Host and Port Scanning

May 09, 2024

# Nmap 7.94 scan initiated Thu May  9 22:15:48 2024 as: nmap -sC -sV -oN nmap -vv 10.129.68.133
Increasing send delay for 10.129.68.133 from 0 to 5 due to 38 out of 125 dropped probes since last increase.
Increasing send delay for 10.129.68.133 from 160 to 320 due to 11 out of 12 dropped probes since last increase.
Increasing send delay for 10.129.68.133 from 320 to 640 due to 11 out of 13 dropped probes since last increase.
Increasing send delay for 10.129.68.133 from 640 to 1000 due to 11 out of 11 dropped probes since last increase.
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
adjust_timeouts2: packet supposedly had rtt of 9582976 microseconds.  Ignoring time.
adjust_timeouts2: packet supposedly had rtt of 9582976 microseconds.  Ignoring time.
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
Nmap scan report for 10.129.68.133
Host is up, received syn-ack (0.50s latency).
Scanned at 2024-05-09 22:15:49 PST for 1144s
Not shown: 991 closed tcp ports (conn-refused)
PORT      STATE    SERVICE      REASON      VERSION
22/tcp    open     ssh          syn-ack     OpenSSH 7.6p1 Ubuntu 4ubuntu0.7 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 71:c1:89:90:7f:fd:4f:60:e0:54:f3:85:e6:35:6c:2b (RSA)
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDr2YB2/40YrrErlHXzWfgYCUcZCTpFeBnqVXue5uYqKAV961pye8zskJ4Sr9Mn9PYG6XPyb/nBWctn0cU0VSmN1QxVckCKGqyzoe205K4wtZl5Ce8E14HnxWBpPqvFJ/cAikVOfrxqKN/+t16izgC9KlwfGCxUvLIBHQ4WbvILh8P8SLH1yfFNwysixxs/uEhPazQk2jJSM8bVGjwpBQFmu4MknTEp8FopLc85YcE1+bUzfRWiCwGGkduqsXWA83d85xpEFGdyKLA7opNACF+Bu0JxMNCrzN7zjmBNA/AbR3qYxDFgoTIpXjiyKBaI+SAXmEc0qd4Y33KKiV1qCSuj
|   256 e1:8e:53:18:42:af:2a:de:c0:12:1e:2e:54:06:4f:70 (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGv0sbrw1LxweleKPu4qQiS6C5snxYJx2or+LW1TTZ0Kua5+k/8gHggHB+THj1nWC24orC3Ho907AMxr5CAevAk=
|   256 1a:cc:ac:d4:94:5c:d6:1d:71:e7:39:de:14:27:3c:3c (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMYSP2Z8qyfE4cFAGOW1XDnPnCPbw2MGkB25pCXsE3L/
80/tcp    open     http         syn-ack     Apache/2.4.29 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works
| http-methods: 
|_  Supported Methods: HEAD GET POST OPTIONS
|_http-server-header: Apache/2.4.29 (Ubuntu)
110/tcp   open     pop3?        syn-ack
| fingerprint-strings: 
|   GenericLines, NULL: 
|_    +OK Dovecot (Ubuntu) ready.
|_pop3-capabilities: RESP-CODES TOP PIPELINING UIDL SASL CAPA AUTH-RESP-CODE
139/tcp   open     netbios-ssn? syn-ack
143/tcp   open     imap         syn-ack     Dovecot imapd (Ubuntu)
|_imap-capabilities: LITERAL+ Pre-login LOGIN-REFERRALS IMAP4rev1 ENABLE post-login more capabilities listed have OK ID IDLE SASL-IR LOGINDISABLEDA0001
445/tcp   open     �            syn-ack     Samba smbd 4.7.6-Ubuntu
1024/tcp  filtered kdm          no-response
9575/tcp  filtered unknown      no-response
31337/tcp open     Elite?       syn-ack
| fingerprint-strings: 
|   GetRequest: 
|_    220 HTB{pr0F7pDv3r510nb4nn3r}
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port110-TCP:V=7.94%I=7%D=5/9%Time=663CDEC2%P=x86_64-pc-linux-gnu%r(NULL
SF:,1D,"\+OK\x20Dovecot\x20\(Ubuntu\)\x20ready\.\r\n")%r(GenericLines,1D,"
SF:\+OK\x20Dovecot\x20\(Ubuntu\)\x20ready\.\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port31337-TCP:V=7.94%I=7%D=5/9%Time=663CDEC7%P=x86_64-pc-linux-gnu%r(Ge
SF:tRequest,1F,"220\x20HTB{pr0F7pDv3r510nb4nn3r}\r\n");
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Host script results:
| smb-os-discovery: 
|   OS: Windows 6.1 (Samba 4.7.6-Ubuntu)
|   Computer name: nix-nmap-default
|   NetBIOS computer name: NIX-NMAP-DEFAULT\x00
|   Domain name: \x00
|   FQDN: nix-nmap-default
|_  System time: 2024-05-09T16:33:58+02:00
| smb-security-mode: 
|   account_used: guest
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled (dangerous, but default)
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled but not required
| p2p-conficker: 
|   Checking for Conficker.C or higher...
|   Check 1 (port 57631/tcp): CLEAN (Couldn't connect)
|   Check 2 (port 62726/tcp): CLEAN (Couldn't connect)
|   Check 3 (port 44621/udp): CLEAN (Failed to receive data)
|   Check 4 (port 65016/udp): CLEAN (Failed to receive data)
|_  0/4 checks are positive: Host is CLEAN or ports are blocked
| smb2-time: 
|   date: 2024-05-09T14:33:58
|_  start_date: N/A
|_clock-skew: mean: -39m51s, deviation: 1h09m15s, median: 7s
| nbstat: NetBIOS name: NIX-NMAP-DEFAUL, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
| Names:
|   NIX-NMAP-DEFAUL<00>  Flags: <unique><active>
|   NIX-NMAP-DEFAUL<03>  Flags: <unique><active>
|   NIX-NMAP-DEFAUL<20>  Flags: <unique><active>
|   WORKGROUP<00>        Flags: <group><active>
|   WORKGROUP<1e>        Flags: <group><active>
| Statistics:
|   00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
|   00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
|_  00:00:00:00:00:00:00:00:00:00:00:00:00:00

Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Thu May  9 22:34:53 2024 -- 1 IP address (1 host up) scanned in 1145.31 seconds

Last updated