nmap

  ___                        
 ( _ ) _ __ ___   __ _ _ __  
 / _ \| '_ ` _ \ / _` | '_ \ 
| (_) | | | | | | (_| | |_) |
 \___/|_| |_| |_|\__,_| .__/ 
                      |_|    
          adot8 <3

[+] Scanning 192.168.192.72 [65535 TCP ports]


[+] Enumerating 192.168.192.72 [21,22,25,80,2121,3128,8593,54787,62524]

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-25 08:48 CDT
Nmap scan report for 192.168.192.72
Host is up (0.047s latency).

PORT      STATE SERVICE    VERSION
21/tcp    open  ftp        pyftpdlib 1.5.6
| ftp-syst: 
|   STAT: 
| FTP server status:
|  Connected to: 192.168.192.72:21
|  Waiting for username.
|  TYPE: ASCII; STRUcture: File; MODE: Stream
|  Data connection closed.
|_End of status.
22/tcp    open  ssh        OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey: 
|   2048 5b:a7:37:fd:55:6c:f8:ea:03:f5:10:bc:94:32:07:18 (RSA)
|   256 ab:da:6a:6f:97:3f:b2:70:3e:6c:2b:4b:0c:b7:f6:4c (ECDSA)
|_  256 ae:29:d4:e3:46:a1:b1:52:27:83:8f:8f:b0:c4:36:d1 (ED25519)
25/tcp    open  smtp       Exim smtpd
| smtp-commands: solstice Hello nmap.scanme.org [192.168.45.216], SIZE 52428800, 8BITMIME, PIPELINING, CHUNKING, PRDR, HELP
|_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
80/tcp    open  http       Apache httpd 2.4.38 ((Debian))
|_http-title: Site doesn't have a title (text/html).
|_http-server-header: Apache/2.4.38 (Debian)
2121/tcp  open  ftp        pyftpdlib 1.5.6
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_drws------   2 www-data www-data     4096 Jun 18  2020 pub
| ftp-syst: 
|   STAT: 
| FTP server status:
|  Connected to: 192.168.192.72:2121
|  Waiting for username.
|  TYPE: ASCII; STRUcture: File; MODE: Stream
|  Data connection closed.
|_End of status.
3128/tcp  open  http-proxy Squid http proxy 4.6
|_http-title: ERROR: The requested URL could not be retrieved
|_http-server-header: squid/4.6
8593/tcp  open  http       PHP cli server 5.5 or later (PHP 7.3.14-1)
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
| http-cookie-flags: 
|   /: 
|     PHPSESSID: 
|_      httponly flag not set
54787/tcp open  http       PHP cli server 5.5 or later (PHP 7.3.14-1)
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
62524/tcp open  ftp        FreeFloat ftpd 1.00
Service Info: OSs: Linux, Windows; CPE: cpe:/o:linux:linux_kernel, cpe:/o:microsoft:windows

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 75.86 seconds

[+] Enumerating 192.168.192.72 for vulnerabilities [21,22,25,80,2121,3128,8593,54787,62524]

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-25 08:49 CDT
Pre-scan script results:
| broadcast-avahi-dos: 
|   Discovered hosts:
|     224.0.0.251
|   After NULL UDP avahi packet DoS (CVE-2011-1002).
|_  Hosts are all up (not vulnerable).
Nmap scan report for 192.168.192.72
Host is up (0.043s latency).

PORT      STATE SERVICE
21/tcp    open  ftp
22/tcp    open  ssh
25/tcp    open  smtp
| smtp-vuln-cve2010-4344: 
|   Exim version: 4.92
|   Exim heap overflow vulnerability (CVE-2010-4344):
|     Exim (CVE-2010-4344): NOT VULNERABLE
|   Exim privileges escalation vulnerability (CVE-2010-4345):
|     Exim (CVE-2010-4345): NOT VULNERABLE
|_  To confirm and exploit the vulnerabilities, run with --script-args='smtp-vuln-cve2010-4344.exploit'
80/tcp    open  http
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-dombased-xss: Couldn't find any DOM based XSS.
2121/tcp  open  ccproxy-ftp
3128/tcp  open  squid-http
8593/tcp  open  unknown
54787/tcp open  unknown
62524/tcp open  unknown

Nmap done: 1 IP address (1 host up) scanned in 163.37 seconds

[+] Scanning 192.168.192.72 [1000 UDP ports]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-25 08:52 CDT
Initiating Ping Scan at 08:52
Scanning 192.168.192.72 [4 ports]
Completed Ping Scan at 08:52, 0.10s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 08:52
Completed Parallel DNS resolution of 1 host. at 08:52, 0.01s elapsed
Initiating UDP Scan at 08:52
Scanning 192.168.192.72 [100 ports]
Increasing send delay for 192.168.192.72 from 0 to 50 due to max_successful_tryno increase to 5
Increasing send delay for 192.168.192.72 from 50 to 100 due to 11 out of 12 dropped probes since last increase.
Increasing send delay for 192.168.192.72 from 100 to 200 due to 11 out of 14 dropped probes since last increase.
Increasing send delay for 192.168.192.72 from 200 to 400 due to 11 out of 11 dropped probes since last increase.
Increasing send delay for 192.168.192.72 from 400 to 800 due to 11 out of 11 dropped probes since last increase.
Completed UDP Scan at 08:53, 76.20s elapsed (100 total ports)
Nmap scan report for 192.168.192.72
Host is up (0.12s latency).
Not shown: 79 closed udp ports (port-unreach)
PORT      STATE         SERVICE
7/udp     open|filtered echo
53/udp    open|filtered domain
69/udp    open|filtered tftp
135/udp   open|filtered msrpc
427/udp   open|filtered svrloc
443/udp   open|filtered https
515/udp   open|filtered printer
518/udp   open|filtered ntalk
631/udp   open|filtered ipp
999/udp   open|filtered applix
2000/udp  open|filtered cisco-sccp
5353/udp  open|filtered zeroconf
9200/udp  open|filtered wap-wsp
20031/udp open|filtered bakbonenetvault
32769/udp open|filtered filenet-rpc
49156/udp open|filtered unknown
49185/udp open|filtered unknown
49186/udp open|filtered unknown
49190/udp open|filtered unknown
49193/udp open|filtered unknown
49201/udp open|filtered unknown

Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 76.45 seconds
           Raw packets sent: 523 (31.879KB) | Rcvd: 82 (6.797KB)

[+] Completed!

Last updated