Nmap Scan
└─$ nmap -A -T4 10.10.24.150 -vv -oN nmapscan_topports [145/222]
Starting Nmap 7.93 ( <https://nmap.org> ) at 2023-06-05 10:32 EDT
NSE: Loaded 155 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 10:32
Completed NSE at 10:32, 0.00s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 10:32
Completed NSE at 10:32, 0.00s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 10:32
Completed NSE at 10:32, 0.00s elapsed
Initiating Ping Scan at 10:32
Scanning 10.10.24.150 [2 ports]
Completed Ping Scan at 10:32, 0.40s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 10:32
Completed Parallel DNS resolution of 1 host. at 10:32, 0.04s elapsed
Initiating Connect Scan at 10:32
Scanning 10.10.24.150 [1000 ports]
Discovered open port 22/tcp on 10.10.24.150
Discovered open port 445/tcp on 10.10.24.150
Discovered open port 80/tcp on 10.10.24.150
Discovered open port 139/tcp on 10.10.24.150
Discovered open port 8080/tcp on 10.10.24.150
Increasing send delay for 10.10.24.150 from 0 to 5 due to 106 out of 264 dropped probes since last increase.
Discovered open port 8009/tcp on 10.10.24.150
Completed Connect Scan at 10:32, 14.88s elapsed (1000 total ports)
Initiating Service scan at 10:32
Scanning 6 services on 10.10.24.150
Completed Service scan at 10:35, 150.94s elapsed (6 services on 1 host)
NSE: Script scanning 10.10.24.150.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 10:35
Completed NSE at 10:35, 7.79s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 10:35
Completed NSE at 10:35, 0.88s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 10:35
Completed NSE at 10:35, 0.00s elapsed
Nmap scan report for 10.10.24.150
Host is up, received syn-ack (0.25s latency).└─$ nmap -A -T4 10.10.24.150 -vv -oN nmapscan_topports [145/222]
Starting Nmap 7.93 ( <https://nmap.org> ) at 2023-06-05 10:32 EDT
NSE: Loaded 155 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 10:32
Completed NSE at 10:32, 0.00s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 10:32
Completed NSE at 10:32, 0.00s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 10:32
Completed NSE at 10:32, 0.00s elapsed
Initiating Ping Scan at 10:32
Scanning 10.10.24.150 [2 ports]
Completed Ping Scan at 10:32, 0.40s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 10:32
Completed Parallel DNS resolution of 1 host. at 10:32, 0.04s elapsed
Initiating Connect Scan at 10:32
Scanning 10.10.24.150 [1000 ports]
Discovered open port 22/tcp on 10.10.24.150
Discovered open port 445/tcp on 10.10.24.150
Discovered open port 80/tcp on 10.10.24.150
Discovered open port 139/tcp on 10.10.24.150
Discovered open port 8080/tcp on 10.10.24.150
Increasing send delay for 10.10.24.150 from 0 to 5 due to 106 out of 264 dropped probes since last increase.
Discovered open port 8009/tcp on 10.10.24.150
Completed Connect Scan at 10:32, 14.88s elapsed (1000 total ports)
Initiating Service scan at 10:32
Scanning 6 services on 10.10.24.150
Completed Service scan at 10:35, 150.94s elapsed (6 services on 1 host)
NSE: Script scanning 10.10.24.150.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 10:35
Completed NSE at 10:35, 7.79s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 10:35
Completed NSE at 10:35, 0.88s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 10:35
Completed NSE at 10:35, 0.00s elapsed
Nmap scan report for 10.10.24.150
Host is up, received syn-ack (0.25s latency).
Scanned at 2023-06-05 10:32:16 EDT for 175s
Not shown: 994 closed tcp ports (conn-refused)
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack OpenSSH 7.2p2 Ubuntu 4ubuntu2.4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 db45cbbe4a8b71f8e93142aefff845e4 (RSA)
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZXasCfWSXQ9lYiKbTNkPs0T+wFym2lZy229LllhY6iDLrjm7LIkhCcrlgnJQtLxl5NPhlHNVmwhlkcPPiAHwluhMVE5xKihQj3i+Ucx2IwiFvfmCz4AKsWlR6N8IZe55Ltw0lcH9ykuKZddg81X8
5EVsNbMacJNjjyxAtwQmJt1F5kB1B2ixgjLLOyNWafC5g1h6XbEgB2wiSRJ5UA8rOZaF28YcDVo0MQhsKpQG/5oPmQUsIeJTUA/XkoWCjvXZqHwv8XInQLQu3VXKgv735G+CJaKzplh7FZyXju8ViDSAY8gdhqpJommYxzqu9s1M31cmFg2fT5V1z9s4D
P/vd
| 256 09b9b91ce0bf0e1c6f7ffe8e5f201bce (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBP0SXJpgwPf/e9AT9ri/dlAnkob4PqzMjl2Q9lZIVIXeEFJ9sfRkC+tgSjk9PwK0DUO3JU27pmtAkDL4Mtv9eZw=
| 256 a5682b225f984a62213da2e2c5a9f7c2 (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAzy8ZacWXbPGeqtuiJCnPP0LYZYZlMj5D1ZY9ldg1wU
80/tcp open http syn-ack Apache httpd 2.4.18 ((Ubuntu))
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Site doesn't have a title (text/html).
| http-methods:
|_ Supported Methods: POST OPTIONS GET HEAD
139/tcp open netbios-ssn syn-ack Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
445/tcp open netbios-ssn syn-ack Samba smbd 4.3.11-Ubuntu (workgroup: WORKGROUP)
8009/tcp open ajp13? syn-ack
| ajp-methods:
|_ Supported methods: GET HEAD POST OPTIONS
8080/tcp open http-proxy syn-ack
|_http-favicon: Apache Tomcat
|_http-open-proxy: Proxy might be redirecting requests
| fingerprint-strings:
| WMSRequest:
| HTTP/1.1 400
| Content-Type: text/html;charset=utf-8
| Content-Language: en
| Content-Length: 2243
| Date: Mon, 05 Jun 2023 14:34:59 GMT
| Connection: close
| <!doctype html><html lang="en"><head><title>HTTP Status 400
| Request</title><style type="text/css">h1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} h2 {font-family:Tahoma,Arial,sans-serif;color:white
;background-color:#525D76;font-size:16px;} h3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} body {font-family:Tahoma,Arial,sans-serif;color:blac
k;background-color:white;} b {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} p {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}
a {color:black;} a.name {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><bod
| oracle-tns:
| HTTP/1.1 400
| Content-Type: text/html;charset=utf-8
| Content-Language: en
| Content-Length: 2243
| Date: Mon, 05 Jun 2023 14:35:00 GMT
| Connection: close
| <!doctype html><html lang="en"><head><title>HTTP Status 400
|_ Request</title><style type="text/css">h1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} h2 {font-family:Tahoma,Arial,sans-serif;color:white
;background-color:#525D76;font-size:16px;} h3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} body {font-family:Tahoma,Arial,sans-serif;color:blac
k;background-color:white;} b {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} p {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}
a {color:black;} a.name {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><bod
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-title: Apache Tomcat/9.0.7
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at <https://nmap.org/cgi-bin/submit.cgi?new-service> :
SF-Port8080-TCP:V=7.93%I=7%D=6/5%Time=647DF294%P=x86_64-pc-linux-gnu%r(WMS
SF:Request,95F,"HTTP/1\\.1\\x20400\\x20\\r\\nContent-Type:\\x20text/html;charset
SF:=utf-8\\r\\nContent-Language:\\x20en\\r\\nContent-Length:\\x202243\\r\\nDate:\\x
SF:20Mon,\\x2005\\x20Jun\\x202023\\x2014:34:59\\x20GMT\\r\\nConnection:\\x20close\\
SF:r\\n\\r\\n<!doctype\\x20html><html\\x20lang=\\"en\\"><head><title>HTTP\\x20Stat
SF:us\\x20400\\x20\\xe2\\x80\\x93\\x20Bad\\x20Request</title><style\\x20type=\\"tex
SF:t/css\\">h1\\x20{font-family:Tahoma,Arial,sans-serif;color:white;backgrou
SF:nd-color:#525D76;font-size:22px;}\\x20h2\\x20{font-family:Tahoma,Arial,sa
SF:ns-serif;color:white;background-color:#525D76;font-size:16px;}\\x20h3\\x2
SF:0{font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525
SF:D76;font-size:14px;}\\x20body\\x20{font-family:Tahoma,Arial,sans-serif;co
SF:lor:black;background-color:white;}\\x20b\\x20{font-family:Tahoma,Arial,sa
SF:ns-serif;color:white;background-color:#525D76;}\\x20p\\x20{font-family:Ta
SF:homa,Arial,sans-serif;background:white;color:black;font-size:12px;}\\x20
SF:a\\x20{color:black;}\\x20a\\.name\\x20{color:black;}\\x20\\.line\\x20{height:1
SF:px;background-color:#525D76;border:none;}</style></head><bod")%r(oracle
SF:-tns,95F,"HTTP/1\\.1\\x20400\\x20\\r\\nContent-Type:\\x20text/html;charset=ut
SF:f-8\\r\\nContent-Language:\\x20en\\r\\nContent-Length:\\x202243\\r\\nDate:\\x20M
SF:on,\\x2005\\x20Jun\\x202023\\x2014:35:00\\x20GMT\\r\\nConnection:\\x20close\\r\\n
SF:\\r\\n<!doctype\\x20html><html\\x20lang=\\"en\\"><head><title>HTTP\\x20Status\\
SF:x20400\\x20\\xe2\\x80\\x93\\x20Bad\\x20Request</title><style\\x20type=\\"text/c
SF:ss\\">h1\\x20{font-family:Tahoma,Arial,sans-serif;color:white;background-
SF:color:#525D76;font-size:22px;}\\x20h2\\x20{font-family:Tahoma,Arial,sans-
SF:serif;color:white;background-color:#525D76;font-size:16px;}\\x20h3\\x20{f
SF:ont-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76
SF::black;background-color:white;}\\x20b\\x20{font-family:Tahoma,Arial,sans-
SF:serif;color:white;background-color:#525D76;}\\x20p\\x20{font-family:Tahom
SF:a,Arial,sans-serif;background:white;color:black;font-size:12px;}\\x20a\\x
SF:20{color:black;}\\x20a\\.name\\x20{color:black;}\\x20\\.line\\x20{height:1px;
SF:background-color:#525D76;border:none;}</style></head><bod");
Service Info: Host: BASIC2; OS: Linux; CPE: cpe:/o:linux:linux_kernel
Host script results:
| smb-security-mode:
| account_used: guest
| authentication_level: user
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
| smb2-security-mode:
| 311:
|_ Message signing enabled but not required
|_clock-skew: mean: 1h20m00s, deviation: 2h18m35s, median: 0s
| nbstat: NetBIOS name: BASIC2, NetBIOS user: <unknown>, NetBIOS MAC: 000000000000 (Xerox)
| Names:
| BASIC2<00> Flags: <unique><active>
| BASIC2<03> Flags: <unique><active>
| BASIC2<20> Flags: <unique><active>
| \\x01\\x02__MSBROWSE__\\x02<01> Flags: <group><active>
| WORKGROUP<00> Flags: <group><active>
| WORKGROUP<1d> Flags: <unique><active>
| WORKGROUP<1e> Flags: <group><active>
| Statistics:
| 0000000000000000000000000000000000
| 0000000000000000000000000000000000
|_ 0000000000000000000000000000
| smb2-time:
| date: 2023-06-05T14:35:03
|_ start_date: N/A
| p2p-conficker:
| Checking for Conficker.C or higher...
| Check 1 (port 59558/tcp): CLEAN (Couldn't connect)
| Check 2 (port 26083/tcp): CLEAN (Couldn't connect)
| Check 3 (port 50934/udp): CLEAN (Failed to receive data)
| Check 4 (port 32522/udp): CLEAN (Failed to receive data)
|_ 0/4 checks are positive: Host is CLEAN or ports are blocked
| smb-os-discovery:
| OS: Windows 6.1 (Samba 4.3.11-Ubuntu)
| Computer name: basic2
| NetBIOS computer name: BASIC2\\x00
| Domain name: \\x00
| FQDN: basic2
|_ System time: 2023-06-05T10:35:04-04:00
NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 10:35
Completed NSE at 10:35, 0.00s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 10:35
Completed NSE at 10:35, 0.00s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 10:35
Completed NSE at 10:35, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at <https://nmap.org/submit/> .
Nmap done: 1 IP address (1 host up) scanned in 175.45 seconds
smbclient
-