nmap

  ___                        
 ( _ ) _ __ ___   __ _ _ __  
 / _ \| '_ ` _ \ / _` | '_ \ 
| (_) | | | | | | (_| | |_) |
 \___/|_| |_| |_|\__,_| .__/ 
                      |_|    
          adot8 <3

[+] Scanning 192.168.192.85 [65535 TCP ports]


[+] Enumerating 192.168.192.85 [22,80]

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-25 00:59 CDT
Nmap scan report for 192.168.192.85
Host is up (0.044s latency).

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey: 
|   2048 a9:b5:3e:3b:e3:74:e4:ff:b6:d5:9f:f1:81:e7:a4:4f (RSA)
|   256 ce:f3:b3:e7:0e:90:e2:64:ac:8d:87:0f:15:88:aa:5f (ECDSA)
|_  256 66:a9:80:91:f3:d8:4b:0a:69:b0:00:22:9f:3c:4c:5a (ED25519)
80/tcp open  http    Apache httpd 2.4.38
| http-ls: Volume /
| SIZE  TIME              FILENAME
| 3.0K  2020-07-07 16:36  save.zip
|_
|_http-server-header: Apache/2.4.38 (Debian)
|_http-title: Index of /
Service Info: Host: 127.0.0.1; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.50 seconds

[+] Enumerating 192.168.192.85 for vulnerabilities [22,80]

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-25 00:59 CDT
Pre-scan script results:
| broadcast-avahi-dos: 
|   Discovered hosts:
|     224.0.0.251
|   After NULL UDP avahi packet DoS (CVE-2011-1002).
|_  Hosts are all up (not vulnerable).
Nmap scan report for 192.168.192.85
Host is up (0.065s latency).

PORT   STATE SERVICE
22/tcp open  ssh
80/tcp open  http
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-sql-injection: 
|   Possible sqli for queries:
|     http://192.168.192.85:80/?C=S%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=D%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=M%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=N%3BO%3DD%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=N%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=S%3BO%3DD%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=M%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=D%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=N%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=D%3BO%3DD%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=M%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=S%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=N%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=M%3BO%3DD%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=S%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=D%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=N%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=S%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=M%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=D%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=S%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=D%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=M%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=N%3BO%3DD%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=N%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=S%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=M%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=D%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=N%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=S%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=M%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=D%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=N%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=S%3BO%3DA%27%20OR%20sqlspider
|     http://192.168.192.85:80/?C=M%3BO%3DA%27%20OR%20sqlspider
|_    http://192.168.192.85:80/?C=D%3BO%3DA%27%20OR%20sqlspider
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
| http-enum: 
|_  /: Root directory w/ listing on 'apache/2.4.38 (debian)'

Nmap done: 1 IP address (1 host up) scanned in 56.25 seconds

[+] Scanning 192.168.192.85 [1000 UDP ports]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-25 01:00 CDT
Initiating Ping Scan at 01:00
Scanning 192.168.192.85 [4 ports]
Completed Ping Scan at 01:00, 0.10s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 01:00
Completed Parallel DNS resolution of 1 host. at 01:00, 0.01s elapsed
Initiating UDP Scan at 01:00
Scanning 192.168.192.85 [100 ports]
Increasing send delay for 192.168.192.85 from 0 to 50 due to max_successful_tryno increase to 5
Increasing send delay for 192.168.192.85 from 50 to 100 due to 11 out of 12 dropped probes since last increase.
Increasing send delay for 192.168.192.85 from 100 to 200 due to 11 out of 11 dropped probes since last increase.
Increasing send delay for 192.168.192.85 from 200 to 400 due to max_successful_tryno increase to 6
Warning: 192.168.192.85 giving up on port because retransmission cap hit (6).
Increasing send delay for 192.168.192.85 from 400 to 800 due to 11 out of 15 dropped probes since last increase.
Completed UDP Scan at 01:01, 62.64s elapsed (100 total ports)
Nmap scan report for 192.168.192.85
Host is up (0.046s latency).
Not shown: 63 closed udp ports (port-unreach)
PORT      STATE         SERVICE
49/udp    open|filtered tacacs
68/udp    open|filtered dhcpc
69/udp    open|filtered tftp
120/udp   open|filtered cfdptkt
136/udp   open|filtered profile
137/udp   open|filtered netbios-ns
138/udp   open|filtered netbios-dgm
139/udp   open|filtered netbios-ssn
158/udp   open|filtered pcmail-srv
162/udp   open|filtered snmptrap
515/udp   open|filtered printer
518/udp   open|filtered ntalk
520/udp   open|filtered route
623/udp   open|filtered asf-rmcp
626/udp   open|filtered serialnumberd
631/udp   open|filtered ipp
1022/udp  open|filtered exp2
1026/udp  open|filtered win-rpc
1028/udp  open|filtered ms-lsa
1030/udp  open|filtered iad1
1701/udp  open|filtered L2TP
3456/udp  open|filtered IISrpc-or-vat
3703/udp  open|filtered adobeserver-3
5060/udp  open|filtered sip
5353/udp  open|filtered zeroconf
5632/udp  open|filtered pcanywherestat
10000/udp open|filtered ndmp
17185/udp open|filtered wdbrpc
32768/udp open|filtered omad
32815/udp open|filtered unknown
49153/udp open|filtered unknown
49181/udp open|filtered unknown
49191/udp open|filtered unknown
49192/udp open|filtered unknown
49193/udp open|filtered unknown
49194/udp open|filtered unknown
49200/udp open|filtered unknown

Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 62.93 seconds
           Raw packets sent: 606 (36.457KB) | Rcvd: 104 (14.339KB)

[+] Completed!

Last updated