Host is up (0.036s latency).
  1218.  
  1219. Not shown: 977 closed ports
  1220.  
  1221. PORT STATE SERVICE VERSION
  1222.  
  1223. 1022/tcp filtered exp2
  1224.  
  1225. 1032/tcp filtered iad3
  1226.  
  1227. 1107/tcp filtered isoipsigport-2
  1228.  
  1229. 1236/tcp filtered bvcontrol
  1230.  
  1231. 1309/tcp filtered jtag-server
  1232.  
  1233. 1494/tcp filtered citrix-ica
  1234.  
  1235. 1521/tcp filtered oracle
  1236.  
  1237. 2021/tcp filtered servexec
  1238.  
  1239. 2107/tcp filtered msmq-mgmt
  1240.  
  1241. 3260/tcp filtered iscsi
  1242.  
  1243. 3301/tcp filtered unknown
  1244.  
  1245. 3367/tcp filtered satvid-datalnk
  1246.  
  1247. 3689/tcp open daap Apple iTunes DAAP 11.1b37
  1248.  
  1249. 5000/tcp open rtsp Apple AirTunes rtspd 210.98 (Apple TV)
  1250.  
  1251. |_rtsp-methods: ANNOUNCE, SETUP, RECORD, PAUSE, FLUSH, TEARDOWN, OPTIONS, GET_PARAMETER, SET_PARAMETER, POST, GET
  1252.  
  1253. 5877/tcp filtered unknown
  1254.  
  1255. 5910/tcp filtered cm
  1256.  
  1257. 7000/tcp open http Apple AirPlay httpd
  1258.  
  1259. | http-methods:
  1260.  
  1261. | Supported Methods: GET OPTIONS POST PUT
  1262.  
  1263. |_ Potentially risky methods: PUT
  1264.  
  1265. |_http-title: Site doesn't have a title.
  1266.  
  1267. 7100/tcp open http Apple AirPlay httpd
  1268.  
  1269. |_http-title: Site doesn't have a title.
  1270.  
  1271. 9503/tcp filtered unknown
  1272.  
  1273. 9878/tcp filtered kca-service
  1274.  
  1275. 49999/tcp filtered unknown
  1276.  
  1277. 50003/tcp filtered unknown
  1278.  
  1279. 62078/tcp open tcpwrapped
  1280.  
  1281. MAC Address: B8:78:2E:10:96:5A (Apple)
  1282.  
  1283. OS details: Apple Mac OS X 10.7.0 (Lion) - 10.11 (El Capitan) or iOS 4.1 - 9 (Darwin 10.0.0 - 15.0.0)
  1284.  
  1285. Uptime guess: 18.308 days (since Wed Nov 23 13:10:32 2016)
  1286.  
  1287. Network Distance: 1 hop
  1288.  
  1289. TCP Sequence Prediction: Difficulty=262 (Good luck!)
  1290.  
  1291. IP ID Sequence Generation: Randomized
  1292.  
  1293. Service Info: OSs: OS X, Mac OS X; Device: media device; CPE: cpe:/o:apple:mac_os_x
  1294.  
  1295.  
  1296.  
  1297. TRACEROUTE
  1298.  
  1299. HOP RTT ADDRESS
  1300.  
  1301. 1 36.32 ms 192.168.0.19
  1302.  
  1303.  
  1304.  
  1305. Initiating Ping Scan at 20:33
  1306.  
  1307. Scanning 4096 hosts [4 ports/host]
  1308.  
  1309. Ping Scan Timing: About 1.84% done; ETC: 21:01 (0:27:36 remaining)
  1310.  
  1311. Ping Scan Timing: About 5.13% done; ETC: 21:01 (0:26:11 remaining)
  1312.  
  1313. Ping Scan Timing: About 10.05% done; ETC: 21:01 (0:24:46 remaining)
  1314.  
  1315. Ping Scan Timing: About 15.14% done; ETC: 21:01 (0:23:21 remaining)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement