Recon

$ nmap -p- --min-rate=1000 -Pn -v 192.168.166.45
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-08-15 21:19 CDT
Initiating Parallel DNS resolution of 1 host. at 21:19
Completed Parallel DNS resolution of 1 host. at 21:19, 0.03s elapsed
Initiating Connect Scan at 21:19
Scanning 192.168.166.45 [65535 ports]
Discovered open port 139/tcp on 192.168.166.45
Discovered open port 3389/tcp on 192.168.166.45
Discovered open port 80/tcp on 192.168.166.45
Discovered open port 135/tcp on 192.168.166.45
Discovered open port 445/tcp on 192.168.166.45
Discovered open port 49155/tcp on 192.168.166.45
Discovered open port 49152/tcp on 192.168.166.45
Discovered open port 3573/tcp on 192.168.166.45
Discovered open port 49153/tcp on 192.168.166.45
Discovered open port 49158/tcp on 192.168.166.45
Discovered open port 49159/tcp on 192.168.166.45
Discovered open port 49154/tcp on 192.168.166.45
Completed Connect Scan at 21:19, 32.06s elapsed (65535 total ports)
Nmap scan report for 192.168.166.45
Host is up (0.048s latency).
Not shown: 65523 closed tcp ports (conn-refused)
PORT      STATE SERVICE
80/tcp    open  http
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
445/tcp   open  microsoft-ds
3389/tcp  open  ms-wbt-server
3573/tcp  open  tag-ups-1
49152/tcp open  unknown
49153/tcp open  unknown
49154/tcp open  unknown
49155/tcp open  unknown
49158/tcp open  unknown
49159/tcp open  unknown

Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 32.18 seconds
$ nmap -p 80,135,139,445,2289,3573,49152-49159 -sC -sV -Pn -v 192.168.166.45
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-08-15 21:20 CDT
NSE: Loaded 156 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 21:20
Completed NSE at 21:20, 0.00s elapsed
Initiating NSE at 21:20
Completed NSE at 21:20, 0.00s elapsed
Initiating NSE at 21:20
Completed NSE at 21:20, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 21:20
Completed Parallel DNS resolution of 1 host. at 21:20, 0.02s elapsed
Initiating Connect Scan at 21:20
Scanning 192.168.166.45 [14 ports]
Discovered open port 80/tcp on 192.168.166.45
Discovered open port 135/tcp on 192.168.166.45
Discovered open port 49159/tcp on 192.168.166.45
Discovered open port 3573/tcp on 192.168.166.45
Discovered open port 49153/tcp on 192.168.166.45
Discovered open port 49158/tcp on 192.168.166.45
Discovered open port 49152/tcp on 192.168.166.45
Discovered open port 49155/tcp on 192.168.166.45
Discovered open port 49154/tcp on 192.168.166.45
Discovered open port 445/tcp on 192.168.166.45
Discovered open port 139/tcp on 192.168.166.45
Completed Connect Scan at 21:20, 1.15s elapsed (14 total ports)
Initiating Service scan at 21:20
Scanning 11 services on 192.168.166.45
Service scan Timing: About 45.45% done; ETC: 21:22 (0:00:44 remaining)
Completed Service scan at 21:21, 59.44s elapsed (11 services on 1 host)
NSE: Script scanning 192.168.166.45.
Initiating NSE at 21:21
Completed NSE at 21:22, 8.36s elapsed
Initiating NSE at 21:22
Completed NSE at 21:22, 0.55s elapsed
Initiating NSE at 21:22
Completed NSE at 21:22, 0.00s elapsed
Nmap scan report for 192.168.166.45
Host is up (0.082s latency).

PORT      STATE  SERVICE      VERSION
80/tcp    open   http         GoAhead WebServer
| http-methods: 
|_  Supported Methods: GET HEAD
|_http-server-header: GoAhead-Webs
| http-title: HP Power Manager
|_Requested resource was http://192.168.166.45/index.asp
135/tcp   open   msrpc        Microsoft Windows RPC
139/tcp   open   netbios-ssn  Microsoft Windows netbios-ssn
445/tcp   open   microsoft-ds Windows 7 Ultimate N 7600 microsoft-ds (workgroup: WORKGROUP)
2289/tcp  closed dict-lookup
3573/tcp  open   tag-ups-1?
49152/tcp open   msrpc        Microsoft Windows RPC
49153/tcp open   msrpc        Microsoft Windows RPC
49154/tcp open   msrpc        Microsoft Windows RPC
49155/tcp open   msrpc        Microsoft Windows RPC
49156/tcp closed unknown
49157/tcp closed unknown
49158/tcp open   msrpc        Microsoft Windows RPC
49159/tcp open   msrpc        Microsoft Windows RPC
Service Info: Host: KEVIN; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-time: 
|   date: 2024-08-16T02:21:53
|_  start_date: 2024-08-16T02:19:01
| nbstat: NetBIOS name: KEVIN, NetBIOS user: <unknown>, NetBIOS MAC: 00:50:56:86:a6:fe (VMware)
| Names:
|   KEVIN<00>            Flags: <unique><active>
|   WORKGROUP<00>        Flags: <group><active>
|   WORKGROUP<1e>        Flags: <group><active>
|   KEVIN<20>            Flags: <unique><active>
|   WORKGROUP<1d>        Flags: <unique><active>
|_  \x01\x02__MSBROWSE__\x02<01>  Flags: <group><active>
| smb-security-mode: 
|   account_used: guest
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled (dangerous, but default)
| smb-os-discovery: 
|   OS: Windows 7 Ultimate N 7600 (Windows 7 Ultimate N 6.1)
|   OS CPE: cpe:/o:microsoft:windows_7::-
|   Computer name: kevin
|   NetBIOS computer name: KEVIN\x00
|   Workgroup: WORKGROUP\x00
|_  System time: 2024-08-15T19:21:53-07:00
|_clock-skew: mean: 2h19m59s, deviation: 4h02m29s, median: -1s
| smb2-security-mode: 
|   2:1:0: 
|_    Message signing enabled but not required

NSE: Script Post-scanning.
Initiating NSE at 21:22
Completed NSE at 21:22, 0.00s elapsed
Initiating NSE at 21:22
Completed NSE at 21:22, 0.00s elapsed
Initiating NSE at 21:22
Completed NSE at 21:22, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 70.12 seconds

Last updated