nmap
___
( _ ) _ __ ___ __ _ _ __
/ _ \| '_ ` _ \ / _` | '_ \
| (_) | | | | | | (_| | |_) |
\___/|_| |_| |_|\__,_| .__/
|_|
adot8 <3
[+] Scanning 192.168.192.72 [65535 TCP ports]
[+] Enumerating 192.168.192.72 [21,22,25,80,2121,3128,8593,54787,62524]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-25 08:48 CDT
Nmap scan report for 192.168.192.72
Host is up (0.047s latency).
PORT STATE SERVICE VERSION
21/tcp open ftp pyftpdlib 1.5.6
| ftp-syst:
| STAT:
| FTP server status:
| Connected to: 192.168.192.72:21
| Waiting for username.
| TYPE: ASCII; STRUcture: File; MODE: Stream
| Data connection closed.
|_End of status.
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey:
| 2048 5b:a7:37:fd:55:6c:f8:ea:03:f5:10:bc:94:32:07:18 (RSA)
| 256 ab:da:6a:6f:97:3f:b2:70:3e:6c:2b:4b:0c:b7:f6:4c (ECDSA)
|_ 256 ae:29:d4:e3:46:a1:b1:52:27:83:8f:8f:b0:c4:36:d1 (ED25519)
25/tcp open smtp Exim smtpd
| smtp-commands: solstice Hello nmap.scanme.org [192.168.45.216], SIZE 52428800, 8BITMIME, PIPELINING, CHUNKING, PRDR, HELP
|_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
80/tcp open http Apache httpd 2.4.38 ((Debian))
|_http-title: Site doesn't have a title (text/html).
|_http-server-header: Apache/2.4.38 (Debian)
2121/tcp open ftp pyftpdlib 1.5.6
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_drws------ 2 www-data www-data 4096 Jun 18 2020 pub
| ftp-syst:
| STAT:
| FTP server status:
| Connected to: 192.168.192.72:2121
| Waiting for username.
| TYPE: ASCII; STRUcture: File; MODE: Stream
| Data connection closed.
|_End of status.
3128/tcp open http-proxy Squid http proxy 4.6
|_http-title: ERROR: The requested URL could not be retrieved
|_http-server-header: squid/4.6
8593/tcp open http PHP cli server 5.5 or later (PHP 7.3.14-1)
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
| http-cookie-flags:
| /:
| PHPSESSID:
|_ httponly flag not set
54787/tcp open http PHP cli server 5.5 or later (PHP 7.3.14-1)
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
62524/tcp open ftp FreeFloat ftpd 1.00
Service Info: OSs: Linux, Windows; CPE: cpe:/o:linux:linux_kernel, cpe:/o:microsoft:windows
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 75.86 seconds
[+] Enumerating 192.168.192.72 for vulnerabilities [21,22,25,80,2121,3128,8593,54787,62524]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-25 08:49 CDT
Pre-scan script results:
| broadcast-avahi-dos:
| Discovered hosts:
| 224.0.0.251
| After NULL UDP avahi packet DoS (CVE-2011-1002).
|_ Hosts are all up (not vulnerable).
Nmap scan report for 192.168.192.72
Host is up (0.043s latency).
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
| smtp-vuln-cve2010-4344:
| Exim version: 4.92
| Exim heap overflow vulnerability (CVE-2010-4344):
| Exim (CVE-2010-4344): NOT VULNERABLE
| Exim privileges escalation vulnerability (CVE-2010-4345):
| Exim (CVE-2010-4345): NOT VULNERABLE
|_ To confirm and exploit the vulnerabilities, run with --script-args='smtp-vuln-cve2010-4344.exploit'
80/tcp open http
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-dombased-xss: Couldn't find any DOM based XSS.
2121/tcp open ccproxy-ftp
3128/tcp open squid-http
8593/tcp open unknown
54787/tcp open unknown
62524/tcp open unknown
Nmap done: 1 IP address (1 host up) scanned in 163.37 seconds
[+] Scanning 192.168.192.72 [1000 UDP ports]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-25 08:52 CDT
Initiating Ping Scan at 08:52
Scanning 192.168.192.72 [4 ports]
Completed Ping Scan at 08:52, 0.10s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 08:52
Completed Parallel DNS resolution of 1 host. at 08:52, 0.01s elapsed
Initiating UDP Scan at 08:52
Scanning 192.168.192.72 [100 ports]
Increasing send delay for 192.168.192.72 from 0 to 50 due to max_successful_tryno increase to 5
Increasing send delay for 192.168.192.72 from 50 to 100 due to 11 out of 12 dropped probes since last increase.
Increasing send delay for 192.168.192.72 from 100 to 200 due to 11 out of 14 dropped probes since last increase.
Increasing send delay for 192.168.192.72 from 200 to 400 due to 11 out of 11 dropped probes since last increase.
Increasing send delay for 192.168.192.72 from 400 to 800 due to 11 out of 11 dropped probes since last increase.
Completed UDP Scan at 08:53, 76.20s elapsed (100 total ports)
Nmap scan report for 192.168.192.72
Host is up (0.12s latency).
Not shown: 79 closed udp ports (port-unreach)
PORT STATE SERVICE
7/udp open|filtered echo
53/udp open|filtered domain
69/udp open|filtered tftp
135/udp open|filtered msrpc
427/udp open|filtered svrloc
443/udp open|filtered https
515/udp open|filtered printer
518/udp open|filtered ntalk
631/udp open|filtered ipp
999/udp open|filtered applix
2000/udp open|filtered cisco-sccp
5353/udp open|filtered zeroconf
9200/udp open|filtered wap-wsp
20031/udp open|filtered bakbonenetvault
32769/udp open|filtered filenet-rpc
49156/udp open|filtered unknown
49185/udp open|filtered unknown
49186/udp open|filtered unknown
49190/udp open|filtered unknown
49193/udp open|filtered unknown
49201/udp open|filtered unknown
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 76.45 seconds
Raw packets sent: 523 (31.879KB) | Rcvd: 82 (6.797KB)
[+] Completed!
Last updated