Sie sind auf Seite 1von 5

Starting Nmap 7.70 ( https://nmap.

org ) at 2018-05-26 14:17 WEST


Nmap scan report for 192.168.0.100
Host is up (0.00096s latency).
Not shown: 993 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.4 (Ubuntu Linux;
protocol 2.0)
25/tcp open smtp Postfix smtpd
443/tcp open ssl/https
902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC,
SOAP)
3000/tcp open http Golang net/http server (Go-IPFS json-rpc or
InfluxDB API)
8181/tcp open tcpwrapped
10000/tcp open snet-sensor-mgmt?
MAC Address: 54:AB:3A:D5:09:C9 (Quanta Computer)
Service Info: Host: kahe-Ubuntu.wifi.ipb.pt; OS: Linux; CPE:
cpe:/o:linux:linux_kernel

Nmap scan report for 192.168.0.101


Host is up (0.0017s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
23/tcp open tcpwrapped
80/tcp open http EHTTP/1.1
280/tcp open http-mgmt?
MAC Address: 00:60:B0:CF:1B:6F (Hewlett Packard)

Nmap scan report for 192.168.0.106


Host is up (0.00015s latency).
All 1000 scanned ports on 192.168.0.106 are filtered
MAC Address: 54:E1:AD:9E:DE:CF (Lcfc(hefei) Electronics Technology)

Nmap scan report for 192.168.0.108


Host is up (0.00045s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
443/tcp open ssl/https
902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP)
MAC Address: 84:7B:EB:F9:AE:49 (Dell)

Nmap scan report for 192.168.0.109


Host is up (0.00051s latency).
Not shown: 996 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.2p2 Ubuntu 6 (Ubuntu Linux; protocol 2.0)
80/tcp open http Apache httpd 2.4.6 ((Ubuntu))
5001/tcp open java-rmi Java RMI
8080/tcp open http Apache Tomcat/Coyote JSP engine 1.1
MAC Address: 00:0C:29:BB:14:F1 (VMware)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Nmap scan report for 192.168.0.153


Host is up (0.0010s latency).
Not shown: 996 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux;
protocol 2.0)
80/tcp open http Apache httpd 2.4.18 ((Ubuntu))
443/tcp open ssl/https
902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP)
1 service unrecognized despite returning data. If you know the service/version,
please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-
service :
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=5/26%Time=5B095E95%P=x86_64-pc-linux-gnu
SF:%r(GetRequest,A5,"HTTP/1\.1\x20403\x20Forbidden\r\nDate:\x20Sat,\x2026\
SF:x20May\x202018\x2013:18:13\x20GMT\r\nConnection:\x20close\r\nContent-Ty
SF:pe:\x20text/plain;\x20charset=utf-8\r\nX-Frame-Options:\x20DENY\r\nCont
SF:ent-Length:\x200\r\n\r\n")%r(HTTPOptions,AB,"HTTP/1\.1\x20501\x20Not\x2
SF:0Implemented\r\nDate:\x20Sat,\x2026\x20May\x202018\x2013:18:13\x20GMT\r
SF:\nConnection:\x20close\r\nContent-Type:\x20text/plain;\x20charset=utf-8
SF:\r\nX-Frame-Options:\x20DENY\r\nContent-Length:\x200\r\n\r\n")%r(FourOh
SF:FourRequest,A5,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Sat,\x2026
SF:\x20May\x202018\x2013:18:13\x20GMT\r\nConnection:\x20close\r\nContent-T
SF:ype:\x20text/plain;\x20charset=utf-8\r\nX-Frame-Options:\x20DENY\r\nCon
SF:tent-Length:\x200\r\n\r\n")%r(RTSPRequest,B3,"HTTP/1\.1\x20400\x20Bad\x
SF:20Request\r\nDate:\x20Sat,\x2026\x20May\x202018\x2013:18:23\x20GMT\r\nC
SF:onnection:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2
SF:050\r\n\r\n<HTML><BODY><H1>400\x20Bad\x20Request</H1></BODY></HTML>")%r
SF:(SIPOptions,B3,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sat,\x20
SF:26\x20May\x202018\x2013:19:26\x20GMT\r\nConnection:\x20close\r\nContent
SF:-Type:\x20text/html\r\nContent-Length:\x2050\r\n\r\n<HTML><BODY><H1>400
SF:\x20Bad\x20Request</H1></BODY></HTML>");
MAC Address: 78:2B:CB:ED:A9:5A (Dell)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Nmap scan report for 192.168.0.156


Host is up (0.00099s latency).
All 1000 scanned ports on 192.168.0.156 are closed
MAC Address: 08:00:27:C5:0D:1C (Oracle VirtualBox virtual NIC)

Nmap scan report for 192.168.0.158


Host is up (0.00085s latency).
Not shown: 993 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 4.7 (protocol 2.0)
25/tcp open smtp Sendmail 8.14.1/8.14.1
80/tcp open http Apache httpd 2.2.6 ((Fedora))
110/tcp open pop3 ipop3d 2006k.101
111/tcp open rpcbind 2-4 (RPC #100000)
143/tcp open imap University of Washington IMAP imapd 2006k.396 (time zone:
-0400)
901/tcp open http Samba SWAT administration server
MAC Address: 00:0C:29:C5:49:AF (VMware)
Service Info: Hosts: localhost.localdomain, 192.168.0.158; OS: Unix

Nmap scan report for 192.168.0.166


Host is up (0.0010s latency).
All 1000 scanned ports on 192.168.0.166 are closed
MAC Address: 00:0C:29:09:D0:B5 (VMware)

Nmap scan report for 192.168.0.169


Host is up (0.00072s latency).
Not shown: 996 filtered ports
PORT STATE SERVICE VERSION
443/tcp open ssl/https
902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP)
912/tcp open vmware-auth VMware Authentication Daemon 1.0 (Uses VNC, SOAP)
5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
MAC Address: F4:8E:38:E5:F1:94 (Dell)
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Nmap scan report for 192.168.0.173


Host is up (0.0010s latency).
All 1000 scanned ports on 192.168.0.173 are closed
MAC Address: 00:0C:29:67:E8:F4 (VMware)

Nmap scan report for 192.168.0.178


Host is up (0.00059s latency).
Not shown: 999 closed ports
PORT STATE SERVICE VERSION
1433/tcp open ms-sql-s Microsoft SQL Server vNext tech preview 14.00.3025
MAC Address: 84:7B:EB:FD:EA:FF (Dell)

Nmap scan report for 192.168.0.182


Host is up (0.0021s latency).
All 1000 scanned ports on 192.168.0.182 are closed
MAC Address: 08:00:27:EF:7F:0A (Oracle VirtualBox virtual NIC)

Nmap scan report for 192.168.0.184


Host is up (0.00067s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.18 ((Ubuntu))
443/tcp open ssl/https VMware Workstation SOAP API 14.1.1
902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP)
MAC Address: 24:F5:AA:F6:64:6F (Samsung Electronics)
Service Info: CPE: cpe:/o:vmware:Workstation:14.1.1

Nmap scan report for 192.168.0.191


Host is up (0.00092s latency).
Not shown: 997 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 10.0
443/tcp open https
3306/tcp open mysql MySQL (unauthorized)
MAC Address: 1C:39:47:0E:15:01 (Compal Information (kunshan))
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Nmap scan report for 192.168.0.201


Host is up (0.00051s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.7p1 Raspbian 5+deb8u4 (protocol 2.0)
80/tcp open http Apache httpd 2.0.48
111/tcp open rpcbind 2-4 (RPC #100000)
MAC Address: B8:27:EB:BA:2F:E3 (Raspberry Pi Foundation)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Nmap scan report for graylog.labcom.estig.ipb.pt (192.168.0.202)


Host is up (0.00030s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
514/tcp open shell?
9000/tcp open cslistener?
30000/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u3 (protocol 2.0)
MAC Address: 00:23:54:F5:E6:12 (Asustek Computer)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Nmap scan report for 192.168.0.203


Host is up (0.00065s latency).
Not shown: 999 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.10 (Ubuntu Linux; protocol
2.0)
MAC Address: 00:0C:29:31:88:C6 (VMware)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Nmap scan report for metasploitable.labcom.estig.ipb.pt (192.168.0.245)


Host is up (0.00047s latency).
Not shown: 978 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 2.3.4
22/tcp open ssh OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0)
23/tcp open telnet Linux telnetd
25/tcp open smtp Postfix smtpd
53/tcp open domain ISC BIND 9.4.2
80/tcp open http Apache httpd 2.2.8 ((Ubuntu) DAV/2)
111/tcp open rpcbind 2 (RPC #100000)
139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
445/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
512/tcp open exec netkit-rsh rexecd
513/tcp open login?
514/tcp open tcpwrapped
1099/tcp open rmiregistry GNU Classpath grmiregistry
1524/tcp open bindshell Metasploitable root shell
2049/tcp open nfs 2-4 (RPC #100003)
2121/tcp open ftp ProFTPD 1.3.1
5432/tcp open postgresql PostgreSQL DB 8.3.0 - 8.3.7
5900/tcp open vnc VNC (protocol 3.3)
6000/tcp open X11 (access denied)
6667/tcp open irc UnrealIRCd
8009/tcp open ajp13 Apache Jserv (Protocol v1.3)
8180/tcp open http Apache Tomcat/Coyote JSP engine 1.1
MAC Address: 00:50:56:3B:C9:2A (VMware)
Service Info: Hosts: metasploitable.localdomain, localhost,
irc.Metasploitable.LAN; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

Nmap scan report for 192.168.0.248


Host is up (0.00046s latency).
Not shown: 992 filtered ports
PORT STATE SERVICE VERSION
20/tcp closed ftp-data
21/tcp open ftp vsftpd (broken: could not bind listening IPv4 socket)
22/tcp open ssh OpenSSH 4.3 (protocol 1.99)
25/tcp open smtp Sendmail 8.13.7/8.13.7
80/tcp open http Apache httpd 2.0.55 ((Unix) PHP/5.1.2)
110/tcp open pop3 Openwall popa3d
143/tcp open imap UW imapd 2004.357
443/tcp closed https
MAC Address: 00:0C:29:F3:A4:C9 (VMware)
Service Info: Host: slax.example.net; OS: Unix

Nmap scan report for 192.168.0.249


Host is up (0.00050s latency).
Not shown: 996 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 2.0.4
22/tcp open ssh OpenSSH 4.3 (protocol 1.99)
80/tcp open http Apache httpd 2.2.4 ((Unix) mod_ssl/2.2.4 OpenSSL/0.9.8b
DAV/2)
631/tcp open ipp CUPS 1.1
MAC Address: 00:0C:29:43:79:D5 (VMware)
Service Info: OS: Unix

Nmap scan report for 192.168.0.250


Host is up (0.00044s latency).
Not shown: 992 filtered ports
PORT STATE SERVICE VERSION
20/tcp closed ftp-data
21/tcp open ftp vsftpd 2.0.4
22/tcp open ssh OpenSSH 4.3 (protocol 1.99)
25/tcp open smtp Sendmail 8.13.7/8.13.7
80/tcp open http Apache httpd 2.0.55 ((Unix) PHP/5.1.2)
110/tcp open pop3 Openwall popa3d
143/tcp open imap UW imapd 2004.357
443/tcp closed https
MAC Address: 00:0C:29:75:D7:08 (VMware)
Service Info: Host: slax.example.net; OS: Unix

Nmap scan report for dmz-lc.estig.ipb.pt (192.168.0.254)


Host is up (0.00081s latency).
Not shown: 996 filtered ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.2 (protocol 2.0)
53/tcp open domain dnsmasq 2.78
80/tcp open http nginx
443/tcp open ssl/http nginx
MAC Address: 00:0C:29:55:35:40 (VMware)

Nmap scan report for 192.168.0.175


Host is up (0.000031s latency).
All 1000 scanned ports on 192.168.0.175 are closed

Service detection performed. Please report any incorrect results at


https://nmap.org/submit/ .
Nmap done: 256 IP addresses (29 hosts up) scanned in 186.78 seconds

Das könnte Ihnen auch gefallen