-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathrustscan.oG
10 lines (10 loc) · 2.8 KB
/
rustscan.oG
1
2
3
4
5
6
7
8
9
10
# Nmap 7.92 scan initiated Sat Mar 26 16:59:47 2022 as: nmap -vvv -p 21,22,23,25,53,80,111,139,512,513,514,1099,2049,2121,445,1524,3306,3632,5432,6000,6697,5900,6667,8009,8180,8787,37245,37819,53333,57589 -A --append-output -oG ./rustscan.oG 192.168.0.100
# Ports scanned: TCP(30;21-23,25,53,80,111,139,445,512-514,1099,1524,2049,2121,3306,3632,5432,5900,6000,6667,6697,8009,8180,8787,37245,37819,53333,57589) UDP(0;) SCTP(0;) PROTOCOLS(0;)
Host: 192.168.0.100 () Status: Up
Host: 192.168.0.100 () Ports: 21/open/tcp//ftp//vsftpd 2.3.4/, 22/open/tcp//ssh//OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0)/, 23/open/tcp//telnet?///, 25/open/tcp//smtp?///, 53/open/tcp//domain//ISC BIND 9.4.2/, 80/open/tcp//http//Apache httpd 2.2.8 ((Ubuntu) DAV|2)/, 111/open/tcp//rpcbind//2 (RPC #100000)/, 139/open/tcp//netbios-ssn//Samba smbd 3.X - 4.X (workgroup: WORKGROUP)/, 445/open/tcp//netbios-ssn//Samba smbd 3.0.20-Debian (workgroup: WORKGROUP)/, 512/open/tcp//exec?///, 513/open/tcp//login?///, 514/open/tcp//shell?///, 1099/open/tcp//java-rmi//GNU Classpath grmiregistry/, 1524/open/tcp//bindshell//Metasploitable root shell/, 2049/open/tcp//nfs//2-4 (RPC #100003)/, 2121/open/tcp//ccproxy-ftp?///, 3306/open/tcp//mysql?///, 3632/open/tcp//distccd//distccd v1 ((GNU) 4.2.4 (Ubuntu 4.2.4-1ubuntu4))/, 5432/open/tcp//postgresql//PostgreSQL DB 8.3.0 - 8.3.7/, 5900/open/tcp//vnc//VNC (protocol 3.3)/, 6000/open/tcp//X11//(access denied)/, 6667/open/tcp//irc//UnrealIRCd/, 6697/open/tcp//irc//UnrealIRCd/, 8009/open/tcp//ajp13//Apache Jserv (Protocol v1.3)/, 8180/open/tcp//http//Apache Tomcat|Coyote JSP engine 1.1/, 8787/open/tcp//drb//Ruby DRb RMI (Ruby 1.8; path |usr|lib|ruby|1.8|drb)/, 37245/open/tcp//nlockmgr//1-4 (RPC #100021)/, 37819/open/tcp//mountd//1-3 (RPC #100005)/, 53333/open/tcp//java-rmi//GNU Classpath grmiregistry/, 57589/open/tcp//status//1 (RPC #100024)/ OS: Linux 2.6.9 - 2.6.33 Seq Index: 203 IP ID Seq: All zeros
# Nmap done at Sat Mar 26 17:04:52 2022 -- 1 IP address (1 host up) scanned in 305.93 seconds
# Nmap 7.92 scan initiated Sat Mar 26 17:04:53 2022 as: nmap -vvv -p 22,80,111,139,443,32768 -A --append-output -oG ./rustscan.oG 192.168.0.121
# Ports scanned: TCP(6;22,80,111,139,443,32768) UDP(0;) SCTP(0;) PROTOCOLS(0;)
Host: 192.168.0.121 () Status: Up
Host: 192.168.0.121 () Ports: 22/open/tcp//ssh//OpenSSH 2.9p2 (protocol 1.99)/, 80/open/tcp//http//Apache httpd 1.3.20 ((Unix) (Red-Hat|Linux) mod_ssl|2.8.4 OpenSSL|0.9.6b)/, 111/open/tcp//rpcbind//2 (RPC #100000)/, 139/open/tcp//netbios-ssn//Samba smbd (workgroup: MYGROUP)/, 443/open/tcp//ssl|https//Apache|1.3.20 (Unix) (Red-Hat|Linux) mod_ssl|2.8.4 OpenSSL|0.9.6b/, 32768/open/tcp//status//1 (RPC #100024)/ OS: Linux 2.4.9 - 2.4.18 (likely embedded) Seq Index: 192 IP ID Seq: All zeros
# Nmap done at Sat Mar 26 17:05:12 2022 -- 1 IP address (1 host up) scanned in 19.87 seconds