nmap

  ___                        
 ( _ ) _ __ ___   __ _ _ __  
 / _ \| '_ ` _ \ / _` | '_ \ 
| (_) | | | | | | (_| | |_) |
 \___/|_| |_| |_|\__,_| .__/ 
                      |_|    
          adot8 <3

[+] Scanning 192.168.172.230 [65535 TCP ports]


[+] Enumerating 192.168.172.230 [21,22,80]

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-07-08 00:54 CDT
Nmap scan report for 192.168.172.230
Host is up (0.041s latency).

PORT   STATE SERVICE VERSION
21/tcp open  ftp     vsftpd 3.0.3
| ftp-syst: 
|   STAT: 
| FTP server status:
|      Connected to ::ffff:192.168.45.237
|      Logged in as ftp
|      TYPE: ASCII
|      No session bandwidth limit
|      Session timeout in seconds is 300
|      Control connection is plain text
|      Data connections will be plain text
|      At session startup, client count was 2
|      vsFTPd 3.0.3 - secure, fast, stable
|_End of status
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_-rw-r--r--    1 0        0         1093656 Feb 26  2021 trytofind.jpg
22/tcp open  ssh     OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey: 
|   2048 1e:30:ce:72:81:e0:a2:3d:5c:28:88:8b:12:ac:fa:ac (RSA)
|   256 01:9d:fa:fb:f2:06:37:c0:12:fc:01:8b:24:8f:53:ae (ECDSA)
|_  256 2f:34:b3:d0:74:b4:7f:8d:17:d2:37:b1:2e:32:f7:eb (ED25519)
80/tcp open  http    Apache httpd 2.4.38 ((Debian))
|_http-server-header: Apache/2.4.38 (Debian)
|_http-title: MoneyBox
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.54 seconds

[+] Enumerating 192.168.172.230 for vulnerabilities [21,22,80]

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-07-08 00:54 CDT
Pre-scan script results:
| broadcast-avahi-dos: 
|   Discovered hosts:
|     224.0.0.251
|   After NULL UDP avahi packet DoS (CVE-2011-1002).
|_  Hosts are all up (not vulnerable).
Nmap scan report for 192.168.172.230
Host is up (0.046s latency).

PORT   STATE SERVICE
21/tcp open  ftp
22/tcp open  ssh
80/tcp open  http
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-dombased-xss: Couldn't find any DOM based XSS.
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.

Nmap done: 1 IP address (1 host up) scanned in 57.44 seconds

[+] Scanning 192.168.172.230 [1000 UDP ports]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-07-08 00:55 CDT
Initiating Ping Scan at 00:55
Scanning 192.168.172.230 [4 ports]
Completed Ping Scan at 00:55, 0.10s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 00:55
Completed Parallel DNS resolution of 1 host. at 00:55, 0.01s elapsed
Initiating UDP Scan at 00:55
Scanning 192.168.172.230 [100 ports]
Increasing send delay for 192.168.172.230 from 0 to 50 due to 11 out of 16 dropped probes since last increase.
Increasing send delay for 192.168.172.230 from 50 to 100 due to max_successful_tryno increase to 5
Increasing send delay for 192.168.172.230 from 100 to 200 due to max_successful_tryno increase to 6
Warning: 192.168.172.230 giving up on port because retransmission cap hit (6).
Increasing send delay for 192.168.172.230 from 200 to 400 due to 11 out of 11 dropped probes since last increase.
Increasing send delay for 192.168.172.230 from 400 to 800 due to 11 out of 11 dropped probes since last increase.
Completed UDP Scan at 00:56, 66.41s elapsed (100 total ports)
Nmap scan report for 192.168.172.230
Host is up (0.044s latency).
Not shown: 69 closed udp ports (port-unreach)
PORT      STATE         SERVICE
7/udp     open|filtered echo
67/udp    open|filtered dhcps
68/udp    open|filtered dhcpc
88/udp    open|filtered kerberos-sec
135/udp   open|filtered msrpc
138/udp   open|filtered netbios-dgm
445/udp   open|filtered microsoft-ds
500/udp   open|filtered isakmp
514/udp   open|filtered syslog
515/udp   open|filtered printer
593/udp   open|filtered http-rpc-epmap
631/udp   open|filtered ipp
1023/udp  open|filtered unknown
1026/udp  open|filtered win-rpc
1434/udp  open|filtered ms-sql-m
1645/udp  open|filtered radius
1646/udp  open|filtered radacct
1812/udp  open|filtered radius
2049/udp  open|filtered nfs
2222/udp  open|filtered msantipiracy
2223/udp  open|filtered rockwell-csp2
4500/udp  open|filtered nat-t-ike
5060/udp  open|filtered sip
5632/udp  open|filtered pcanywherestat
31337/udp open|filtered BackOrifice
33281/udp open|filtered unknown
49186/udp open|filtered unknown
49188/udp open|filtered unknown
49190/udp open|filtered unknown
49192/udp open|filtered unknown
65024/udp open|filtered unknown

Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 66.67 seconds
           Raw packets sent: 572 (36.646KB) | Rcvd: 73 (5.900KB)

[+] Completed!

Last updated