nmap
___
( _ ) _ __ ___ __ _ _ __
/ _ \| '_ ` _ \ / _` | '_ \
| (_) | | | | | | (_| | |_) |
\___/|_| |_| |_|\__,_| .__/
|_|
adot8 <3
[+] Scanning 192.168.172.230 [65535 TCP ports]
[+] Enumerating 192.168.172.230 [21,22,80]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-07-08 00:54 CDT
Nmap scan report for 192.168.172.230
Host is up (0.041s latency).
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 3.0.3
| ftp-syst:
| STAT:
| FTP server status:
| Connected to ::ffff:192.168.45.237
| Logged in as ftp
| TYPE: ASCII
| No session bandwidth limit
| Session timeout in seconds is 300
| Control connection is plain text
| Data connections will be plain text
| At session startup, client count was 2
| vsFTPd 3.0.3 - secure, fast, stable
|_End of status
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_-rw-r--r-- 1 0 0 1093656 Feb 26 2021 trytofind.jpg
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey:
| 2048 1e:30:ce:72:81:e0:a2:3d:5c:28:88:8b:12:ac:fa:ac (RSA)
| 256 01:9d:fa:fb:f2:06:37:c0:12:fc:01:8b:24:8f:53:ae (ECDSA)
|_ 256 2f:34:b3:d0:74:b4:7f:8d:17:d2:37:b1:2e:32:f7:eb (ED25519)
80/tcp open http Apache httpd 2.4.38 ((Debian))
|_http-server-header: Apache/2.4.38 (Debian)
|_http-title: MoneyBox
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.54 seconds
[+] Enumerating 192.168.172.230 for vulnerabilities [21,22,80]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-07-08 00:54 CDT
Pre-scan script results:
| broadcast-avahi-dos:
| Discovered hosts:
| 224.0.0.251
| After NULL UDP avahi packet DoS (CVE-2011-1002).
|_ Hosts are all up (not vulnerable).
Nmap scan report for 192.168.172.230
Host is up (0.046s latency).
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
80/tcp open http
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-dombased-xss: Couldn't find any DOM based XSS.
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
Nmap done: 1 IP address (1 host up) scanned in 57.44 seconds
[+] Scanning 192.168.172.230 [1000 UDP ports]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-07-08 00:55 CDT
Initiating Ping Scan at 00:55
Scanning 192.168.172.230 [4 ports]
Completed Ping Scan at 00:55, 0.10s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 00:55
Completed Parallel DNS resolution of 1 host. at 00:55, 0.01s elapsed
Initiating UDP Scan at 00:55
Scanning 192.168.172.230 [100 ports]
Increasing send delay for 192.168.172.230 from 0 to 50 due to 11 out of 16 dropped probes since last increase.
Increasing send delay for 192.168.172.230 from 50 to 100 due to max_successful_tryno increase to 5
Increasing send delay for 192.168.172.230 from 100 to 200 due to max_successful_tryno increase to 6
Warning: 192.168.172.230 giving up on port because retransmission cap hit (6).
Increasing send delay for 192.168.172.230 from 200 to 400 due to 11 out of 11 dropped probes since last increase.
Increasing send delay for 192.168.172.230 from 400 to 800 due to 11 out of 11 dropped probes since last increase.
Completed UDP Scan at 00:56, 66.41s elapsed (100 total ports)
Nmap scan report for 192.168.172.230
Host is up (0.044s latency).
Not shown: 69 closed udp ports (port-unreach)
PORT STATE SERVICE
7/udp open|filtered echo
67/udp open|filtered dhcps
68/udp open|filtered dhcpc
88/udp open|filtered kerberos-sec
135/udp open|filtered msrpc
138/udp open|filtered netbios-dgm
445/udp open|filtered microsoft-ds
500/udp open|filtered isakmp
514/udp open|filtered syslog
515/udp open|filtered printer
593/udp open|filtered http-rpc-epmap
631/udp open|filtered ipp
1023/udp open|filtered unknown
1026/udp open|filtered win-rpc
1434/udp open|filtered ms-sql-m
1645/udp open|filtered radius
1646/udp open|filtered radacct
1812/udp open|filtered radius
2049/udp open|filtered nfs
2222/udp open|filtered msantipiracy
2223/udp open|filtered rockwell-csp2
4500/udp open|filtered nat-t-ike
5060/udp open|filtered sip
5632/udp open|filtered pcanywherestat
31337/udp open|filtered BackOrifice
33281/udp open|filtered unknown
49186/udp open|filtered unknown
49188/udp open|filtered unknown
49190/udp open|filtered unknown
49192/udp open|filtered unknown
65024/udp open|filtered unknown
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 66.67 seconds
Raw packets sent: 572 (36.646KB) | Rcvd: 73 (5.900KB)
[+] Completed!
Last updated