nmap
___
( _ ) _ __ ___ __ _ _ __
/ _ \| '_ ` _ \ / _` | '_ \
| (_) | | | | | | (_| | |_) |
\___/|_| |_| |_|\__,_| .__/
|_|
adot8 <3
[+] Scanning 192.168.160.219 [65535 TCP ports]
[+] Enumerating 192.168.160.219 [80]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-20 04:12 CDT
Nmap scan report for 192.168.160.219
Host is up (0.046s latency).
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.2.22 ((Debian))
|_http-title: driftingblues
|_http-server-header: Apache/2.2.22 (Debian)
| http-robots.txt: 1 disallowed entry
|_/textpattern/textpattern
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.28 seconds
[+] Enumerating 192.168.160.219 for vulnerabilities [80]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-20 04:13 CDT
Pre-scan script results:
| broadcast-avahi-dos:
| Discovered hosts:
| 224.0.0.251
| After NULL UDP avahi packet DoS (CVE-2011-1002).
| Hosts that seem down (vulnerable):
|_ 224.0.0.251
Nmap scan report for 192.168.160.219
Host is up (0.045s latency).
PORT STATE SERVICE
80/tcp open http
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-enum:
|_ /robots.txt: Robots file
Nmap done: 1 IP address (1 host up) scanned in 59.73 seconds
[+] Scanning 192.168.160.219 [1000 UDP ports]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-20 04:14 CDT
Initiating Ping Scan at 04:14
Scanning 192.168.160.219 [4 ports]
Completed Ping Scan at 04:14, 0.10s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 04:14
Completed Parallel DNS resolution of 1 host. at 04:14, 0.02s elapsed
Initiating UDP Scan at 04:14
Scanning 192.168.160.219 [100 ports]
Increasing send delay for 192.168.160.219 from 0 to 50 due to max_successful_tryno increase to 5
Increasing send delay for 192.168.160.219 from 50 to 100 due to max_successful_tryno increase to 6
Warning: 192.168.160.219 giving up on port because retransmission cap hit (6).
Increasing send delay for 192.168.160.219 from 100 to 200 due to 11 out of 11 dropped probes since last increase.
Increasing send delay for 192.168.160.219 from 200 to 400 due to 11 out of 11 dropped probes since last increase.
Increasing send delay for 192.168.160.219 from 400 to 800 due to 11 out of 11 dropped probes since last increase.
Completed UDP Scan at 04:15, 71.56s elapsed (100 total ports)
Nmap scan report for 192.168.160.219
Host is up (0.048s latency).
Not shown: 73 closed udp ports (port-unreach)
PORT STATE SERVICE
68/udp open|filtered dhcpc
123/udp open|filtered ntp
135/udp open|filtered msrpc
136/udp open|filtered profile
137/udp open|filtered netbios-ns
162/udp open|filtered snmptrap
427/udp open|filtered svrloc
497/udp open|filtered retrospect
500/udp open|filtered isakmp
514/udp open|filtered syslog
997/udp open|filtered maitrd
1023/udp open|filtered unknown
1026/udp open|filtered win-rpc
1028/udp open|filtered ms-lsa
1646/udp open|filtered radacct
1812/udp open|filtered radius
2049/udp open|filtered nfs
3283/udp open|filtered netassistant
3703/udp open|filtered adobeserver-3
4444/udp open|filtered krb524
30718/udp open|filtered unknown
32771/udp open|filtered sometimes-rpc6
49154/udp open|filtered unknown
49188/udp open|filtered unknown
49192/udp open|filtered unknown
49194/udp open|filtered unknown
49201/udp open|filtered unknown
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 71.86 seconds
Raw packets sent: 536 (33.182KB) | Rcvd: 161 (25.162KB)
[+] Completed!
Last updated