· 5 years ago · Dec 11, 2019, 09:30 AM
1Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-11 10:22 Romance Standard Time
2
3NSE: Loaded 151 scripts for scanning.
4
5NSE: Script Pre-scanning.
6
7Initiating NSE at 10:22
8
9Completed NSE at 10:22, 0.00s elapsed
10
11Initiating NSE at 10:22
12
13Completed NSE at 10:22, 0.00s elapsed
14
15Initiating NSE at 10:22
16
17Completed NSE at 10:22, 0.00s elapsed
18
19Initiating ARP Ping Scan at 10:22
20
21Nmap scan report for 192.168.1.0 [host down]
22
23P Ping Scan at 10:22, 2.86s elapsed (255 total hosts)
24
25Initiating Parallel DNS resolution of 255 hosts. at 10:22
26
27Completed Parallel DNS resolution of 255 hosts. at 10:22, 0.03s elapsed
28
29Nmap scan report for 192.168.1.3 [host down]
30
31Nmap scan report for 192.168.1.4 [host down]
32
33Nmap scan report for 192.168.1.5 [host down]
34
35Nmap scan report for 192.168.1.6 [host down]
36
37Nmap scan report for 192.168.1.7 [host down]
38
39Nmap scan report for 192.168.1.8 [host down]
40
41Nmap scan report for 192.168.1.9 [host down]
42
43Nmap scan report for 192.168.1.10 [host down]
44
45Nmap scan report for 192.168.1.11 [host down]
46
47Nmap scan report for 192.168.1.12 [host down]
48
49Nmap scan report for 192.168.1.13 [host down]
50
51Nmap scan report for 192.168.1.14 [host down]
52
53Nmap scan report for 192.168.1.15 [host down]
54
55Nmap scan report for 192.168.1.16 [host down]
56
57Nmap scan report for 192.168.1.17 [host down]
58
59Nmap scan report for 192.168.1.18 [host down]
60
61Nmap scan report for 192.168.1.19 [host down]
62
63Nmap scan report for 192.168.1.20 [host down]
64
65Nmap scan report for 192.168.1.21 [host down]
66
67Nmap scan report for 192.168.1.22 [host down]
68
69Nmap scan report for 192.168.1.23 [host down]
70
71Nmap scan report for 192.168.1.24 [host down]
72
73Nmap scan report for 192.168.1.25 [host down]
74
75Nmap scan report for 192.168.1.26 [host down]
76
77Nmap scan report for 192.168.1.27 [host down]
78
79Nmap scan report for 192.168.1.28 [host down]
80
81Nmap scan report for 192.168.1.29 [host down]
82
83Nmap scan report for 192.168.1.30 [host down]
84
85Nmap scan report for 192.168.1.31 [host down]
86
87Nmap scan report for 192.168.1.32 [host down]
88
89Nmap scan report for 192.168.1.33 [host down]
90
91Nmap scan report for 192.168.1.34 [host down]
92
93Nmap scan report for 192.168.1.35 [host down]
94
95Nmap scan report for 192.168.1.36 [host down]
96
97Nmap scan report for 192.168.1.37 [host down]
98
99Nmap scan report for 192.168.1.38 [host down]
100
101Nmap scan report for 192.168.1.39 [host down]
102
103Nmap scan report for 192.168.1.40 [host down]
104
105Nmap scan report for 192.168.1.41 [host down]
106
107Nmap scan report for 192.168.1.42 [host down]
108
109Nmap scan report for 192.168.1.43 [host down]
110
111Nmap scan report for 192.168.1.44 [host down]
112
113Nmap scan report for 192.168.1.45 [host down]
114
115Nmap scan report for 192.168.1.46 [host down]
116
117Nmap scan report for 192.168.1.47 [host down]
118
119Nmap scan report for 192.168.1.48 [host down]
120
121Nmap scan report for 192.168.1.49 [host down]
122
123Nmap scan report for 192.168.1.50 [host down]
124
125Nmap scan report for 192.168.1.51 [host down]
126
127Nmap scan report for 192.168.1.52 [host down]
128
129Nmap scan report for 192.168.1.53 [host down]
130
131Nmap scan report for 192.168.1.54 [host down]
132
133Nmap scan report for 192.168.1.55 [host down]
134
135Nmap scan report for 192.168.1.56 [host down]
136
137Nmap scan report for 192.168.1.57 [host down]
138
139Nmap scan report for 192.168.1.58 [host down]
140
141Nmap scan report for 192.168.1.59 [host down]
142
143Nmap scan report for 192.168.1.60 [host down]
144
145Nmap scan report for 192.168.1.61 [host down]
146
147Nmap scan report for 192.168.1.62 [host down]
148
149Nmap scan report for 192.168.1.63 [host down]
150
151Nmap scan report for 192.168.1.64 [host down]
152
153Nmap scan report for 192.168.1.65 [host down]
154
155Nmap scan report for 192.168.1.66 [host down]
156
157Nmap scan report for 192.168.1.67 [host down]
158
159Nmap scan report for 192.168.1.68 [host down]
160
161Nmap scan report for 192.168.1.69 [host down]
162
163Nmap scan report for 192.168.1.70 [host down]
164
165Nmap scan report for 192.168.1.71 [host down]
166
167Nmap scan report for 192.168.1.72 [host down]
168
169Nmap scan report for 192.168.1.73 [host down]
170
171Nmap scan report for 192.168.1.74 [host down]
172
173Nmap scan report for 192.168.1.75 [host down]
174
175Nmap scan report for 192.168.1.76 [host down]
176
177Nmap scan report for 192.168.1.77 [host down]
178
179Nmap scan report for 192.168.1.78 [host down]
180
181Nmap scan report for 192.168.1.79 [host down]
182
183Nmap scan report for 192.168.1.80 [host down]
184
185Nmap scan report for 192.168.1.81 [host down]
186
187Nmap scan report for 192.168.1.82 [host down]
188
189Nmap scan report for 192.168.1.83 [host down]
190
191Nmap scan report for 192.168.1.84 [host down]
192
193Nmap scan report for 192.168.1.85 [host down]
194
195Nmap scan report for 192.168.1.86 [host down]
196
197Nmap scan report for 192.168.1.87 [host down]
198
199Nmap scan report for 192.168.1.88 [host down]
200
201Nmap scan report for 192.168.1.89 [host down]
202
203Nmap scan report for 192.168.1.90 [host down]
204
205Nmap scan report for 192.168.1.91 [host down]
206
207Nmap scan report for 192.168.1.92 [host down]
208
209Nmap scan report for 192.168.1.93 [host down]
210
211Nmap scan report for 192.168.1.94 [host down]
212
213Nmap scan report for 192.168.1.95 [host down]
214
215Nmap scan report for 192.168.1.96 [host down]
216
217Nmap scan report for 192.168.1.97 [host down]
218
219Nmap scan report for 192.168.1.98 [host down]
220
221Nmap scan report for 192.168.1.99 [host down]
222
223Nmap scan report for 192.168.1.104 [host down]
224
225Nmap scan report for 192.168.1.105 [host down]
226
227Nmap scan report for 192.168.1.106 [host down]
228
229Nmap scan report for 192.168.1.107 [host down]
230
231Nmap scan report for 192.168.1.108 [host down]
232
233Nmap scan report for 192.168.1.109 [host down]
234
235Nmap scan report for 192.168.1.110 [host down]
236
237Nmap scan report for 192.168.1.111 [host down]
238
239Nmap scan report for 192.168.1.112 [host down]
240
241Nmap scan report for 192.168.1.113 [host down]
242
243Nmap scan report for 192.168.1.114 [host down]
244
245Nmap scan report for 192.168.1.115 [host down]
246
247Nmap scan report for 192.168.1.116 [host down]
248
249Nmap scan report for 192.168.1.117 [host down]
250
251Nmap scan report for 192.168.1.118 [host down]
252
253Nmap scan report for 192.168.1.119 [host down]
254
255Nmap scan report for 192.168.1.120 [host down]
256
257Nmap scan report for 192.168.1.121 [host down]
258
259Nmap scan report for 192.168.1.122 [host down]
260
261Nmap scan report for 192.168.1.123 [host down]
262
263Nmap scan report for 192.168.1.124 [host down]
264
265Nmap scan report for 192.168.1.125 [host down]
266
267Nmap scan report for 192.168.1.126 [host down]
268
269Nmap scan report for 192.168.1.127 [host down]
270
271Nmap scan report for 192.168.1.128 [host down]
272
273Nmap scan report for 192.168.1.129 [host down]
274
275Nmap scan report for 192.168.1.130 [host down]
276
277Nmap scan report for 192.168.1.131 [host down]
278
279Nmap scan report for 192.168.1.132 [host down]
280
281Nmap scan report for 192.168.1.133 [host down]
282
283Nmap scan report for 192.168.1.134 [host down]
284
285Nmap scan report for 192.168.1.135 [host down]
286
287Nmap scan report for 192.168.1.136 [host down]
288
289Nmap scan report for 192.168.1.137 [host down]
290
291Nmap scan report for 192.168.1.138 [host down]
292
293Nmap scan report for 192.168.1.139 [host down]
294
295Nmap scan report for 192.168.1.140 [host down]
296
297Nmap scan report for 192.168.1.141 [host down]
298
299Nmap scan report for 192.168.1.142 [host down]
300
301Nmap scan report for 192.168.1.143 [host down]
302
303Nmap scan report for 192.168.1.144 [host down]
304
305Nmap scan report for 192.168.1.145 [host down]
306
307Nmap scan report for 192.168.1.146 [host down]
308
309Nmap scan report for 192.168.1.147 [host down]
310
311Nmap scan report for 192.168.1.148 [host down]
312
313Nmap scan report for 192.168.1.149 [host down]
314
315Nmap scan report for 192.168.1.150 [host down]
316
317Nmap scan report for 192.168.1.151 [host down]
318
319Nmap scan report for 192.168.1.152 [host down]
320
321Nmap scan report for 192.168.1.153 [host down]
322
323Nmap scan report for 192.168.1.154 [host down]
324
325Nmap scan report for 192.168.1.155 [host down]
326
327Nmap scan report for 192.168.1.156 [host down]
328
329Nmap scan report for 192.168.1.157 [host down]
330
331Nmap scan report for 192.168.1.158 [host down]
332
333Nmap scan report for 192.168.1.159 [host down]
334
335Nmap scan report for 192.168.1.160 [host down]
336
337Nmap scan report for 192.168.1.161 [host down]
338
339Nmap scan report for 192.168.1.162 [host down]
340
341Nmap scan report for 192.168.1.163 [host down]
342
343Nmap scan report for 192.168.1.164 [host down]
344
345Nmap scan report for 192.168.1.165 [host down]
346
347Nmap scan report for 192.168.1.166 [host down]
348
349Nmap scan report for 192.168.1.167 [host down]
350
351Nmap scan report for 192.168.1.168 [host down]
352
353Nmap scan report for 192.168.1.169 [host down]
354
355Nmap scan report for 192.168.1.170 [host down]
356
357Nmap scan report for 192.168.1.171 [host down]
358
359Nmap scan report for 192.168.1.172 [host down]
360
361Nmap scan report for 192.168.1.173 [host down]
362
363Nmap scan report for 192.168.1.174 [host down]
364
365Nmap scan report for 192.168.1.175 [host down]
366
367Nmap scan report for 192.168.1.176 [host down]
368
369Nmap scan report for 192.168.1.177 [host down]
370
371Nmap scan report for 192.168.1.178 [host down]
372
373Nmap scan report for 192.168.1.179 [host down]
374
375Nmap scan report for 192.168.1.180 [host down]
376
377Nmap scan report for 192.168.1.181 [host down]
378
379Nmap scan report for 192.168.1.182 [host down]
380
381Nmap scan report for 192.168.1.183 [host down]
382
383Nmap scan report for 192.168.1.184 [host down]
384
385Nmap scan report for 192.168.1.185 [host down]
386
387Nmap scan report for 192.168.1.186 [host down]
388
389Nmap scan report for 192.168.1.187 [host down]
390
391Nmap scan report for 192.168.1.188 [host down]
392
393Nmap scan report for 192.168.1.189 [host down]
394
395Nmap scan report for 192.168.1.190 [host down]
396
397Nmap scan report for 192.168.1.191 [host down]
398
399Nmap scan report for 192.168.1.192 [host down]
400
401Nmap scan report for 192.168.1.193 [host down]
402
403Nmap scan report for 192.168.1.194 [host down]
404
405Nmap scan report for 192.168.1.195 [host down]
406
407Nmap scan report for 192.168.1.196 [host down]
408
409Nmap scan report for 192.168.1.197 [host down]
410
411Nmap scan report for 192.168.1.198 [host down]
412
413Nmap scan report for 192.168.1.199 [host down]
414
415Nmap scan report for 192.168.1.200 [host down]
416
417Nmap scan report for 192.168.1.201 [host down]
418
419Nmap scan report for 192.168.1.202 [host down]
420
421Nmap scan report for 192.168.1.203 [host down]
422
423Nmap scan report for 192.168.1.204 [host down]
424
425Nmap scan report for 192.168.1.205 [host down]
426
427Nmap scan report for 192.168.1.206 [host down]
428
429Nmap scan report for 192.168.1.207 [host down]
430
431Nmap scan report for 192.168.1.208 [host down]
432
433Nmap scan report for 192.168.1.209 [host down]
434
435Nmap scan report for 192.168.1.210 [host down]
436
437Nmap scan report for 192.168.1.211 [host down]
438
439Nmap scan report for 192.168.1.212 [host down]
440
441Nmap scan report for 192.168.1.213 [host down]
442
443Nmap scan report for 192.168.1.214 [host down]
444
445Nmap scan report for 192.168.1.215 [host down]
446
447Nmap scan report for 192.168.1.216 [host down]
448
449Nmap scan report for 192.168.1.217 [host down]
450
451Nmap scan report for 192.168.1.218 [host down]
452
453Nmap scan report for 192.168.1.219 [host down]
454
455Nmap scan report for 192.168.1.220 [host down]
456
457Nmap scan report for 192.168.1.221 [host down]
458
459Nmap scan report for 192.168.1.222 [host down]
460
461Nmap scan report for 192.168.1.223 [host down]
462
463Nmap scan report for 192.168.1.224 [host down]
464
465Nmap scan report for 192.168.1.225 [host down]
466
467Nmap scan report for 192.168.1.226 [host down]
468
469Nmap scan report for 192.168.1.227 [host down]
470
471Nmap scan report for 192.168.1.228 [host down]
472
473Nmap scan report for 192.168.1.229 [host down]
474
475Nmap scan report for 192.168.1.230 [host down]
476
477Nmap scan report for 192.168.1.231 [host down]
478
479Nmap scan report for 192.168.1.232 [host down]
480
481Nmap scan report for 192.168.1.233 [host down]
482
483Nmap scan report for 192.168.1.234 [host down]
484
485Nmap scan report for 192.168.1.235 [host down]
486
487Nmap scan report for 192.168.1.236 [host down]
488
489Nmap scan report for 192.168.1.237 [host down]
490
491Nmap scan report for 192.168.1.238 [host down]
492
493Nmap scan report for 192.168.1.239 [host down]
494
495Nmap scan report for 192.168.1.240 [host down]
496
497Nmap scan report for 192.168.1.241 [host down]
498
499Nmap scan report for 192.168.1.242 [host down]
500
501Nmap scan report for 192.168.1.243 [host down]
502
503Nmap scan report for 192.168.1.244 [host down]
504
505Nmap scan report for 192.168.1.245 [host down]
506
507Nmap scan report for 192.168.1.246 [host down]
508
509Nmap scan report for 192.168.1.247 [host down]
510
511Nmap scan report for 192.168.1.248 [host down]
512
513Nmap scan report for 192.168.1.249 [host down]
514
515Nmap scan report for 192.168.1.250 [host down]
516
517Nmap scan report for 192.168.1.251 [host down]
518
519Nmap scan report for 192.168.1.252 [host down]
520
521Nmap scan report for 192.168.1.253 [host down]
522
523Nmap scan report for 192.168.1.254 [host down]
524
525Nmap scan report for 192.168.1.255 [host down]
526
527Initiating Parallel DNS resolution of 1 host. at 10:22
528
529Completed Parallel DNS resolution of 1 host. at 10:22, 0.02s elapsed
530
531Initiating SYN Stealth Scan at 10:22
532
533Scanning 5 hosts [1000 ports/host]
534
535Discovered open port 22/tcp on 192.168.1.102
536
537Discovered open port 22/tcp on 192.168.1.103
538
539Discovered open port 22/tcp on 192.168.1.100
540
541Discovered open port 22/tcp on 192.168.1.2
542
543Discovered open port 21/tcp on 192.168.1.2
544
545Discovered open port 443/tcp on 192.168.1.2
546
547Discovered open port 53/tcp on 192.168.1.2
548
549Discovered open port 80/tcp on 192.168.1.2
550
551Discovered open port 5432/tcp on 192.168.1.2
552
553Completed SYN Stealth Scan against 192.168.1.2 in 0.28s (4 hosts left)
554
555Completed SYN Stealth Scan against 192.168.1.100 in 0.28s (3 hosts left)
556
557Discovered open port 139/tcp on 192.168.1.102
558
559Discovered open port 3389/tcp on 192.168.1.102
560
561Discovered open port 135/tcp on 192.168.1.102
562
563Discovered open port 445/tcp on 192.168.1.102
564
565Discovered open port 3389/tcp on 192.168.1.103
566
567Discovered open port 1022/tcp on 192.168.1.1
568
569Discovered open port 1443/tcp on 192.168.1.1
570
571Completed SYN Stealth Scan against 192.168.1.1 in 7.19s (2 hosts left)
572
573Completed SYN Stealth Scan against 192.168.1.102 in 7.31s (1 host left)
574
575Completed SYN Stealth Scan at 10:22, 7.42s elapsed (5000 total ports)
576
577Initiating Service scan at 10:22
578
579Scanning 16 services on 5 hosts
580
581Completed Service scan at 10:23, 12.11s elapsed (16 services on 5 hosts)
582
583Initiating OS detection (try #1) against 5 hosts
584
585Retrying OS detection (try #2) against 3 hosts
586
587NSE: Script scanning 5 hosts.
588
589Initiating NSE at 10:23
590
591Completed NSE at 10:23, 49.44s elapsed
592
593Initiating NSE at 10:23
594
595Completed NSE at 10:23, 0.94s elapsed
596
597Initiating NSE at 10:23
598
599Completed NSE at 10:23, 0.00s elapsed
600
601Nmap scan report for 192.168.1.1
602
603Host is up (0.00s latency).
604
605Not shown: 998 filtered ports
606
607PORT STATE SERVICE VERSION
608
6091022/tcp open ssh OpenSSH 7.5 (protocol 2.0)
610
611| ssh-hostkey:
612
613| 4096 3d:81:b9:4d:0a:5f:1f:6e:87:63:06:b7:d4:13:48:21 (RSA)
614
615|_ 256 b6:af:c8:04:02:ff:66:6d:32:21:99:83:02:e8:63:3f (ED25519)
616
6171443/tcp open ssl/http nginx
618
619|_http-favicon: Unknown favicon MD5: 5567E9CE23E5549E0FCD7195F3882816
620
621| http-methods:
622
623|_ Supported Methods: GET HEAD POST
624
625|_http-title: Login
626
627| ssl-cert: Subject: commonName=pfSense-5dea350f7fd42/organizationName=pfSense webConfigurator Self-Signed Certificate
628
629| Subject Alternative Name: DNS:pfSense-5dea350f7fd42
630
631| Issuer: commonName=pfSense-5dea350f7fd42/organizationName=pfSense webConfigurator Self-Signed Certificate
632
633| Public Key type: rsa
634
635| Public Key bits: 2048
636
637| Signature Algorithm: sha256WithRSAEncryption
638
639| Not valid before: 2019-12-06T11:01:35
640
641| Not valid after: 2025-05-28T11:01:35
642
643| MD5: edd5 82f4 8b8b ef88 42f8 5256 83f2 4872
644
645|_SHA-1: 121b 98e3 494d fc30 3105 d930 003c 0439 f94e d075
646
647|_ssl-date: TLS randomness does not represent time
648
649| tls-alpn:
650
651| h2
652
653|_ http/1.1
654
655| tls-nextprotoneg:
656
657| h2
658
659|_ http/1.1
660
661MAC Address: 00:50:56:B2:FD:D0 (VMware)
662
663Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
664
665OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
666
667No OS matches for host
668
669Uptime guess: 0.001 days (since Wed Dec 11 10:23:04 2019)
670
671Network Distance: 1 hop
672
673TCP Sequence Prediction: Difficulty=262 (Good luck!)
674
675IP ID Sequence Generation: All zeros
676
677
678
679TRACEROUTE
680
681HOP RTT ADDRESS
682
6831 0.00 ms 192.168.1.1
684
685
686
687Nmap scan report for facecat.be (192.168.1.2)
688
689Host is up (0.00s latency).
690
691Not shown: 994 closed ports
692
693PORT STATE SERVICE VERSION
694
69521/tcp open ftp vsftpd 3.0.3
696
69722/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u7 (protocol 2.0)
698
699| ssh-hostkey:
700
701| 2048 b0:1a:ce:63:08:6e:b0:34:e8:97:c6:2e:cb:5d:f4:ad (RSA)
702
703| 256 71:57:0c:ec:a2:a3:b6:aa:22:58:ef:1f:c1:52:4d:55 (ECDSA)
704
705|_ 256 80:94:49:dd:33:29:2d:89:1a:9f:e2:a7:09:cc:3d:96 (ED25519)
706
70753/tcp open domain dnsmasq 2.76
708
709| dns-nsid:
710
711|_ bind.version: dnsmasq-2.76
712
71380/tcp open http nginx
714
715|_http-favicon: Unknown favicon MD5: F7E3D97F404E71D302B3239EEF48D5F2
716
717| http-methods:
718
719|_ Supported Methods: GET HEAD POST OPTIONS
720
721| http-robots.txt: 55 disallowed entries (15 shown)
722
723| / /autocomplete/users /search /api /admin /profile
724
725| /dashboard /projects/new /groups/new /groups/*/edit /users /help
726
727|_/s/ /snippets/new /snippets/*/edit
728
729| http-title: Sign in \xC2\xB7 GitLab
730
731|_Requested resource was http://facecat.be/users/sign_in
732
733|_http-trane-info: Problem with XML parsing of /evox/about
734
735443/tcp open ssl/http Apache httpd 2.4.25 ((Debian))
736
737| http-git:
738
739| 192.168.1.2:443/.git/
740
741| Git repository found!
742
743| .git/COMMIT_EDITMSG matched patterns 'bug'
744
745| Repository description: Unnamed repository; edit this file 'description' to name the...
746
747| Last commit message: bugfix # Please enter the commit message for your changes. L...
748
749| Remotes:
750
751|_ http://gitlab.miauw.be/root/facecat.git
752
753| http-methods:
754
755|_ Supported Methods: GET HEAD POST OPTIONS
756
757|_http-server-header: Apache/2.4.25 (Debian)
758
759| http-title: Bienvenue sur facecat.be !
760
761|_Requested resource was login.php
762
763| ssl-cert: Subject: commonName=server
764
765| Subject Alternative Name: DNS:server
766
767| Issuer: commonName=server
768
769| Public Key type: rsa
770
771| Public Key bits: 2048
772
773| Signature Algorithm: sha256WithRSAEncryption
774
775| Not valid before: 2019-12-10T19:52:17
776
777| Not valid after: 2029-12-07T19:52:17
778
779| MD5: 1fe7 38ec cf0d 1753 9df2 fef7 174f 8614
780
781|_SHA-1: 7400 4f9b db2b 2780 2c24 f2c9 57c0 abd3 554a 3293
782
783|_ssl-date: TLS randomness does not represent time
784
785| tls-alpn:
786
787|_ http/1.1
788
7895432/tcp open postgresql PostgreSQL DB 9.6.4 - 9.6.6
790
791| ssl-cert: Subject: commonName=server
792
793| Subject Alternative Name: DNS:server
794
795| Issuer: commonName=server
796
797| Public Key type: rsa
798
799| Public Key bits: 2048
800
801| Signature Algorithm: sha256WithRSAEncryption
802
803| Not valid before: 2019-12-10T19:52:17
804
805| Not valid after: 2029-12-07T19:52:17
806
807| MD5: 1fe7 38ec cf0d 1753 9df2 fef7 174f 8614
808
809|_SHA-1: 7400 4f9b db2b 2780 2c24 f2c9 57c0 abd3 554a 3293
810
811|_ssl-date: TLS randomness does not represent time
812
813MAC Address: 00:50:56:B2:3D:6F (VMware)
814
815Device type: general purpose
816
817Running: Linux 3.X|4.X
818
819OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
820
821OS details: Linux 3.2 - 4.9
822
823Uptime guess: 0.075 days (since Wed Dec 11 08:35:46 2019)
824
825Network Distance: 1 hop
826
827TCP Sequence Prediction: Difficulty=260 (Good luck!)
828
829IP ID Sequence Generation: All zeros
830
831Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
832
833
834
835TRACEROUTE
836
837HOP RTT ADDRESS
838
8391 0.00 ms facecat.be (192.168.1.2)
840
841
842
843Nmap scan report for 192.168.1.100
844
845Host is up (0.00s latency).
846
847Not shown: 999 closed ports
848
849PORT STATE SERVICE VERSION
850
85122/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
852
853| ssh-hostkey:
854
855| 2048 2f:0c:8a:63:49:99:03:b3:f7:dc:9f:27:91:a4:67:19 (RSA)
856
857| 256 67:ac:69:23:52:2b:13:d5:57:47:96:0b:c2:87:5f:86 (ECDSA)
858
859|_ 256 f8:ec:a7:08:60:4a:10:5c:c9:33:84:5a:76:02:ac:71 (ED25519)
860
861MAC Address: 00:50:56:B2:93:8C (VMware)
862
863Device type: general purpose
864
865Running: Linux 3.X|4.X
866
867OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
868
869OS details: Linux 3.2 - 4.9
870
871Uptime guess: 28.363 days (since Wed Nov 13 01:41:41 2019)
872
873Network Distance: 1 hop
874
875TCP Sequence Prediction: Difficulty=256 (Good luck!)
876
877IP ID Sequence Generation: All zeros
878
879Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
880
881
882
883TRACEROUTE
884
885HOP RTT ADDRESS
886
8871 0.00 ms 192.168.1.100
888
889
890
891Nmap scan report for 192.168.1.102
892
893Host is up (0.00s latency).
894
895Not shown: 995 filtered ports
896
897PORT STATE SERVICE VERSION
898
89922/tcp open ssh OpenSSH for_Windows_7.6 (protocol 2.0)
900
901| ssh-hostkey:
902
903| 2048 78:bb:9d:99:a9:b2:48:6b:a6:97:59:39:ac:33:f3:8e (RSA)
904
905| 256 a7:4d:6b:b3:06:c3:f2:0c:50:30:16:c5:18:d4:5c:e1 (ECDSA)
906
907|_ 256 7f:47:c1:cb:b2:e7:e9:f6:67:f0:28:ae:b1:50:d4:56 (ED25519)
908
909135/tcp open msrpc Microsoft Windows RPC
910
911139/tcp open netbios-ssn Microsoft Windows netbios-ssn
912
913445/tcp open microsoft-ds?
914
9153389/tcp open ms-wbt-server Microsoft Terminal Services
916
917| rdp-ntlm-info:
918
919| Target_Name: BOB-DESKTOP
920
921| NetBIOS_Domain_Name: BOB-DESKTOP
922
923| NetBIOS_Computer_Name: BOB-DESKTOP
924
925| DNS_Domain_Name: Bob-Desktop
926
927| DNS_Computer_Name: Bob-Desktop
928
929| Product_Version: 10.0.17134
930
931|_ System_Time: 2019-12-11T09:23:11+00:00
932
933| ssl-cert: Subject: commonName=Bob-Desktop
934
935| Issuer: commonName=Bob-Desktop
936
937| Public Key type: rsa
938
939| Public Key bits: 2048
940
941| Signature Algorithm: sha256WithRSAEncryption
942
943| Not valid before: 2019-12-09T17:34:20
944
945| Not valid after: 2020-06-09T17:34:20
946
947| MD5: e907 a120 2cca 37f7 e031 c036 c617 4695
948
949|_SHA-1: 76ac 956c c1db d75f 3c26 cbcd c209 eb54 3db0 e6e9
950
951|_ssl-date: 2019-12-11T09:23:56+00:00; 0s from scanner time.
952
953MAC Address: 00:50:56:B2:EB:E3 (VMware)
954
955Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
956
957Device type: general purpose
958
959Running (JUST GUESSING): Microsoft Windows XP|7|2008 (87%)
960
961OS CPE: cpe:/o:microsoft:windows_xp::sp2 cpe:/o:microsoft:windows_7 cpe:/o:microsoft:windows_server_2008::sp1 cpe:/o:microsoft:windows_server_2008:r2
962
963Aggressive OS guesses: Microsoft Windows XP SP2 (87%), Microsoft Windows 7 (85%), Microsoft Windows Server 2008 SP1 or Windows Server 2008 R2 (85%)
964
965No exact OS matches for host (test conditions non-ideal).
966
967Network Distance: 1 hop
968
969TCP Sequence Prediction: Difficulty=263 (Good luck!)
970
971IP ID Sequence Generation: Incremental
972
973Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
974
975
976
977Host script results:
978
979| nbstat: NetBIOS name: BOB-DESKTOP, NetBIOS user: <unknown>, NetBIOS MAC: 00:50:56:b2:eb:e3 (VMware)
980
981| Names:
982
983| BOB-DESKTOP<00> Flags: <unique><active>
984
985| WORKGROUP<00> Flags: <group><active>
986
987|_ BOB-DESKTOP<20> Flags: <unique><active>
988
989| smb2-security-mode:
990
991| 2.02:
992
993|_ Message signing enabled but not required
994
995| smb2-time:
996
997| date: 2019-12-11T09:23:14
998
999|_ start_date: N/A
1000
1001
1002
1003TRACEROUTE
1004
1005HOP RTT ADDRESS
1006
10071 0.00 ms 192.168.1.102
1008
1009
1010
1011Nmap scan report for 192.168.1.103
1012
1013Host is up (0.00s latency).
1014
1015Not shown: 998 filtered ports
1016
1017PORT STATE SERVICE VERSION
1018
101922/tcp open ssh OpenSSH for_Windows_7.6 (protocol 2.0)
1020
1021| ssh-hostkey:
1022
1023| 2048 78:bb:9d:99:a9:b2:48:6b:a6:97:59:39:ac:33:f3:8e (RSA)
1024
1025| 256 a7:4d:6b:b3:06:c3:f2:0c:50:30:16:c5:18:d4:5c:e1 (ECDSA)
1026
1027|_ 256 7f:47:c1:cb:b2:e7:e9:f6:67:f0:28:ae:b1:50:d4:56 (ED25519)
1028
10293389/tcp open ms-wbt-server Microsoft Terminal Services
1030
1031| rdp-ntlm-info:
1032
1033| Target_Name: CHARLIE-DESKTOP
1034
1035| NetBIOS_Domain_Name: CHARLIE-DESKTOP
1036
1037| NetBIOS_Computer_Name: CHARLIE-DESKTOP
1038
1039| DNS_Domain_Name: Charlie-Desktop
1040
1041| DNS_Computer_Name: Charlie-Desktop
1042
1043| Product_Version: 10.0.17134
1044
1045|_ System_Time: 2019-12-11T09:23:15+00:00
1046
1047| ssl-cert: Subject: commonName=Charlie-Desktop
1048
1049| Issuer: commonName=Charlie-Desktop
1050
1051| Public Key type: rsa
1052
1053| Public Key bits: 2048
1054
1055| Signature Algorithm: sha256WithRSAEncryption
1056
1057| Not valid before: 2019-12-09T17:34:41
1058
1059| Not valid after: 2020-06-09T17:34:41
1060
1061| MD5: 815d 7b98 0720 7485 cad5 2c0c e632 983e
1062
1063|_SHA-1: 2b11 1be2 8489 ee97 74e3 013c 7a98 0510 2b32 b7a9
1064
1065|_ssl-date: 2019-12-11T09:23:56+00:00; 0s from scanner time.
1066
1067MAC Address: 00:50:56:B2:5C:AC (VMware)
1068
1069Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1070
1071Device type: specialized|general purpose
1072
1073Running (JUST GUESSING): AVtech embedded (87%), Microsoft Windows XP (87%), FreeBSD 6.X|10.X (86%)
1074
1075OS CPE: cpe:/o:microsoft:windows_xp::sp2 cpe:/o:freebsd:freebsd:6.2 cpe:/o:freebsd:freebsd:10.3
1076
1077Aggressive OS guesses: AVtech Room Alert 26W environmental monitor (87%), Microsoft Windows XP SP2 (87%), FreeBSD 6.2-RELEASE (86%), FreeBSD 10.3-STABLE (85%)
1078
1079No exact OS matches for host (test conditions non-ideal).
1080
1081Network Distance: 1 hop
1082
1083TCP Sequence Prediction: Difficulty=265 (Good luck!)
1084
1085IP ID Sequence Generation: Incremental
1086
1087Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1088
1089
1090
1091TRACEROUTE
1092
1093HOP RTT ADDRESS
1094
10951 0.00 ms 192.168.1.103
1096
1097
1098
1099Initiating SYN Stealth Scan at 10:23
1100
1101Scanning 192.168.1.101 [1000 ports]
1102
1103Discovered open port 22/tcp on 192.168.1.101
1104
1105Discovered open port 139/tcp on 192.168.1.101
1106
1107Discovered open port 3389/tcp on 192.168.1.101
1108
1109Discovered open port 135/tcp on 192.168.1.101
1110
1111Discovered open port 445/tcp on 192.168.1.101
1112
1113Completed SYN Stealth Scan at 10:23, 0.05s elapsed (1000 total ports)
1114
1115Initiating Service scan at 10:23
1116
1117Scanning 5 services on 192.168.1.101
1118
1119Completed Service scan at 10:24, 52.14s elapsed (5 services on 1 host)
1120
1121Initiating OS detection (try #1) against 192.168.1.101
1122
1123Retrying OS detection (try #2) against 192.168.1.101
1124
1125Retrying OS detection (try #3) against 192.168.1.101
1126
1127Retrying OS detection (try #4) against 192.168.1.101
1128
1129Retrying OS detection (try #5) against 192.168.1.101
1130
1131NSE: Script scanning 192.168.1.101.
1132
1133Initiating NSE at 10:24
1134
1135Completed NSE at 10:26, 77.88s elapsed
1136
1137Initiating NSE at 10:26
1138
1139Completed NSE at 10:27, 60.03s elapsed
1140
1141Initiating NSE at 10:27
1142
1143Completed NSE at 10:27, 0.00s elapsed
1144
1145Nmap scan report for 192.168.1.101
1146
1147Host is up (0.00s latency).
1148
1149Not shown: 995 closed ports
1150
1151PORT STATE SERVICE VERSION
1152
115322/tcp open ssh OpenSSH for_Windows_7.6 (protocol 2.0)
1154
1155| ssh-hostkey:
1156
1157|_ 256 7f:47:c1:cb:b2:e7:e9:f6:67:f0:28:ae:b1:50:d4:56 (ED25519)
1158
1159135/tcp open tcpwrapped
1160
1161139/tcp open netbios-ssn Microsoft Windows netbios-ssn
1162
1163445/tcp open microsoft-ds?
1164
11653389/tcp open ms-wbt-server Microsoft Terminal Services
1166
1167| rdp-ntlm-info:
1168
1169| Target_Name: ALICE-DESKTOP
1170
1171| NetBIOS_Domain_Name: ALICE-DESKTOP
1172
1173| NetBIOS_Computer_Name: ALICE-DESKTOP
1174
1175| DNS_Domain_Name: Alice-Desktop
1176
1177| DNS_Computer_Name: Alice-Desktop
1178
1179| Product_Version: 10.0.17134
1180
1181|_ System_Time: 2019-12-11T09:25:02+00:00
1182
1183|_ssl-date: 2019-12-11T09:26:17+00:00; 0s from scanner time.
1184
1185No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
1186
1187TCP/IP fingerprint:
1188
1189OS:SCAN(V=7.80%E=4%D=12/11%OT=22%CT=1%CU=30753%PV=Y%DS=0%DC=L%G=Y%TM=5DF0B6
1190
1191OS:75%P=i686-pc-windows-windows)SEQ(SP=FE%GCD=1%ISR=10E%TI=I%CI=I%II=I%SS=S
1192
1193OS:%TS=U)OPS(O1=M5B4NW8NNS%O2=M5B4NW8NNS%O3=M5B4NW8%O4=M5B4NW8NNS%O5=M5B4NW
1194
1195OS:8NNS%O6=M5B4NNS)WIN(W1=FFFF%W2=FFFF%W3=FFFF%W4=FFFF%W5=FFFF%W6=FF70)ECN(
1196
1197OS:R=Y%DF=Y%T=80%W=FFFF%O=M5B4NW8NNS%CC=N%Q=)T1(R=Y%DF=Y%T=80%S=O%A=S+%F=AS
1198
1199OS:%RD=0%Q=)T2(R=Y%DF=Y%T=80%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)T3(R=Y%DF=Y%T=80%W
1200
1201OS:=0%S=Z%A=O%F=AR%O=%RD=0%Q=)T4(R=Y%DF=Y%T=80%W=0%S=A%A=O%F=R%O=%RD=0%Q=)T
1202
1203OS:5(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=80%W=0%S=A%A=
1204
1205OS:O%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF
1206
1207OS:=N%T=80%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=Z%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=80
1208
1209OS:%CD=Z)
1210
1211
1212
1213Network Distance: 0 hops
1214
1215TCP Sequence Prediction: Difficulty=254 (Good luck!)
1216
1217IP ID Sequence Generation: Incremental
1218
1219Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1220
1221
1222
1223Host script results:
1224
1225| smb2-security-mode:
1226
1227| 2.10:
1228
1229|_ Message signing enabled but not required
1230
1231|_smb2-time: Protocol negotiation failed (SMB2)
1232
1233
1234
1235NSE: Script Post-scanning.
1236
1237Initiating NSE at 10:27
1238
1239Completed NSE at 10:27, 0.00s elapsed
1240
1241Initiating NSE at 10:27
1242
1243Completed NSE at 10:27, 0.00s elapsed
1244
1245Initiating NSE at 10:27
1246
1247Completed NSE at 10:27, 0.00s elapsed
1248
1249Post-scan script results:
1250
1251| clock-skew:
1252
1253| 0s:
1254
1255| 192.168.1.102
1256
1257|_ 192.168.1.101
1258
1259| ssh-hostkey: Possible duplicate hosts
1260
1261| Key 256 7f:47:c1:cb:b2:e7:e9:f6:67:f0:28:ae:b1:50:d4:56 (ED25519) used by:
1262
1263| 192.168.1.101
1264
1265| 192.168.1.102
1266
1267| 192.168.1.103
1268
1269| Key 256 a7:4d:6b:b3:06:c3:f2:0c:50:30:16:c5:18:d4:5c:e1 (ECDSA) used by:
1270
1271| 192.168.1.102
1272
1273| 192.168.1.103
1274
1275| Key 2048 78:bb:9d:99:a9:b2:48:6b:a6:97:59:39:ac:33:f3:8e (RSA) used by:
1276
1277| 192.168.1.102
1278
1279|_ 192.168.1.103
1280
1281Read data files from: C:\Program Files (x86)\Nmap
1282
1283OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
1284
1285Nmap done: 256 IP addresses (6 hosts up) scanned in 281.98 seconds
1286
1287 Raw packets sent: 9865 (443.706KB) | Rcvd: 4303 (184.732KB)