1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126
| └─$ nmap -T4 -A -v 10.10.175.68 Starting Nmap 7.95 ( https://nmap.org ) at 2025-01-22 21:10 CST NSE: Loaded 157 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 21:10 Completed NSE at 21:10, 0.00s elapsed Initiating NSE at 21:10 Completed NSE at 21:10, 0.00s elapsed Initiating NSE at 21:10 Completed NSE at 21:10, 0.00s elapsed Initiating Ping Scan at 21:10 Scanning 10.10.175.68 [4 ports] Completed Ping Scan at 21:10, 0.68s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 21:10 Completed Parallel DNS resolution of 1 host. at 21:10, 0.03s elapsed Initiating SYN Stealth Scan at 21:10 Scanning 10.10.175.68 [1000 ports] Discovered open port 80/tcp on 10.10.175.68 Discovered open port 8080/tcp on 10.10.175.68 Discovered open port 22/tcp on 10.10.175.68 Completed SYN Stealth Scan at 21:11, 13.79s elapsed (1000 total ports) Initiating Service scan at 21:11 Scanning 3 services on 10.10.175.68 Completed Service scan at 21:12, 109.44s elapsed (3 services on 1 host) Initiating OS detection (try Retrying OS detection (try Retrying OS detection (try Retrying OS detection (try Retrying OS detection (try Initiating Traceroute at 21:13 Completed Traceroute at 21:13, 0.60s elapsed Initiating Parallel DNS resolution of 3 hosts. at 21:13 Completed Parallel DNS resolution of 3 hosts. at 21:13, 8.02s elapsed NSE: Script scanning 10.10.175.68. Initiating NSE at 21:13 Completed NSE at 21:13, 14.45s elapsed Initiating NSE at 21:13 Completed NSE at 21:13, 2.30s elapsed Initiating NSE at 21:13 Completed NSE at 21:13, 0.00s elapsed Nmap scan report for 10.10.175.68 Host is up (0.41s latency). Not shown: 997 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.9p1 Ubuntu 3ubuntu0.4 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 256 1b:1c:87:8a:fe:34:16:c9:f7:82:37:2b:10:8f:8b:f1 (ECDSA) |_ 256 26:6d:17:ed:83:9e:4f:2d:f6:cd:53:17:c8:80:3d:09 (ED25519) 80/tcp open http nginx 1.18.0 (Ubuntu) | http-methods: |_ Supported Methods: GET HEAD |_http-title: Hack Smarter Security |_http-server-header: nginx/1.18.0 (Ubuntu) 8080/tcp open http-proxy | fingerprint-strings: | GenericLines, Help, Kerberos, LDAPSearchReq, LPDString, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, Socks5, TLSSessionReq, TerminalServerCookie, WMSRequest, oracle-tns: | HTTP/1.1 400 Bad Request | Content-Length: 0 |_ Connection: close |_http-title: Error 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port8080-TCP:V=7.95%I=7%D=1/22%Time=6790EE76%P=x86_64-pc-linux-gnu%r(RT SF:SPRequest,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x20 SF:0\r\nConnection:\x20close\r\n\r\n")%r(Socks5,42,"HTTP/1\.1\x20400\x20Ba SF:d\x20Request\r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n")% SF:r(GenericLines,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length SF::\x200\r\nConnection:\x20close\r\n\r\n")%r(Help,42,"HTTP/1\.1\x20400\x2 SF:0Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n SF:")%r(SSLSessionReq,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Le SF:ngth:\x200\r\nConnection:\x20close\r\n\r\n")%r(TerminalServerCookie,42, SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnecti SF:on:\x20close\r\n\r\n")%r(TLSSessionReq,42,"HTTP/1\.1\x20400\x20Bad\x20R SF:equest\r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(Kerb SF:eros,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\n SF:Connection:\x20close\r\n\r\n")%r(SMBProgNeg,42,"HTTP/1\.1\x20400\x20Bad SF:\x20Request\r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r SF:(LPDString,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x2 SF:00\r\nConnection:\x20close\r\n\r\n")%r(LDAPSearchReq,42,"HTTP/1\.1\x204 SF:00\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x20close\r\ SF:n\r\n")%r(SIPOptions,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent- SF:Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(WMSRequest,42,"HTTP/1\ SF:.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x20c SF:lose\r\n\r\n")%r(oracle-tns,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nC SF:ontent-Length:\x200\r\nConnection:\x20close\r\n\r\n"); No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ). TCP/IP fingerprint: OS:SCAN(V=7.95%E=4%D=1/22%OT=22%CT=1%CU=32857%PV=Y%DS=3%DC=T%G=Y%TM=6790EF0 OS:0%P=x86_64-pc-linux-gnu)SEQ(SP=100%GCD=1%ISR=10C%TI=Z%CI=Z%II=I%TS=A)SEQ OS:(SP=100%GCD=1%ISR=10D%TI=Z%CI=Z%II=I%TS=A)SEQ(SP=102%GCD=2%ISR=10E%TI=Z% OS:CI=Z%II=I%TS=A)SEQ(SP=106%GCD=1%ISR=10A%TI=Z%CI=Z%II=I%TS=A)SEQ(SP=108%G OS:CD=1%ISR=10A%TI=Z%CI=Z%TS=A)OPS(O1=M508ST11NW7%O2=M508ST11NW7%O3=M508NNT OS:11NW7%O4=M508ST11NW7%O5=M508ST11NW7%O6=M508ST11)WIN(W1=F4B3%W2=F4B3%W3=F OS:4B3%W4=F4B3%W5=F4B3%W6=F4B3)ECN(R=Y%DF=Y%T=40%W=F507%O=M508NNSNW7%CC=Y%Q OS:=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40% OS:W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q= OS:)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A= OS:S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RU OS:CK=6EF7%RUD=G)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=6F OS:03%RUD=G)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=6F1D%RU OS:D=G)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=6F27%RUD=G)U OS:1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=6F41%RUD=G)IE(R=Y OS:%DFI=N%T=40%CD=S)
Uptime guess: 45.766 days (since Sun Dec 8 02:50:52 2024) Network Distance: 3 hops TCP Sequence Prediction: Difficulty=256 (Good luck!) IP ID Sequence Generation: All zeros Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.18 ms bogon (172.17.16.1) 2 596.40 ms 10.8.0.1 3 596.60 ms 10.10.175.68
NSE: Script Post-scanning. Initiating NSE at 21:13 Completed NSE at 21:13, 0.00s elapsed Initiating NSE at 21:13 Completed NSE at 21:13, 0.00s elapsed Initiating NSE at 21:13 Completed NSE at 21:13, 0.00s elapsed Read data files from: /usr/share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 169.84 seconds Raw packets sent: 1460 (68.752KB) | Rcvd: 1095 (47.904KB)
|