SHARE
TWEET

Untitled

a guest Sep 15th, 2019 77 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. oot@kali:~# nmap --script nmap-vulners,vulscan -sV 192.168.46.130
  2. Starting Nmap 7.70 ( https://nmap.org ) at 2019-09-14 07:42 EDT
  3. Nmap scan report for 192.168.46.130
  4. Host is up (0.00047s latency).
  5. Not shown: 995 filtered ports
  6. PORT      STATE SERVICE      VERSION
  7. 135/tcp   open  msrpc        Microsoft Windows RPC
  8. | vulscan: VulDB - https://vuldb.com:
  9. | No findings
  10. |
  11. | MITRE CVE - https://cve.mitre.org:
  12. | No findings
  13. |
  14. | SecurityFocus - https://www.securityfocus.com/bid/:
  15. | No findings
  16. |
  17. | IBM X-Force - https://exchange.xforce.ibmcloud.com:
  18. | No findings
  19. |
  20. | Exploit-DB - https://www.exploit-db.com:
  21. | No findings
  22. |
  23. | OpenVAS (Nessus) - http://www.openvas.org:
  24. | No findings
  25. |
  26. | SecurityTracker - https://www.securitytracker.com:
  27. | No findings
  28. |
  29. | OSVDB - http://www.osvdb.org:
  30. | No findings
  31. |_
  32. 139/tcp   open  netbios-ssn  Microsoft Windows netbios-ssn
  33. | vulscan: VulDB - https://vuldb.com:
  34. | No findings
  35. |
  36. | MITRE CVE - https://cve.mitre.org:
  37. | No findings
  38. |
  39. | SecurityFocus - https://www.securityfocus.com/bid/:
  40. | No findings
  41. |
  42. | IBM X-Force - https://exchange.xforce.ibmcloud.com:
  43. | No findings
  44. |
  45. | Exploit-DB - https://www.exploit-db.com:
  46. | No findings
  47. |
  48. | OpenVAS (Nessus) - http://www.openvas.org:
  49. | No findings
  50. |
  51. | SecurityTracker - https://www.securitytracker.com:
  52. | No findings
  53. |
  54. | OSVDB - http://www.osvdb.org:
  55. | No findings
  56. |_
  57. 445/tcp   open  microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
  58. | vulscan: VulDB - https://vuldb.com:
  59. | No findings
  60. |
  61. | MITRE CVE - https://cve.mitre.org:
  62. | No findings
  63. |
  64. | SecurityFocus - https://www.securityfocus.com/bid/:
  65. | No findings
  66. |
  67. | IBM X-Force - https://exchange.xforce.ibmcloud.com:
  68. | No findings
  69. |
  70. | Exploit-DB - https://www.exploit-db.com:
  71. | No findings
  72. |
  73. | OpenVAS (Nessus) - http://www.openvas.org:
  74. | No findings
  75. |
  76. | SecurityTracker - https://www.securitytracker.com:
  77. | No findings
  78. |
  79. | OSVDB - http://www.osvdb.org:
  80. | No findings
  81. |_
  82. 49154/tcp open  msrpc        Microsoft Windows RPC
  83. | vulscan: VulDB - https://vuldb.com:
  84. | No findings
  85. |
  86. | MITRE CVE - https://cve.mitre.org:
  87. | No findings
  88. |
  89. | SecurityFocus - https://www.securityfocus.com/bid/:
  90. | No findings
  91. |
  92. | IBM X-Force - https://exchange.xforce.ibmcloud.com:
  93. | No findings
  94. |
  95. | Exploit-DB - https://www.exploit-db.com:
  96. | No findings
  97. |
  98. | OpenVAS (Nessus) - http://www.openvas.org:
  99. | No findings
  100. |
  101. | SecurityTracker - https://www.securitytracker.com:
  102. | No findings
  103. |
  104. | OSVDB - http://www.osvdb.org:
  105. | No findings
  106. |_
  107. 49155/tcp open  msrpc        Microsoft Windows RPC
  108. | vulscan: VulDB - https://vuldb.com:
  109. | No findings
  110. |
  111. | MITRE CVE - https://cve.mitre.org:
  112. | No findings
  113. |
  114. | SecurityFocus - https://www.securityfocus.com/bid/:
  115. | No findings
  116. |
  117. | IBM X-Force - https://exchange.xforce.ibmcloud.com:
  118. | No findings
  119. |
  120. | Exploit-DB - https://www.exploit-db.com:
  121. | No findings
  122. |
  123. | OpenVAS (Nessus) - http://www.openvas.org:
  124. | No findings
  125. |
  126. | SecurityTracker - https://www.securitytracker.com:
  127. | No findings
  128. |
  129. | OSVDB - http://www.osvdb.org:
  130. | No findings
  131. |_
  132. MAC Address: 00:0C:29:C5:FC:3B (VMware)
  133. Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows
  134.  
  135. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  136. Nmap done: 1 IP address (1 host up) scanned in 58.59 seconds
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Not a member of Pastebin yet?
Sign Up, it unlocks many cool features!
 
Top