Recon

$ nmap -p- --min-rate=1000 -Pn 192.168.151.50 -v
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-08-14 06:04 CDT
Initiating Parallel DNS resolution of 1 host. at 06:04
Completed Parallel DNS resolution of 1 host. at 06:04, 0.02s elapsed
Initiating Connect Scan at 06:04
Scanning 192.168.151.50 [65535 ports]
Discovered open port 21/tcp on 192.168.151.50
Discovered open port 22/tcp on 192.168.151.50
Discovered open port 80/tcp on 192.168.151.50
Completed Connect Scan at 06:05, 24.81s elapsed (65535 total ports)
Nmap scan report for 192.168.151.50
Host is up (0.051s latency).
Not shown: 65532 closed tcp ports (conn-refused)
PORT   STATE SERVICE
21/tcp open  ftp
22/tcp open  ssh
80/tcp open  http

Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 24.94 seconds
$ nmap -p 21,22,80 -sC -sV -T5 -Pn 192.168.151.50    
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-08-14 06:06 CDT
Nmap scan report for 192.168.151.50
Host is up (0.054s latency).

PORT   STATE SERVICE VERSION
21/tcp open  ftp     vsftpd 3.0.3
| ftp-syst: 
|   STAT: 
| FTP server status:
|      Connected to ::ffff:192.168.45.204
|      Logged in as ftp
|      TYPE: ASCII
|      No session bandwidth limit
|      Session timeout in seconds is 300
|      Control connection is plain text
|      Data connections will be plain text
|      At session startup, client count was 4
|      vsFTPd 3.0.3 - secure, fast, stable
|_End of status
|_ftp-anon: Anonymous FTP login allowed (FTP code 230)
22/tcp open  ssh     OpenSSH 7.2p2 Ubuntu 4ubuntu2.1 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 08:ee:e3:ff:31:20:87:6c:12:e7:1c:aa:c4:e7:54:f2 (RSA)
|   256 ad:e1:1c:7d:e7:86:76:be:9a:a8:bd:b9:68:92:77:87 (ECDSA)
|_  256 0c:e1:eb:06:0c:5c:b5:cc:1b:d1:fa:56:06:22:31:67 (ED25519)
80/tcp open  http    Apache httpd 2.4.18 ((Ubuntu))
|_http-server-header: Apache/2.4.18 (Ubuntu)
| http-robots.txt: 1 disallowed entry 
|_Hackers
|_http-title: Site doesn't have a title (text/html).
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.78 seconds

Last updated