nmap

  ___                        
 ( _ ) _ __ ___   __ _ _ __  
 / _ \| '_ ` _ \ / _` | '_ \ 
| (_) | | | | | | (_| | |_) |
 \___/|_| |_| |_|\__,_| .__/ 
                      |_|    
          adot8 <3

[+] Scanning 192.168.160.219 [65535 TCP ports]


[+] Enumerating 192.168.160.219 [80]

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-20 04:12 CDT
Nmap scan report for 192.168.160.219
Host is up (0.046s latency).

PORT   STATE SERVICE VERSION
80/tcp open  http    Apache httpd 2.2.22 ((Debian))
|_http-title: driftingblues
|_http-server-header: Apache/2.2.22 (Debian)
| http-robots.txt: 1 disallowed entry 
|_/textpattern/textpattern

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.28 seconds

[+] Enumerating 192.168.160.219 for vulnerabilities [80]

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-20 04:13 CDT
Pre-scan script results:
| broadcast-avahi-dos: 
|   Discovered hosts:
|     224.0.0.251
|   After NULL UDP avahi packet DoS (CVE-2011-1002).
|   Hosts that seem down (vulnerable):
|_    224.0.0.251
Nmap scan report for 192.168.160.219
Host is up (0.045s latency).

PORT   STATE SERVICE
80/tcp open  http
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-enum: 
|_  /robots.txt: Robots file

Nmap done: 1 IP address (1 host up) scanned in 59.73 seconds

[+] Scanning 192.168.160.219 [1000 UDP ports]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-20 04:14 CDT
Initiating Ping Scan at 04:14
Scanning 192.168.160.219 [4 ports]
Completed Ping Scan at 04:14, 0.10s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 04:14
Completed Parallel DNS resolution of 1 host. at 04:14, 0.02s elapsed
Initiating UDP Scan at 04:14
Scanning 192.168.160.219 [100 ports]
Increasing send delay for 192.168.160.219 from 0 to 50 due to max_successful_tryno increase to 5
Increasing send delay for 192.168.160.219 from 50 to 100 due to max_successful_tryno increase to 6
Warning: 192.168.160.219 giving up on port because retransmission cap hit (6).
Increasing send delay for 192.168.160.219 from 100 to 200 due to 11 out of 11 dropped probes since last increase.
Increasing send delay for 192.168.160.219 from 200 to 400 due to 11 out of 11 dropped probes since last increase.
Increasing send delay for 192.168.160.219 from 400 to 800 due to 11 out of 11 dropped probes since last increase.
Completed UDP Scan at 04:15, 71.56s elapsed (100 total ports)
Nmap scan report for 192.168.160.219
Host is up (0.048s latency).
Not shown: 73 closed udp ports (port-unreach)
PORT      STATE         SERVICE
68/udp    open|filtered dhcpc
123/udp   open|filtered ntp
135/udp   open|filtered msrpc
136/udp   open|filtered profile
137/udp   open|filtered netbios-ns
162/udp   open|filtered snmptrap
427/udp   open|filtered svrloc
497/udp   open|filtered retrospect
500/udp   open|filtered isakmp
514/udp   open|filtered syslog
997/udp   open|filtered maitrd
1023/udp  open|filtered unknown
1026/udp  open|filtered win-rpc
1028/udp  open|filtered ms-lsa
1646/udp  open|filtered radacct
1812/udp  open|filtered radius
2049/udp  open|filtered nfs
3283/udp  open|filtered netassistant
3703/udp  open|filtered adobeserver-3
4444/udp  open|filtered krb524
30718/udp open|filtered unknown
32771/udp open|filtered sometimes-rpc6
49154/udp open|filtered unknown
49188/udp open|filtered unknown
49192/udp open|filtered unknown
49194/udp open|filtered unknown
49201/udp open|filtered unknown

Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 71.86 seconds
           Raw packets sent: 536 (33.182KB) | Rcvd: 161 (25.162KB)

[+] Completed!

Last updated