Nmap scan report for 192.168.0.100 Host is up (0.00096s latency). Not shown: 993 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.4 (Ubuntu Linux; protocol 2.0) 25/tcp open smtp Postfix smtpd 443/tcp open ssl/https 902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP) 3000/tcp open http Golang net/http server (Go-IPFS json-rpc or InfluxDB API) 8181/tcp open tcpwrapped 10000/tcp open snet-sensor-mgmt? MAC Address: 54:AB:3A:D5:09:C9 (Quanta Computer) Service Info: Host: kahe-Ubuntu.wifi.ipb.pt; OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for 192.168.0.101
Host is up (0.0017s latency). Not shown: 997 closed ports PORT STATE SERVICE VERSION 23/tcp open tcpwrapped 80/tcp open http EHTTP/1.1 280/tcp open http-mgmt? MAC Address: 00:60:B0:CF:1B:6F (Hewlett Packard)
Nmap scan report for 192.168.0.106
Host is up (0.00015s latency). All 1000 scanned ports on 192.168.0.106 are filtered MAC Address: 54:E1:AD:9E:DE:CF (Lcfc(hefei) Electronics Technology)
Nmap scan report for 192.168.0.108
Host is up (0.00045s latency). Not shown: 998 closed ports PORT STATE SERVICE VERSION 443/tcp open ssl/https 902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP) MAC Address: 84:7B:EB:F9:AE:49 (Dell)
Nmap scan report for 192.168.0.109
Host is up (0.00051s latency). Not shown: 996 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 6.2p2 Ubuntu 6 (Ubuntu Linux; protocol 2.0) 80/tcp open http Apache httpd 2.4.6 ((Ubuntu)) 5001/tcp open java-rmi Java RMI 8080/tcp open http Apache Tomcat/Coyote JSP engine 1.1 MAC Address: 00:0C:29:BB:14:F1 (VMware) Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for 192.168.0.153
Host is up (0.0010s latency). Not shown: 996 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0) 80/tcp open http Apache httpd 2.4.18 ((Ubuntu)) 443/tcp open ssl/https 902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP) 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new- service : SF-Port443-TCP:V=7.70%T=SSL%I=7%D=5/26%Time=5B095E95%P=x86_64-pc-linux-gnu SF:%r(GetRequest,A5,"HTTP/1\.1\x20403\x20Forbidden\r\nDate:\x20Sat,\x2026\ SF:x20May\x202018\x2013:18:13\x20GMT\r\nConnection:\x20close\r\nContent-Ty SF:pe:\x20text/plain;\x20charset=utf-8\r\nX-Frame-Options:\x20DENY\r\nCont SF:ent-Length:\x200\r\n\r\n")%r(HTTPOptions,AB,"HTTP/1\.1\x20501\x20Not\x2 SF:0Implemented\r\nDate:\x20Sat,\x2026\x20May\x202018\x2013:18:13\x20GMT\r SF:\nConnection:\x20close\r\nContent-Type:\x20text/plain;\x20charset=utf-8 SF:\r\nX-Frame-Options:\x20DENY\r\nContent-Length:\x200\r\n\r\n")%r(FourOh SF:FourRequest,A5,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Sat,\x2026 SF:\x20May\x202018\x2013:18:13\x20GMT\r\nConnection:\x20close\r\nContent-T SF:ype:\x20text/plain;\x20charset=utf-8\r\nX-Frame-Options:\x20DENY\r\nCon SF:tent-Length:\x200\r\n\r\n")%r(RTSPRequest,B3,"HTTP/1\.1\x20400\x20Bad\x SF:20Request\r\nDate:\x20Sat,\x2026\x20May\x202018\x2013:18:23\x20GMT\r\nC SF:onnection:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2 SF:050\r\n\r\n<HTML><BODY><H1>400\x20Bad\x20Request</H1></BODY></HTML>")%r SF:(SIPOptions,B3,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sat,\x20 SF:26\x20May\x202018\x2013:19:26\x20GMT\r\nConnection:\x20close\r\nContent SF:-Type:\x20text/html\r\nContent-Length:\x2050\r\n\r\n<HTML><BODY><H1>400 SF:\x20Bad\x20Request</H1></BODY></HTML>"); MAC Address: 78:2B:CB:ED:A9:5A (Dell) Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for 192.168.0.156
Host is up (0.00099s latency). All 1000 scanned ports on 192.168.0.156 are closed MAC Address: 08:00:27:C5:0D:1C (Oracle VirtualBox virtual NIC)
Nmap scan report for 192.168.0.158
Host is up (0.00085s latency). Not shown: 993 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 4.7 (protocol 2.0) 25/tcp open smtp Sendmail 8.14.1/8.14.1 80/tcp open http Apache httpd 2.2.6 ((Fedora)) 110/tcp open pop3 ipop3d 2006k.101 111/tcp open rpcbind 2-4 (RPC #100000) 143/tcp open imap University of Washington IMAP imapd 2006k.396 (time zone: -0400) 901/tcp open http Samba SWAT administration server MAC Address: 00:0C:29:C5:49:AF (VMware) Service Info: Hosts: localhost.localdomain, 192.168.0.158; OS: Unix
Nmap scan report for 192.168.0.166
Host is up (0.0010s latency). All 1000 scanned ports on 192.168.0.166 are closed MAC Address: 00:0C:29:09:D0:B5 (VMware)
Nmap scan report for 192.168.0.169
Host is up (0.00072s latency). Not shown: 996 filtered ports PORT STATE SERVICE VERSION 443/tcp open ssl/https 902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP) 912/tcp open vmware-auth VMware Authentication Daemon 1.0 (Uses VNC, SOAP) 5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) MAC Address: F4:8E:38:E5:F1:94 (Dell) Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Nmap scan report for 192.168.0.173
Host is up (0.0010s latency). All 1000 scanned ports on 192.168.0.173 are closed MAC Address: 00:0C:29:67:E8:F4 (VMware)
Nmap scan report for 192.168.0.178
Host is up (0.00059s latency). Not shown: 999 closed ports PORT STATE SERVICE VERSION 1433/tcp open ms-sql-s Microsoft SQL Server vNext tech preview 14.00.3025 MAC Address: 84:7B:EB:FD:EA:FF (Dell)
Nmap scan report for 192.168.0.182
Host is up (0.0021s latency). All 1000 scanned ports on 192.168.0.182 are closed MAC Address: 08:00:27:EF:7F:0A (Oracle VirtualBox virtual NIC)
Nmap scan report for 192.168.0.184
Host is up (0.00067s latency). Not shown: 997 closed ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.18 ((Ubuntu)) 443/tcp open ssl/https VMware Workstation SOAP API 14.1.1 902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP) MAC Address: 24:F5:AA:F6:64:6F (Samsung Electronics) Service Info: CPE: cpe:/o:vmware:Workstation:14.1.1
Nmap scan report for 192.168.0.191
Host is up (0.00092s latency). Not shown: 997 filtered ports PORT STATE SERVICE VERSION 80/tcp open http Microsoft IIS httpd 10.0 443/tcp open https 3306/tcp open mysql MySQL (unauthorized) MAC Address: 1C:39:47:0E:15:01 (Compal Information (kunshan)) Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Nmap scan report for 192.168.0.201
Host is up (0.00051s latency). Not shown: 997 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 6.7p1 Raspbian 5+deb8u4 (protocol 2.0) 80/tcp open http Apache httpd 2.0.48 111/tcp open rpcbind 2-4 (RPC #100000) MAC Address: B8:27:EB:BA:2F:E3 (Raspberry Pi Foundation) Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for graylog.labcom.estig.ipb.pt (192.168.0.202)
Host is up (0.00030s latency). Not shown: 997 closed ports PORT STATE SERVICE VERSION 514/tcp open shell? 9000/tcp open cslistener? 30000/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u3 (protocol 2.0) MAC Address: 00:23:54:F5:E6:12 (Asustek Computer) Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for 192.168.0.203
Host is up (0.00065s latency). Not shown: 999 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.10 (Ubuntu Linux; protocol 2.0) MAC Address: 00:0C:29:31:88:C6 (VMware) Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for metasploitable.labcom.estig.ipb.pt (192.168.0.245)
Host is up (0.00047s latency). Not shown: 978 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 2.3.4 22/tcp open ssh OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0) 23/tcp open telnet Linux telnetd 25/tcp open smtp Postfix smtpd 53/tcp open domain ISC BIND 9.4.2 80/tcp open http Apache httpd 2.2.8 ((Ubuntu) DAV/2) 111/tcp open rpcbind 2 (RPC #100000) 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) 445/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) 512/tcp open exec netkit-rsh rexecd 513/tcp open login? 514/tcp open tcpwrapped 1099/tcp open rmiregistry GNU Classpath grmiregistry 1524/tcp open bindshell Metasploitable root shell 2049/tcp open nfs 2-4 (RPC #100003) 2121/tcp open ftp ProFTPD 1.3.1 5432/tcp open postgresql PostgreSQL DB 8.3.0 - 8.3.7 5900/tcp open vnc VNC (protocol 3.3) 6000/tcp open X11 (access denied) 6667/tcp open irc UnrealIRCd 8009/tcp open ajp13 Apache Jserv (Protocol v1.3) 8180/tcp open http Apache Tomcat/Coyote JSP engine 1.1 MAC Address: 00:50:56:3B:C9:2A (VMware) Service Info: Hosts: metasploitable.localdomain, localhost, irc.Metasploitable.LAN; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for 192.168.0.248
Host is up (0.00046s latency). Not shown: 992 filtered ports PORT STATE SERVICE VERSION 20/tcp closed ftp-data 21/tcp open ftp vsftpd (broken: could not bind listening IPv4 socket) 22/tcp open ssh OpenSSH 4.3 (protocol 1.99) 25/tcp open smtp Sendmail 8.13.7/8.13.7 80/tcp open http Apache httpd 2.0.55 ((Unix) PHP/5.1.2) 110/tcp open pop3 Openwall popa3d 143/tcp open imap UW imapd 2004.357 443/tcp closed https MAC Address: 00:0C:29:F3:A4:C9 (VMware) Service Info: Host: slax.example.net; OS: Unix
Nmap scan report for 192.168.0.249
Host is up (0.00050s latency). Not shown: 996 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 2.0.4 22/tcp open ssh OpenSSH 4.3 (protocol 1.99) 80/tcp open http Apache httpd 2.2.4 ((Unix) mod_ssl/2.2.4 OpenSSL/0.9.8b DAV/2) 631/tcp open ipp CUPS 1.1 MAC Address: 00:0C:29:43:79:D5 (VMware) Service Info: OS: Unix
Nmap scan report for 192.168.0.250
Host is up (0.00044s latency). Not shown: 992 filtered ports PORT STATE SERVICE VERSION 20/tcp closed ftp-data 21/tcp open ftp vsftpd 2.0.4 22/tcp open ssh OpenSSH 4.3 (protocol 1.99) 25/tcp open smtp Sendmail 8.13.7/8.13.7 80/tcp open http Apache httpd 2.0.55 ((Unix) PHP/5.1.2) 110/tcp open pop3 Openwall popa3d 143/tcp open imap UW imapd 2004.357 443/tcp closed https MAC Address: 00:0C:29:75:D7:08 (VMware) Service Info: Host: slax.example.net; OS: Unix
Nmap scan report for dmz-lc.estig.ipb.pt (192.168.0.254)
Host is up (0.00081s latency). Not shown: 996 filtered ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.2 (protocol 2.0) 53/tcp open domain dnsmasq 2.78 80/tcp open http nginx 443/tcp open ssl/http nginx MAC Address: 00:0C:29:55:35:40 (VMware)
Nmap scan report for 192.168.0.175
Host is up (0.000031s latency). All 1000 scanned ports on 192.168.0.175 are closed
Service detection performed. Please report any incorrect results at
https://nmap.org/submit/ . Nmap done: 256 IP addresses (29 hosts up) scanned in 186.78 seconds