· 5 years ago · Dec 11, 2019, 09:28 AM
1Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-11 10:22 Romance Standard Time
2
3NSE: Loaded 151 scripts for scanning.
4
5NSE: Script Pre-scanning.
6
7Initiating NSE at 10:22
8
9Completed NSE at 10:22, 0.00s elapsed
10
11Initiating NSE at 10:22
12
13Completed NSE at 10:22, 0.00s elapsed
14
15Initiating NSE at 10:22
16
17Completed NSE at 10:22, 0.00s elapsed
18
19Initiating ARP Ping Scan at 10:22
20
21P Ping Scan at 10:22, 2.86s elapsed (255 total hosts)
22
23Initiating Parallel DNS resolution of 255 hosts. at 10:22
24
25Completed Parallel DNS resolution of 255 hosts. at 10:22, 0.03s elapsed
26
27Nmap scan report for 192.168.1.4 [host down]
28
29Nmap scan report for 192.168.1.5 [host down]
30
31Nmap scan report for 192.168.1.7 [host down]
32
33Nmap scan report for 192.168.1.8 [host down]
34
35Nmap scan report for 192.168.1.9 [host down]
36
37Nmap scan report for 192.168.1.15 [host down]
38
39Nmap scan report for 192.168.1.16 [host down]
40
41Nmap scan report for 192.168.1.17 [host down]
42
43Nmap scan report for 192.168.1.18 [host down]
44
45Nmap scan report for 192.168.1.19 [host down]
46
47Nmap scan report for 192.168.1.20 [host down]
48
49Nmap scan report for 192.168.1.21 [host down]
50
51Nmap scan report for 192.168.1.22 [host down]
52
53Nmap scan report for 192.168.1.23 [host down]
54
55Nmap scan report for 192.168.1.24 [host down]
56
57Nmap scan report for 192.168.1.25 [host down]
58
59Nmap scan report for 192.168.1.26 [host down]
60
61Nmap scan report for 192.168.1.27 [host down]
62
63Nmap scan report for 192.168.1.28 [host down]
64
65Nmap scan report for 192.168.1.29 [host down]
66
67Nmap scan report for 192.168.1.30 [host down]
68
69Nmap scan report for 192.168.1.31 [host down]
70
71Nmap scan report for 192.168.1.32 [host down]
72
73Nmap scan report for 192.168.1.33 [host down]
74
75Nmap scan report for 192.168.1.34 [host down]
76
77Nmap scan report for 192.168.1.35 [host down]
78
79Nmap scan report for 192.168.1.36 [host down]
80
81Nmap scan report for 192.168.1.37 [host down]
82
83Nmap scan report for 192.168.1.38 [host down]
84
85Nmap scan report for 192.168.1.39 [host down]
86
87Nmap scan report for 192.168.1.40 [host down]
88
89Nmap scan report for 192.168.1.41 [host down]
90
91Nmap scan report for 192.168.1.42 [host down]
92
93Nmap scan report for 192.168.1.43 [host down]
94
95Nmap scan report for 192.168.1.44 [host down]
96
97Nmap scan report for 192.168.1.45 [host down]
98
99Nmap scan report for 192.168.1.46 [host down]
100
101Nmap scan report for 192.168.1.47 [host down]
102
103Nmap scan report for 192.168.1.48 [host down]
104
105Nmap scan report for 192.168.1.49 [host down]
106
107Nmap scan report for 192.168.1.50 [host down]
108
109Nmap scan report for 192.168.1.51 [host down]
110
111Nmap scan report for 192.168.1.52 [host down]
112
113Nmap scan report for 192.168.1.53 [host down]
114
115Nmap scan report for 192.168.1.54 [host down]
116
117Nmap scan report for 192.168.1.55 [host down]
118
119Nmap scan report for 192.168.1.56 [host down]
120
121Nmap scan report for 192.168.1.57 [host down]
122
123Nmap scan report for 192.168.1.58 [host down]
124
125Nmap scan report for 192.168.1.59 [host down]
126
127Nmap scan report for 192.168.1.60 [host down]
128
129Nmap scan report for 192.168.1.61 [host down]
130
131Nmap scan report for 192.168.1.62 [host down]
132
133Nmap scan report for 192.168.1.63 [host down]
134
135Nmap scan report for 192.168.1.64 [host down]
136
137Nmap scan report for 192.168.1.65 [host down]
138
139Nmap scan report for 192.168.1.66 [host down]
140
141Nmap scan report for 192.168.1.67 [host down]
142
143Nmap scan report for 192.168.1.68 [host down]
144
145Nmap scan report for 192.168.1.69 [host down]
146
147Nmap scan report for 192.168.1.70 [host down]
148
149Nmap scan report for 192.168.1.71 [host down]
150
151Nmap scan report for 192.168.1.72 [host down]
152
153Nmap scan report for 192.168.1.73 [host down]
154
155Nmap scan report for 192.168.1.74 [host down]
156
157Nmap scan report for 192.168.1.75 [host down]
158
159Nmap scan report for 192.168.1.76 [host down]
160
161Nmap scan report for 192.168.1.77 [host down]
162
163Nmap scan report for 192.168.1.78 [host down]
164
165Nmap scan report for 192.168.1.79 [host down]
166
167Nmap scan report for 192.168.1.80 [host down]
168
169Nmap scan report for 192.168.1.81 [host down]
170
171Nmap scan report for 192.168.1.82 [host down]
172
173Nmap scan report for 192.168.1.83 [host down]
174
175Nmap scan report for 192.168.1.84 [host down]
176
177Nmap scan report for 192.168.1.85 [host down]
178
179Nmap scan report for 192.168.1.86 [host down]
180
181Nmap scan report for 192.168.1.87 [host down]
182
183Nmap scan report for 192.168.1.88 [host down]
184
185Nmap scan report for 192.168.1.89 [host down]
186
187Nmap scan report for 192.168.1.90 [host down]
188
189Nmap scan report for 192.168.1.91 [host down]
190
191Nmap scan report for 192.168.1.92 [host down]
192
193Nmap scan report for 192.168.1.93 [host down]
194
195Nmap scan report for 192.168.1.94 [host down]
196
197Nmap scan report for 192.168.1.95 [host down]
198
199Nmap scan report for 192.168.1.96 [host down]
200
201Nmap scan report for 192.168.1.97 [host down]
202
203Nmap scan report for 192.168.1.98 [host down]
204
205Nmap scan report for 192.168.1.99 [host down]
206
207Nmap scan report for 192.168.1.104 [host down]
208
209Nmap scan report for 192.168.1.105 [host down]
210
211Nmap scan report for 192.168.1.106 [host down]
212
213Nmap scan report for 192.168.1.107 [host down]
214
215Nmap scan report for 192.168.1.108 [host down]
216
217Nmap scan report for 192.168.1.109 [host down]
218
219Nmap scan report for 192.168.1.110 [host down]
220
221Nmap scan report for 192.168.1.111 [host down]
222
223Nmap scan report for 192.168.1.112 [host down]
224
225Nmap scan report for 192.168.1.113 [host down]
226
227Nmap scan report for 192.168.1.114 [host down]
228
229Nmap scan report for 192.168.1.115 [host down]
230
231Nmap scan report for 192.168.1.116 [host down]
232
233Nmap scan report for 192.168.1.117 [host down]
234
235Nmap scan report for 192.168.1.118 [host down]
236
237Nmap scan report for 192.168.1.119 [host down]
238
239Nmap scan report for 192.168.1.120 [host down]
240
241Nmap scan report for 192.168.1.121 [host down]
242
243Nmap scan report for 192.168.1.122 [host down]
244
245Nmap scan report for 192.168.1.123 [host down]
246
247Nmap scan report for 192.168.1.124 [host down]
248
249Nmap scan report for 192.168.1.125 [host down]
250
251Nmap scan report for 192.168.1.126 [host down]
252
253Nmap scan report for 192.168.1.127 [host down]
254
255Nmap scan report for 192.168.1.128 [host down]
256
257Nmap scan report for 192.168.1.129 [host down]
258
259Nmap scan report for 192.168.1.130 [host down]
260
261Nmap scan report for 192.168.1.131 [host down]
262
263Nmap scan report for 192.168.1.132 [host down]
264
265Nmap scan report for 192.168.1.133 [host down]
266
267Nmap scan report for 192.168.1.134 [host down]
268
269Nmap scan report for 192.168.1.135 [host down]
270
271Nmap scan report for 192.168.1.136 [host down]
272
273Nmap scan report for 192.168.1.137 [host down]
274
275Nmap scan report for 192.168.1.138 [host down]
276
277Nmap scan report for 192.168.1.139 [host down]
278
279Nmap scan report for 192.168.1.140 [host down]
280
281Nmap scan report for 192.168.1.141 [host down]
282
283Nmap scan report for 192.168.1.142 [host down]
284
285Nmap scan report for 192.168.1.143 [host down]
286
287Nmap scan report for 192.168.1.144 [host down]
288
289Nmap scan report for 192.168.1.145 [host down]
290
291Nmap scan report for 192.168.1.146 [host down]
292
293Nmap scan report for 192.168.1.147 [host down]
294
295Nmap scan report for 192.168.1.148 [host down]
296
297Nmap scan report for 192.168.1.149 [host down]
298
299Nmap scan report for 192.168.1.150 [host down]
300
301Nmap scan report for 192.168.1.151 [host down]
302
303Nmap scan report for 192.168.1.152 [host down]
304
305Nmap scan report for 192.168.1.153 [host down]
306
307Nmap scan report for 192.168.1.154 [host down]
308
309Nmap scan report for 192.168.1.155 [host down]
310
311Nmap scan report for 192.168.1.156 [host down]
312
313Nmap scan report for 192.168.1.157 [host down]
314
315Nmap scan report for 192.168.1.158 [host down]
316
317Nmap scan report for 192.168.1.159 [host down]
318
319Nmap scan report for 192.168.1.160 [host down]
320
321Nmap scan report for 192.168.1.161 [host down]
322
323Nmap scan report for 192.168.1.162 [host down]
324
325Nmap scan report for 192.168.1.163 [host down]
326
327Nmap scan report for 192.168.1.164 [host down]
328
329Nmap scan report for 192.168.1.165 [host down]
330
331Nmap scan report for 192.168.1.166 [host down]
332
333Nmap scan report for 192.168.1.167 [host down]
334
335Nmap scan report for 192.168.1.168 [host down]
336
337Nmap scan report for 192.168.1.169 [host down]
338
339Nmap scan report for 192.168.1.170 [host down]
340
341Nmap scan report for 192.168.1.171 [host down]
342
343Nmap scan report for 192.168.1.172 [host down]
344
345Nmap scan report for 192.168.1.173 [host down]
346
347Nmap scan report for 192.168.1.174 [host down]
348
349Nmap scan report for 192.168.1.175 [host down]
350
351Nmap scan report for 192.168.1.176 [host down]
352
353Nmap scan report for 192.168.1.177 [host down]
354
355Nmap scan report for 192.168.1.178 [host down]
356
357Nmap scan report for 192.168.1.179 [host down]
358
359Nmap scan report for 192.168.1.180 [host down]
360
361Nmap scan report for 192.168.1.181 [host down]
362
363Nmap scan report for 192.168.1.182 [host down]
364
365Nmap scan report for 192.168.1.183 [host down]
366
367Nmap scan report for 192.168.1.184 [host down]
368
369Nmap scan report for 192.168.1.185 [host down]
370
371Nmap scan report for 192.168.1.186 [host down]
372
373Nmap scan report for 192.168.1.187 [host down]
374
375Nmap scan report for 192.168.1.188 [host down]
376
377Nmap scan report for 192.168.1.189 [host down]
378
379Nmap scan report for 192.168.1.190 [host down]
380
381Nmap scan report for 192.168.1.191 [host down]
382
383Nmap scan report for 192.168.1.192 [host down]
384
385Nmap scan report for 192.168.1.193 [host down]
386
387Nmap scan report for 192.168.1.194 [host down]
388
389Nmap scan report for 192.168.1.195 [host down]
390
391Nmap scan report for 192.168.1.196 [host down]
392
393Nmap scan report for 192.168.1.197 [host down]
394
395Nmap scan report for 192.168.1.198 [host down]
396
397Nmap scan report for 192.168.1.199 [host down]
398
399Nmap scan report for 192.168.1.200 [host down]
400
401Nmap scan report for 192.168.1.201 [host down]
402
403Nmap scan report for 192.168.1.202 [host down]
404
405Nmap scan report for 192.168.1.203 [host down]
406
407Nmap scan report for 192.168.1.204 [host down]
408
409Nmap scan report for 192.168.1.205 [host down]
410
411Nmap scan report for 192.168.1.206 [host down]
412
413Nmap scan report for 192.168.1.207 [host down]
414
415Nmap scan report for 192.168.1.208 [host down]
416
417Nmap scan report for 192.168.1.209 [host down]
418
419Nmap scan report for 192.168.1.210 [host down]
420
421Nmap scan report for 192.168.1.211 [host down]
422
423Nmap scan report for 192.168.1.212 [host down]
424
425Nmap scan report for 192.168.1.213 [host down]
426
427Nmap scan report for 192.168.1.214 [host down]
428
429Nmap scan report for 192.168.1.215 [host down]
430
431Nmap scan report for 192.168.1.216 [host down]
432
433Nmap scan report for 192.168.1.217 [host down]
434
435Nmap scan report for 192.168.1.218 [host down]
436
437Nmap scan report for 192.168.1.219 [host down]
438
439Nmap scan report for 192.168.1.220 [host down]
440
441Nmap scan report for 192.168.1.221 [host down]
442
443Nmap scan report for 192.168.1.222 [host down]
444
445Nmap scan report for 192.168.1.223 [host down]
446
447Nmap scan report for 192.168.1.224 [host down]
448
449Nmap scan report for 192.168.1.225 [host down]
450
451Nmap scan report for 192.168.1.226 [host down]
452
453Nmap scan report for 192.168.1.227 [host down]
454
455Nmap scan report for 192.168.1.228 [host down]
456
457Nmap scan report for 192.168.1.229 [host down]
458
459Nmap scan report for 192.168.1.230 [host down]
460
461Nmap scan report for 192.168.1.231 [host down]
462
463Nmap scan report for 192.168.1.232 [host down]
464
465Nmap scan report for 192.168.1.233 [host down]
466
467Nmap scan report for 192.168.1.234 [host down]
468
469Nmap scan report for 192.168.1.235 [host down]
470
471Nmap scan report for 192.168.1.236 [host down]
472
473Nmap scan report for 192.168.1.237 [host down]
474
475Nmap scan report for 192.168.1.238 [host down]
476
477Nmap scan report for 192.168.1.239 [host down]
478
479Nmap scan report for 192.168.1.240 [host down]
480
481Nmap scan report for 192.168.1.241 [host down]
482
483Nmap scan report for 192.168.1.242 [host down]
484
485Nmap scan report for 192.168.1.243 [host down]
486
487Nmap scan report for 192.168.1.244 [host down]
488
489Nmap scan report for 192.168.1.245 [host down]
490
491Nmap scan report for 192.168.1.246 [host down]
492
493Nmap scan report for 192.168.1.247 [host down]
494
495Nmap scan report for 192.168.1.248 [host down]
496
497Nmap scan report for 192.168.1.249 [host down]
498
499Nmap scan report for 192.168.1.250 [host down]
500
501Nmap scan report for 192.168.1.251 [host down]
502
503Nmap scan report for 192.168.1.252 [host down]
504
505Nmap scan report for 192.168.1.253 [host down]
506
507Nmap scan report for 192.168.1.254 [host down]
508
509Nmap scan report for 192.168.1.255 [host down]
510
511Initiating Parallel DNS resolution of 1 host. at 10:22
512
513Completed Parallel DNS resolution of 1 host. at 10:22, 0.02s elapsed
514
515Initiating SYN Stealth Scan at 10:22
516
517Scanning 5 hosts [1000 ports/host]
518
519Discovered open port 22/tcp on 192.168.1.102
520
521Discovered open port 22/tcp on 192.168.1.103
522
523Discovered open port 22/tcp on 192.168.1.100
524
525Discovered open port 22/tcp on 192.168.1.2
526
527Discovered open port 21/tcp on 192.168.1.2
528
529Discovered open port 443/tcp on 192.168.1.2
530
531Discovered open port 53/tcp on 192.168.1.2
532
533Discovered open port 80/tcp on 192.168.1.2
534
535Discovered open port 5432/tcp on 192.168.1.2
536
537Completed SYN Stealth Scan against 192.168.1.2 in 0.28s (4 hosts left)
538
539Completed SYN Stealth Scan against 192.168.1.100 in 0.28s (3 hosts left)
540
541Discovered open port 139/tcp on 192.168.1.102
542
543Discovered open port 3389/tcp on 192.168.1.102
544
545Discovered open port 135/tcp on 192.168.1.102
546
547Discovered open port 445/tcp on 192.168.1.102
548
549Discovered open port 3389/tcp on 192.168.1.103
550
551Discovered open port 1022/tcp on 192.168.1.1
552
553Discovered open port 1443/tcp on 192.168.1.1
554
555Completed SYN Stealth Scan against 192.168.1.1 in 7.19s (2 hosts left)
556
557Completed SYN Stealth Scan against 192.168.1.102 in 7.31s (1 host left)
558
559Completed SYN Stealth Scan at 10:22, 7.42s elapsed (5000 total ports)
560
561Initiating Service scan at 10:22
562
563Scanning 16 services on 5 hosts
564
565Completed Service scan at 10:23, 12.11s elapsed (16 services on 5 hosts)
566
567Initiating OS detection (try #1) against 5 hosts
568
569Retrying OS detection (try #2) against 3 hosts
570
571NSE: Script scanning 5 hosts.
572
573Initiating NSE at 10:23
574
575Completed NSE at 10:23, 49.44s elapsed
576
577Initiating NSE at 10:23
578
579Completed NSE at 10:23, 0.94s elapsed
580
581Initiating NSE at 10:23
582
583Completed NSE at 10:23, 0.00s elapsed
584
585Nmap scan report for 192.168.1.1
586
587Host is up (0.00s latency).
588
589Not shown: 998 filtered ports
590
591PORT STATE SERVICE VERSION
592
5931022/tcp open ssh OpenSSH 7.5 (protocol 2.0)
594
595| ssh-hostkey:
596
597| 4096 3d:81:b9:4d:0a:5f:1f:6e:87:63:06:b7:d4:13:48:21 (RSA)
598
599|_ 256 b6:af:c8:04:02:ff:66:6d:32:21:99:83:02:e8:63:3f (ED25519)
600
6011443/tcp open ssl/http nginx
602
603|_http-favicon: Unknown favicon MD5: 5567E9CE23E5549E0FCD7195F3882816
604
605| http-methods:
606
607|_ Supported Methods: GET HEAD POST
608
609|_http-title: Login
610
611| ssl-cert: Subject: commonName=pfSense-5dea350f7fd42/organizationName=pfSense webConfigurator Self-Signed Certificate
612
613| Subject Alternative Name: DNS:pfSense-5dea350f7fd42
614
615| Issuer: commonName=pfSense-5dea350f7fd42/organizationName=pfSense webConfigurator Self-Signed Certificate
616
617| Public Key type: rsa
618
619| Public Key bits: 2048
620
621| Signature Algorithm: sha256WithRSAEncryption
622
623| Not valid before: 2019-12-06T11:01:35
624
625| Not valid after: 2025-05-28T11:01:35
626
627| MD5: edd5 82f4 8b8b ef88 42f8 5256 83f2 4872
628
629|_SHA-1: 121b 98e3 494d fc30 3105 d930 003c 0439 f94e d075
630
631|_ssl-date: TLS randomness does not represent time
632
633| tls-alpn:
634
635| h2
636
637|_ http/1.1
638
639| tls-nextprotoneg:
640
641| h2
642
643|_ http/1.1
644
645MAC Address: 00:50:56:B2:FD:D0 (VMware)
646
647Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
648
649OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
650
651No OS matches for host
652
653Uptime guess: 0.001 days (since Wed Dec 11 10:23:04 2019)
654
655Network Distance: 1 hop
656
657TCP Sequence Prediction: Difficulty=262 (Good luck!)
658
659IP ID Sequence Generation: All zeros
660
661
662
663TRACEROUTE
664
665HOP RTT ADDRESS
666
6671 0.00 ms 192.168.1.1
668
669
670
671Nmap scan report for facecat.be (192.168.1.2)
672
673Host is up (0.00s latency).
674
675Not shown: 994 closed ports
676
677PORT STATE SERVICE VERSION
678
67921/tcp open ftp vsftpd 3.0.3
680
68122/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u7 (protocol 2.0)
682
683| ssh-hostkey:
684
685| 2048 b0:1a:ce:63:08:6e:b0:34:e8:97:c6:2e:cb:5d:f4:ad (RSA)
686
687| 256 71:57:0c:ec:a2:a3:b6:aa:22:58:ef:1f:c1:52:4d:55 (ECDSA)
688
689|_ 256 80:94:49:dd:33:29:2d:89:1a:9f:e2:a7:09:cc:3d:96 (ED25519)
690
69153/tcp open domain dnsmasq 2.76
692
693| dns-nsid:
694
695|_ bind.version: dnsmasq-2.76
696
69780/tcp open http nginx
698
699|_http-favicon: Unknown favicon MD5: F7E3D97F404E71D302B3239EEF48D5F2
700
701| http-methods:
702
703|_ Supported Methods: GET HEAD POST OPTIONS
704
705| http-robots.txt: 55 disallowed entries (15 shown)
706
707| / /autocomplete/users /search /api /admin /profile
708
709| /dashboard /projects/new /groups/new /groups/*/edit /users /help
710
711|_/s/ /snippets/new /snippets/*/edit
712
713| http-title: Sign in \xC2\xB7 GitLab
714
715|_Requested resource was http://facecat.be/users/sign_in
716
717|_http-trane-info: Problem with XML parsing of /evox/about
718
719443/tcp open ssl/http Apache httpd 2.4.25 ((Debian))
720
721| http-git:
722
723| 192.168.1.2:443/.git/
724
725| Git repository found!
726
727| .git/COMMIT_EDITMSG matched patterns 'bug'
728
729| Repository description: Unnamed repository; edit this file 'description' to name the...
730
731| Last commit message: bugfix # Please enter the commit message for your changes. L...
732
733| Remotes:
734
735|_ http://gitlab.miauw.be/root/facecat.git
736
737| http-methods:
738
739|_ Supported Methods: GET HEAD POST OPTIONS
740
741|_http-server-header: Apache/2.4.25 (Debian)
742
743| http-title: Bienvenue sur facecat.be !
744
745|_Requested resource was login.php
746
747| ssl-cert: Subject: commonName=server
748
749| Subject Alternative Name: DNS:server
750
751| Issuer: commonName=server
752
753| Public Key type: rsa
754
755| Public Key bits: 2048
756
757| Signature Algorithm: sha256WithRSAEncryption
758
759| Not valid before: 2019-12-10T19:52:17
760
761| Not valid after: 2029-12-07T19:52:17
762
763| MD5: 1fe7 38ec cf0d 1753 9df2 fef7 174f 8614
764
765|_SHA-1: 7400 4f9b db2b 2780 2c24 f2c9 57c0 abd3 554a 3293
766
767|_ssl-date: TLS randomness does not represent time
768
769| tls-alpn:
770
771|_ http/1.1
772
7735432/tcp open postgresql PostgreSQL DB 9.6.4 - 9.6.6
774
775| ssl-cert: Subject: commonName=server
776
777| Subject Alternative Name: DNS:server
778
779| Issuer: commonName=server
780
781| Public Key type: rsa
782
783| Public Key bits: 2048
784
785| Signature Algorithm: sha256WithRSAEncryption
786
787| Not valid before: 2019-12-10T19:52:17
788
789| Not valid after: 2029-12-07T19:52:17
790
791| MD5: 1fe7 38ec cf0d 1753 9df2 fef7 174f 8614
792
793|_SHA-1: 7400 4f9b db2b 2780 2c24 f2c9 57c0 abd3 554a 3293
794
795|_ssl-date: TLS randomness does not represent time
796
797MAC Address: 00:50:56:B2:3D:6F (VMware)
798
799Device type: general purpose
800
801Running: Linux 3.X|4.X
802
803OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
804
805OS details: Linux 3.2 - 4.9
806
807Uptime guess: 0.075 days (since Wed Dec 11 08:35:46 2019)
808
809Network Distance: 1 hop
810
811TCP Sequence Prediction: Difficulty=260 (Good luck!)
812
813IP ID Sequence Generation: All zeros
814
815Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
816
817
818
819TRACEROUTE
820
821HOP RTT ADDRESS
822
8231 0.00 ms facecat.be (192.168.1.2)
824
825
826
827Nmap scan report for 192.168.1.100
828
829Host is up (0.00s latency).
830
831Not shown: 999 closed ports
832
833PORT STATE SERVICE VERSION
834
83522/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
836
837| ssh-hostkey:
838
839| 2048 2f:0c:8a:63:49:99:03:b3:f7:dc:9f:27:91:a4:67:19 (RSA)
840
841| 256 67:ac:69:23:52:2b:13:d5:57:47:96:0b:c2:87:5f:86 (ECDSA)
842
843|_ 256 f8:ec:a7:08:60:4a:10:5c:c9:33:84:5a:76:02:ac:71 (ED25519)
844
845MAC Address: 00:50:56:B2:93:8C (VMware)
846
847Device type: general purpose
848
849Running: Linux 3.X|4.X
850
851OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
852
853OS details: Linux 3.2 - 4.9
854
855Uptime guess: 28.363 days (since Wed Nov 13 01:41:41 2019)
856
857Network Distance: 1 hop
858
859TCP Sequence Prediction: Difficulty=256 (Good luck!)
860
861IP ID Sequence Generation: All zeros
862
863Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
864
865
866
867TRACEROUTE
868
869HOP RTT ADDRESS
870
8711 0.00 ms 192.168.1.100
872
873
874
875Nmap scan report for 192.168.1.102
876
877Host is up (0.00s latency).
878
879Not shown: 995 filtered ports
880
881PORT STATE SERVICE VERSION
882
88322/tcp open ssh OpenSSH for_Windows_7.6 (protocol 2.0)
884
885| ssh-hostkey:
886
887| 2048 78:bb:9d:99:a9:b2:48:6b:a6:97:59:39:ac:33:f3:8e (RSA)
888
889| 256 a7:4d:6b:b3:06:c3:f2:0c:50:30:16:c5:18:d4:5c:e1 (ECDSA)
890
891|_ 256 7f:47:c1:cb:b2:e7:e9:f6:67:f0:28:ae:b1:50:d4:56 (ED25519)
892
893135/tcp open msrpc Microsoft Windows RPC
894
895139/tcp open netbios-ssn Microsoft Windows netbios-ssn
896
897445/tcp open microsoft-ds?
898
8993389/tcp open ms-wbt-server Microsoft Terminal Services
900
901| rdp-ntlm-info:
902
903| Target_Name: BOB-DESKTOP
904
905| NetBIOS_Domain_Name: BOB-DESKTOP
906
907| NetBIOS_Computer_Name: BOB-DESKTOP
908
909| DNS_Domain_Name: Bob-Desktop
910
911| DNS_Computer_Name: Bob-Desktop
912
913| Product_Version: 10.0.17134
914
915|_ System_Time: 2019-12-11T09:23:11+00:00
916
917| ssl-cert: Subject: commonName=Bob-Desktop
918
919| Issuer: commonName=Bob-Desktop
920
921| Public Key type: rsa
922
923| Public Key bits: 2048
924
925| Signature Algorithm: sha256WithRSAEncryption
926
927| Not valid before: 2019-12-09T17:34:20
928
929| Not valid after: 2020-06-09T17:34:20
930
931| MD5: e907 a120 2cca 37f7 e031 c036 c617 4695
932
933|_SHA-1: 76ac 956c c1db d75f 3c26 cbcd c209 eb54 3db0 e6e9
934
935|_ssl-date: 2019-12-11T09:23:56+00:00; 0s from scanner time.
936
937MAC Address: 00:50:56:B2:EB:E3 (VMware)
938
939Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
940
941Device type: general purpose
942
943Running (JUST GUESSING): Microsoft Windows XP|7|2008 (87%)
944
945OS CPE: cpe:/o:microsoft:windows_xp::sp2 cpe:/o:microsoft:windows_7 cpe:/o:microsoft:windows_server_2008::sp1 cpe:/o:microsoft:windows_server_2008:r2
946
947Aggressive OS guesses: Microsoft Windows XP SP2 (87%), Microsoft Windows 7 (85%), Microsoft Windows Server 2008 SP1 or Windows Server 2008 R2 (85%)
948
949No exact OS matches for host (test conditions non-ideal).
950
951Network Distance: 1 hop
952
953TCP Sequence Prediction: Difficulty=263 (Good luck!)
954
955IP ID Sequence Generation: Incremental
956
957Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
958
959
960
961Host script results:
962
963| nbstat: NetBIOS name: BOB-DESKTOP, NetBIOS user: <unknown>, NetBIOS MAC: 00:50:56:b2:eb:e3 (VMware)
964
965| Names:
966
967| BOB-DESKTOP<00> Flags: <unique><active>
968
969| WORKGROUP<00> Flags: <group><active>
970
971|_ BOB-DESKTOP<20> Flags: <unique><active>
972
973| smb2-security-mode:
974
975| 2.02:
976
977|_ Message signing enabled but not required
978
979| smb2-time:
980
981| date: 2019-12-11T09:23:14
982
983|_ start_date: N/A
984
985
986
987TRACEROUTE
988
989HOP RTT ADDRESS
990
9911 0.00 ms 192.168.1.102
992
993
994
995Nmap scan report for 192.168.1.103
996
997Host is up (0.00s latency).
998
999Not shown: 998 filtered ports
1000
1001PORT STATE SERVICE VERSION
1002
100322/tcp open ssh OpenSSH for_Windows_7.6 (protocol 2.0)
1004
1005| ssh-hostkey:
1006
1007| 2048 78:bb:9d:99:a9:b2:48:6b:a6:97:59:39:ac:33:f3:8e (RSA)
1008
1009| 256 a7:4d:6b:b3:06:c3:f2:0c:50:30:16:c5:18:d4:5c:e1 (ECDSA)
1010
1011|_ 256 7f:47:c1:cb:b2:e7:e9:f6:67:f0:28:ae:b1:50:d4:56 (ED25519)
1012
10133389/tcp open ms-wbt-server Microsoft Terminal Services
1014
1015| rdp-ntlm-info:
1016
1017| Target_Name: CHARLIE-DESKTOP
1018
1019| NetBIOS_Domain_Name: CHARLIE-DESKTOP
1020
1021| NetBIOS_Computer_Name: CHARLIE-DESKTOP
1022
1023| DNS_Domain_Name: Charlie-Desktop
1024
1025| DNS_Computer_Name: Charlie-Desktop
1026
1027| Product_Version: 10.0.17134
1028
1029|_ System_Time: 2019-12-11T09:23:15+00:00
1030
1031| ssl-cert: Subject: commonName=Charlie-Desktop
1032
1033| Issuer: commonName=Charlie-Desktop
1034
1035| Public Key type: rsa
1036
1037| Public Key bits: 2048
1038
1039| Signature Algorithm: sha256WithRSAEncryption
1040
1041| Not valid before: 2019-12-09T17:34:41
1042
1043| Not valid after: 2020-06-09T17:34:41
1044
1045| MD5: 815d 7b98 0720 7485 cad5 2c0c e632 983e
1046
1047|_SHA-1: 2b11 1be2 8489 ee97 74e3 013c 7a98 0510 2b32 b7a9
1048
1049|_ssl-date: 2019-12-11T09:23:56+00:00; 0s from scanner time.
1050
1051MAC Address: 00:50:56:B2:5C:AC (VMware)
1052
1053Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1054
1055Device type: specialized|general purpose
1056
1057Running (JUST GUESSING): AVtech embedded (87%), Microsoft Windows XP (87%), FreeBSD 6.X|10.X (86%)
1058
1059OS CPE: cpe:/o:microsoft:windows_xp::sp2 cpe:/o:freebsd:freebsd:6.2 cpe:/o:freebsd:freebsd:10.3
1060
1061Aggressive OS guesses: AVtech Room Alert 26W environmental monitor (87%), Microsoft Windows XP SP2 (87%), FreeBSD 6.2-RELEASE (86%), FreeBSD 10.3-STABLE (85%)
1062
1063No exact OS matches for host (test conditions non-ideal).
1064
1065Network Distance: 1 hop
1066
1067TCP Sequence Prediction: Difficulty=265 (Good luck!)
1068
1069IP ID Sequence Generation: Incremental
1070
1071Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1072
1073
1074
1075TRACEROUTE
1076
1077HOP RTT ADDRESS
1078
10791 0.00 ms 192.168.1.103
1080
1081
1082
1083Initiating SYN Stealth Scan at 10:23
1084
1085Scanning 192.168.1.101 [1000 ports]
1086
1087Discovered open port 22/tcp on 192.168.1.101
1088
1089Discovered open port 139/tcp on 192.168.1.101
1090
1091Discovered open port 3389/tcp on 192.168.1.101
1092
1093Discovered open port 135/tcp on 192.168.1.101
1094
1095Discovered open port 445/tcp on 192.168.1.101
1096
1097Completed SYN Stealth Scan at 10:23, 0.05s elapsed (1000 total ports)
1098
1099Initiating Service scan at 10:23