Advertisement
Guest User

Untitled

a guest
Sep 15th, 2019
94
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.36 KB | None | 0 0
  1. oot@kali:~# nmap --script nmap-vulners,vulscan -sV 192.168.46.130
  2. Starting Nmap 7.70 ( https://nmap.org ) at 2019-09-14 07:42 EDT
  3. Nmap scan report for 192.168.46.130
  4. Host is up (0.00047s latency).
  5. Not shown: 995 filtered ports
  6. PORT STATE SERVICE VERSION
  7. 135/tcp open msrpc Microsoft Windows RPC
  8. | vulscan: VulDB - https://vuldb.com:
  9. | No findings
  10. |
  11. | MITRE CVE - https://cve.mitre.org:
  12. | No findings
  13. |
  14. | SecurityFocus - https://www.securityfocus.com/bid/:
  15. | No findings
  16. |
  17. | IBM X-Force - https://exchange.xforce.ibmcloud.com:
  18. | No findings
  19. |
  20. | Exploit-DB - https://www.exploit-db.com:
  21. | No findings
  22. |
  23. | OpenVAS (Nessus) - http://www.openvas.org:
  24. | No findings
  25. |
  26. | SecurityTracker - https://www.securitytracker.com:
  27. | No findings
  28. |
  29. | OSVDB - http://www.osvdb.org:
  30. | No findings
  31. |_
  32. 139/tcp open netbios-ssn Microsoft Windows netbios-ssn
  33. | vulscan: VulDB - https://vuldb.com:
  34. | No findings
  35. |
  36. | MITRE CVE - https://cve.mitre.org:
  37. | No findings
  38. |
  39. | SecurityFocus - https://www.securityfocus.com/bid/:
  40. | No findings
  41. |
  42. | IBM X-Force - https://exchange.xforce.ibmcloud.com:
  43. | No findings
  44. |
  45. | Exploit-DB - https://www.exploit-db.com:
  46. | No findings
  47. |
  48. | OpenVAS (Nessus) - http://www.openvas.org:
  49. | No findings
  50. |
  51. | SecurityTracker - https://www.securitytracker.com:
  52. | No findings
  53. |
  54. | OSVDB - http://www.osvdb.org:
  55. | No findings
  56. |_
  57. 445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
  58. | vulscan: VulDB - https://vuldb.com:
  59. | No findings
  60. |
  61. | MITRE CVE - https://cve.mitre.org:
  62. | No findings
  63. |
  64. | SecurityFocus - https://www.securityfocus.com/bid/:
  65. | No findings
  66. |
  67. | IBM X-Force - https://exchange.xforce.ibmcloud.com:
  68. | No findings
  69. |
  70. | Exploit-DB - https://www.exploit-db.com:
  71. | No findings
  72. |
  73. | OpenVAS (Nessus) - http://www.openvas.org:
  74. | No findings
  75. |
  76. | SecurityTracker - https://www.securitytracker.com:
  77. | No findings
  78. |
  79. | OSVDB - http://www.osvdb.org:
  80. | No findings
  81. |_
  82. 49154/tcp open msrpc Microsoft Windows RPC
  83. | vulscan: VulDB - https://vuldb.com:
  84. | No findings
  85. |
  86. | MITRE CVE - https://cve.mitre.org:
  87. | No findings
  88. |
  89. | SecurityFocus - https://www.securityfocus.com/bid/:
  90. | No findings
  91. |
  92. | IBM X-Force - https://exchange.xforce.ibmcloud.com:
  93. | No findings
  94. |
  95. | Exploit-DB - https://www.exploit-db.com:
  96. | No findings
  97. |
  98. | OpenVAS (Nessus) - http://www.openvas.org:
  99. | No findings
  100. |
  101. | SecurityTracker - https://www.securitytracker.com:
  102. | No findings
  103. |
  104. | OSVDB - http://www.osvdb.org:
  105. | No findings
  106. |_
  107. 49155/tcp open msrpc Microsoft Windows RPC
  108. | vulscan: VulDB - https://vuldb.com:
  109. | No findings
  110. |
  111. | MITRE CVE - https://cve.mitre.org:
  112. | No findings
  113. |
  114. | SecurityFocus - https://www.securityfocus.com/bid/:
  115. | No findings
  116. |
  117. | IBM X-Force - https://exchange.xforce.ibmcloud.com:
  118. | No findings
  119. |
  120. | Exploit-DB - https://www.exploit-db.com:
  121. | No findings
  122. |
  123. | OpenVAS (Nessus) - http://www.openvas.org:
  124. | No findings
  125. |
  126. | SecurityTracker - https://www.securitytracker.com:
  127. | No findings
  128. |
  129. | OSVDB - http://www.osvdb.org:
  130. | No findings
  131. |_
  132. MAC Address: 00:0C:29:C5:FC:3B (VMware)
  133. Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows
  134.  
  135. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  136. Nmap done: 1 IP address (1 host up) scanned in 58.59 seconds
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement