nmap
___
( _ ) _ __ ___ __ _ _ __
/ _ \| '_ ` _ \ / _` | '_ \
| (_) | | | | | | (_| | |_) |
\___/|_| |_| |_|\__,_| .__/
|_|
adot8 <3
[+] Scanning 192.168.205.101 [65535 TCP ports]
[+] Enumerating 192.168.205.101 [22,80,2112]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-27 13:39 CDT
Nmap scan report for 192.168.205.101
Host is up (0.042s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.1 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 3072 ef:24:0e:ab:d2:b3:16:b4:4b:2e:27:c0:5f:48:79:8b (RSA)
| 256 f2:d8:35:3f:49:59:85:85:07:e6:a2:0e:65:7a:8c:4b (ECDSA)
|_ 256 0b:23:89:c3:c0:26:d5:64:5e:93:b7:ba:f5:14:7f:3e (ED25519)
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|_http-title: Potato company
|_http-server-header: Apache/2.4.41 (Ubuntu)
2112/tcp open ftp ProFTPD
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
| -rw-r--r-- 1 ftp ftp 901 Aug 2 2020 index.php.bak
|_-rw-r--r-- 1 ftp ftp 54 Aug 2 2020 welcome.msg
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 14.38 seconds
[+] Enumerating 192.168.205.101 for vulnerabilities [22,80,2112]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-27 13:39 CDT
Pre-scan script results:
| broadcast-avahi-dos:
| Discovered hosts:
| 224.0.0.251
| After NULL UDP avahi packet DoS (CVE-2011-1002).
|_ Hosts are all up (not vulnerable).
Nmap scan report for 192.168.205.101
Host is up (0.050s latency).
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
|_http-vuln-cve2017-1001000: ERROR: Script execution failed (use -d to debug)
|_http-dombased-xss: Couldn't find any DOM based XSS.
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
| http-enum:
| /admin/: Possible admin folder
|_ /admin/index.php: Possible admin folder
|_http-csrf: Couldn't find any CSRF vulnerabilities.
2112/tcp open kip
Nmap done: 1 IP address (1 host up) scanned in 59.19 seconds
[+] Scanning 192.168.205.101 [1000 UDP ports]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-27 13:40 CDT
Initiating Ping Scan at 13:40
Scanning 192.168.205.101 [4 ports]
Completed Ping Scan at 13:40, 0.09s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 13:40
Completed Parallel DNS resolution of 1 host. at 13:40, 0.01s elapsed
Initiating UDP Scan at 13:40
Scanning 192.168.205.101 [100 ports]
Increasing send delay for 192.168.205.101 from 0 to 50 due to max_successful_tryno increase to 5
Increasing send delay for 192.168.205.101 from 50 to 100 due to max_successful_tryno increase to 6
Warning: 192.168.205.101 giving up on port because retransmission cap hit (6).
Increasing send delay for 192.168.205.101 from 100 to 200 due to 11 out of 11 dropped probes since last increase.
Increasing send delay for 192.168.205.101 from 200 to 400 due to 11 out of 11 dropped probes since last increase.
Increasing send delay for 192.168.205.101 from 400 to 800 due to 11 out of 11 dropped probes since last increase.
Completed UDP Scan at 13:42, 83.92s elapsed (100 total ports)
Nmap scan report for 192.168.205.101
Host is up (0.042s latency).
Not shown: 84 closed udp ports (port-unreach)
PORT STATE SERVICE
80/udp open|filtered http
120/udp open|filtered cfdptkt
162/udp open|filtered snmptrap
427/udp open|filtered svrloc
497/udp open|filtered retrospect
623/udp open|filtered asf-rmcp
997/udp open|filtered maitrd
999/udp open|filtered applix
1028/udp open|filtered ms-lsa
5060/udp open|filtered sip
5632/udp open|filtered pcanywherestat
9200/udp open|filtered wap-wsp
32768/udp open|filtered omad
32769/udp open|filtered filenet-rpc
49152/udp open|filtered unknown
49194/udp open|filtered unknown
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 84.20 seconds
Raw packets sent: 411 (25.255KB) | Rcvd: 193 (32.590KB)
[+] Completed!
Last updated