nmap
___
( _ ) _ __ ___ __ _ _ __
/ _ \| '_ ` _ \ / _` | '_ \
| (_) | | | | | | (_| | |_) |
\___/|_| |_| |_|\__,_| .__/
|_|
adot8 <3
[+] Scanning 192.168.184.238 [65535 TCP ports]
[+] Enumerating 192.168.184.238 [80,10000,20000]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-27 01:06 CDT
Nmap scan report for 192.168.184.238
Host is up (0.043s latency).
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.51 ((Debian))
|_http-title: Apache2 Debian Default Page: It works
10000/tcp open http MiniServ 1.981 (Webmin httpd)
|_http-title: 200 — Document follows
20000/tcp open http MiniServ 1.830 (Webmin httpd)
|_http-title: 200 — Document follows
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 44.97 seconds
[+] Enumerating 192.168.184.238 for vulnerabilities [80,10000,20000]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-27 01:07 CDT
Pre-scan script results:
| broadcast-avahi-dos:
| Discovered hosts:
| 224.0.0.251
| After NULL UDP avahi packet DoS (CVE-2011-1002).
|_ Hosts are all up (not vulnerable).
Nmap scan report for 192.168.184.238
Host is up.
PORT STATE SERVICE
80/tcp filtered http
10000/tcp filtered snet-sensor-mgmt
20000/tcp filtered dnp
Nmap done: 1 IP address (1 host up) scanned in 37.99 seconds
[+] Scanning 192.168.184.238 [1000 UDP ports]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-27 01:08 CDT
Initiating Ping Scan at 01:08
Scanning 192.168.184.238 [4 ports]
Completed Ping Scan at 01:08, 2.04s elapsed (1 total hosts)
Nmap scan report for 192.168.184.238 [host down]
Read data files from: /usr/bin/../share/nmap
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 2.11 seconds
Raw packets sent: 8 (304B) | Rcvd: 0 (0B)
[+] Completed!
Last updated