Host and Port Scanning
May 09, 2024
Last updated
May 09, 2024
Last updated
# Nmap 7.94 scan initiated Thu May 9 22:15:48 2024 as: nmap -sC -sV -oN nmap -vv 10.129.68.133
Increasing send delay for 10.129.68.133 from 0 to 5 due to 38 out of 125 dropped probes since last increase.
Increasing send delay for 10.129.68.133 from 160 to 320 due to 11 out of 12 dropped probes since last increase.
Increasing send delay for 10.129.68.133 from 320 to 640 due to 11 out of 13 dropped probes since last increase.
Increasing send delay for 10.129.68.133 from 640 to 1000 due to 11 out of 11 dropped probes since last increase.
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
adjust_timeouts2: packet supposedly had rtt of 9582976 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of 9582976 microseconds. Ignoring time.
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
Nmap scan report for 10.129.68.133
Host is up, received syn-ack (0.50s latency).
Scanned at 2024-05-09 22:15:49 PST for 1144s
Not shown: 991 closed tcp ports (conn-refused)
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack OpenSSH 7.6p1 Ubuntu 4ubuntu0.7 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 71:c1:89:90:7f:fd:4f:60:e0:54:f3:85:e6:35:6c:2b (RSA)
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDr2YB2/40YrrErlHXzWfgYCUcZCTpFeBnqVXue5uYqKAV961pye8zskJ4Sr9Mn9PYG6XPyb/nBWctn0cU0VSmN1QxVckCKGqyzoe205K4wtZl5Ce8E14HnxWBpPqvFJ/cAikVOfrxqKN/+t16izgC9KlwfGCxUvLIBHQ4WbvILh8P8SLH1yfFNwysixxs/uEhPazQk2jJSM8bVGjwpBQFmu4MknTEp8FopLc85YcE1+bUzfRWiCwGGkduqsXWA83d85xpEFGdyKLA7opNACF+Bu0JxMNCrzN7zjmBNA/AbR3qYxDFgoTIpXjiyKBaI+SAXmEc0qd4Y33KKiV1qCSuj
| 256 e1:8e:53:18:42:af:2a:de:c0:12:1e:2e:54:06:4f:70 (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGv0sbrw1LxweleKPu4qQiS6C5snxYJx2or+LW1TTZ0Kua5+k/8gHggHB+THj1nWC24orC3Ho907AMxr5CAevAk=
| 256 1a:cc:ac:d4:94:5c:d6:1d:71:e7:39:de:14:27:3c:3c (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMYSP2Z8qyfE4cFAGOW1XDnPnCPbw2MGkB25pCXsE3L/
80/tcp open http syn-ack Apache/2.4.29 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works
| http-methods:
|_ Supported Methods: HEAD GET POST OPTIONS
|_http-server-header: Apache/2.4.29 (Ubuntu)
110/tcp open pop3? syn-ack
| fingerprint-strings:
| GenericLines, NULL:
|_ +OK Dovecot (Ubuntu) ready.
|_pop3-capabilities: RESP-CODES TOP PIPELINING UIDL SASL CAPA AUTH-RESP-CODE
139/tcp open netbios-ssn? syn-ack
143/tcp open imap syn-ack Dovecot imapd (Ubuntu)
|_imap-capabilities: LITERAL+ Pre-login LOGIN-REFERRALS IMAP4rev1 ENABLE post-login more capabilities listed have OK ID IDLE SASL-IR LOGINDISABLEDA0001
445/tcp open � syn-ack Samba smbd 4.7.6-Ubuntu
1024/tcp filtered kdm no-response
9575/tcp filtered unknown no-response
31337/tcp open Elite? syn-ack
| fingerprint-strings:
| GetRequest:
|_ 220 HTB{pr0F7pDv3r510nb4nn3r}
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port110-TCP:V=7.94%I=7%D=5/9%Time=663CDEC2%P=x86_64-pc-linux-gnu%r(NULL
SF:,1D,"\+OK\x20Dovecot\x20\(Ubuntu\)\x20ready\.\r\n")%r(GenericLines,1D,"
SF:\+OK\x20Dovecot\x20\(Ubuntu\)\x20ready\.\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port31337-TCP:V=7.94%I=7%D=5/9%Time=663CDEC7%P=x86_64-pc-linux-gnu%r(Ge
SF:tRequest,1F,"220\x20HTB{pr0F7pDv3r510nb4nn3r}\r\n");
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Host script results:
| smb-os-discovery:
| OS: Windows 6.1 (Samba 4.7.6-Ubuntu)
| Computer name: nix-nmap-default
| NetBIOS computer name: NIX-NMAP-DEFAULT\x00
| Domain name: \x00
| FQDN: nix-nmap-default
|_ System time: 2024-05-09T16:33:58+02:00
| smb-security-mode:
| account_used: guest
| authentication_level: user
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled but not required
| p2p-conficker:
| Checking for Conficker.C or higher...
| Check 1 (port 57631/tcp): CLEAN (Couldn't connect)
| Check 2 (port 62726/tcp): CLEAN (Couldn't connect)
| Check 3 (port 44621/udp): CLEAN (Failed to receive data)
| Check 4 (port 65016/udp): CLEAN (Failed to receive data)
|_ 0/4 checks are positive: Host is CLEAN or ports are blocked
| smb2-time:
| date: 2024-05-09T14:33:58
|_ start_date: N/A
|_clock-skew: mean: -39m51s, deviation: 1h09m15s, median: 7s
| nbstat: NetBIOS name: NIX-NMAP-DEFAUL, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
| Names:
| NIX-NMAP-DEFAUL<00> Flags: <unique><active>
| NIX-NMAP-DEFAUL<03> Flags: <unique><active>
| NIX-NMAP-DEFAUL<20> Flags: <unique><active>
| WORKGROUP<00> Flags: <group><active>
| WORKGROUP<1e> Flags: <group><active>
| Statistics:
| 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
| 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
|_ 00:00:00:00:00:00:00:00:00:00:00:00:00:00
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Thu May 9 22:34:53 2024 -- 1 IP address (1 host up) scanned in 1145.31 seconds