Nmap Scan

└─$ nmap -A -T4 10.10.24.150 -vv -oN nmapscan_topports                                                                                                                              [145/222]
Starting Nmap 7.93 ( <https://nmap.org> ) at 2023-06-05 10:32 EDT                                                                                                                              
NSE: Loaded 155 scripts for scanning.                                                                                                                                                        
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 10:32
Completed NSE at 10:32, 0.00s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 10:32
Completed NSE at 10:32, 0.00s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 10:32
Completed NSE at 10:32, 0.00s elapsed
Initiating Ping Scan at 10:32
Scanning 10.10.24.150 [2 ports]
Completed Ping Scan at 10:32, 0.40s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 10:32
Completed Parallel DNS resolution of 1 host. at 10:32, 0.04s elapsed
Initiating Connect Scan at 10:32
Scanning 10.10.24.150 [1000 ports]
Discovered open port 22/tcp on 10.10.24.150
Discovered open port 445/tcp on 10.10.24.150
Discovered open port 80/tcp on 10.10.24.150
Discovered open port 139/tcp on 10.10.24.150
Discovered open port 8080/tcp on 10.10.24.150
Increasing send delay for 10.10.24.150 from 0 to 5 due to 106 out of 264 dropped probes since last increase.
Discovered open port 8009/tcp on 10.10.24.150
Completed Connect Scan at 10:32, 14.88s elapsed (1000 total ports)
Initiating Service scan at 10:32
Scanning 6 services on 10.10.24.150
Completed Service scan at 10:35, 150.94s elapsed (6 services on 1 host)
NSE: Script scanning 10.10.24.150.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 10:35
Completed NSE at 10:35, 7.79s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 10:35
Completed NSE at 10:35, 0.88s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 10:35
Completed NSE at 10:35, 0.00s elapsed
Nmap scan report for 10.10.24.150
Host is up, received syn-ack (0.25s latency).└─$ nmap -A -T4 10.10.24.150 -vv -oN nmapscan_topports                                                                                                                              [145/222]
Starting Nmap 7.93 ( <https://nmap.org> ) at 2023-06-05 10:32 EDT                                                                                                                              
NSE: Loaded 155 scripts for scanning.                                                                                                                                                        
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 10:32
Completed NSE at 10:32, 0.00s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 10:32
Completed NSE at 10:32, 0.00s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 10:32
Completed NSE at 10:32, 0.00s elapsed
Initiating Ping Scan at 10:32
Scanning 10.10.24.150 [2 ports]
Completed Ping Scan at 10:32, 0.40s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 10:32
Completed Parallel DNS resolution of 1 host. at 10:32, 0.04s elapsed
Initiating Connect Scan at 10:32
Scanning 10.10.24.150 [1000 ports]
Discovered open port 22/tcp on 10.10.24.150
Discovered open port 445/tcp on 10.10.24.150
Discovered open port 80/tcp on 10.10.24.150
Discovered open port 139/tcp on 10.10.24.150
Discovered open port 8080/tcp on 10.10.24.150
Increasing send delay for 10.10.24.150 from 0 to 5 due to 106 out of 264 dropped probes since last increase.
Discovered open port 8009/tcp on 10.10.24.150
Completed Connect Scan at 10:32, 14.88s elapsed (1000 total ports)
Initiating Service scan at 10:32
Scanning 6 services on 10.10.24.150
Completed Service scan at 10:35, 150.94s elapsed (6 services on 1 host)
NSE: Script scanning 10.10.24.150.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 10:35
Completed NSE at 10:35, 7.79s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 10:35
Completed NSE at 10:35, 0.88s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 10:35
Completed NSE at 10:35, 0.00s elapsed
Nmap scan report for 10.10.24.150
Host is up, received syn-ack (0.25s latency).
Scanned at 2023-06-05 10:32:16 EDT for 175s
Not shown: 994 closed tcp ports (conn-refused)
PORT     STATE SERVICE     REASON  VERSION
22/tcp   open  ssh         syn-ack OpenSSH 7.2p2 Ubuntu 4ubuntu2.4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 db45cbbe4a8b71f8e93142aefff845e4 (RSA) 
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZXasCfWSXQ9lYiKbTNkPs0T+wFym2lZy229LllhY6iDLrjm7LIkhCcrlgnJQtLxl5NPhlHNVmwhlkcPPiAHwluhMVE5xKihQj3i+Ucx2IwiFvfmCz4AKsWlR6N8IZe55Ltw0lcH9ykuKZddg81X8
5EVsNbMacJNjjyxAtwQmJt1F5kB1B2ixgjLLOyNWafC5g1h6XbEgB2wiSRJ5UA8rOZaF28YcDVo0MQhsKpQG/5oPmQUsIeJTUA/XkoWCjvXZqHwv8XInQLQu3VXKgv735G+CJaKzplh7FZyXju8ViDSAY8gdhqpJommYxzqu9s1M31cmFg2fT5V1z9s4D
P/vd
|   256 09b9b91ce0bf0e1c6f7ffe8e5f201bce (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBP0SXJpgwPf/e9AT9ri/dlAnkob4PqzMjl2Q9lZIVIXeEFJ9sfRkC+tgSjk9PwK0DUO3JU27pmtAkDL4Mtv9eZw=
|   256 a5682b225f984a62213da2e2c5a9f7c2 (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAzy8ZacWXbPGeqtuiJCnPP0LYZYZlMj5D1ZY9ldg1wU
80/tcp   open  http        syn-ack Apache httpd 2.4.18 ((Ubuntu))
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Site doesn't have a title (text/html).
| http-methods: 
|_  Supported Methods: POST OPTIONS GET HEAD
139/tcp  open  netbios-ssn syn-ack Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
445/tcp  open  netbios-ssn syn-ack Samba smbd 4.3.11-Ubuntu (workgroup: WORKGROUP)
8009/tcp open  ajp13?      syn-ack
| ajp-methods: 
|_  Supported methods: GET HEAD POST OPTIONS
8080/tcp open  http-proxy  syn-ack
|_http-favicon: Apache Tomcat
|_http-open-proxy: Proxy might be redirecting requests
| fingerprint-strings: 
|   WMSRequest: 
|     HTTP/1.1 400 
|     Content-Type: text/html;charset=utf-8
|     Content-Language: en
|     Content-Length: 2243
|     Date: Mon, 05 Jun 2023 14:34:59 GMT
|     Connection: close
|     <!doctype html><html lang="en"><head><title>HTTP Status 400 
|     Request</title><style type="text/css">h1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} h2 {font-family:Tahoma,Arial,sans-serif;color:white
;background-color:#525D76;font-size:16px;} h3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} body {font-family:Tahoma,Arial,sans-serif;color:blac
k;background-color:white;} b {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} p {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}
 a {color:black;} a.name {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><bod
|   oracle-tns:
|     HTTP/1.1 400 
|     Content-Type: text/html;charset=utf-8
|     Content-Language: en
|     Content-Length: 2243
|     Date: Mon, 05 Jun 2023 14:35:00 GMT
|     Connection: close
|     <!doctype html><html lang="en"><head><title>HTTP Status 400 
|_    Request</title><style type="text/css">h1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} h2 {font-family:Tahoma,Arial,sans-serif;color:white
;background-color:#525D76;font-size:16px;} h3 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:14px;} body {font-family:Tahoma,Arial,sans-serif;color:blac
k;background-color:white;} b {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;} p {font-family:Tahoma,Arial,sans-serif;background:white;color:black;font-size:12px;}
 a {color:black;} a.name {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><bod
| http-methods: 
|_  Supported Methods: GET HEAD POST OPTIONS
|_http-title: Apache Tomcat/9.0.7
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at <https://nmap.org/cgi-bin/submit.cgi?new-service> :
SF-Port8080-TCP:V=7.93%I=7%D=6/5%Time=647DF294%P=x86_64-pc-linux-gnu%r(WMS
SF:Request,95F,"HTTP/1\\.1\\x20400\\x20\\r\\nContent-Type:\\x20text/html;charset
SF:=utf-8\\r\\nContent-Language:\\x20en\\r\\nContent-Length:\\x202243\\r\\nDate:\\x
SF:20Mon,\\x2005\\x20Jun\\x202023\\x2014:34:59\\x20GMT\\r\\nConnection:\\x20close\\
SF:r\\n\\r\\n<!doctype\\x20html><html\\x20lang=\\"en\\"><head><title>HTTP\\x20Stat
SF:us\\x20400\\x20\\xe2\\x80\\x93\\x20Bad\\x20Request</title><style\\x20type=\\"tex
SF:t/css\\">h1\\x20{font-family:Tahoma,Arial,sans-serif;color:white;backgrou
SF:nd-color:#525D76;font-size:22px;}\\x20h2\\x20{font-family:Tahoma,Arial,sa
SF:ns-serif;color:white;background-color:#525D76;font-size:16px;}\\x20h3\\x2
SF:0{font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525
SF:D76;font-size:14px;}\\x20body\\x20{font-family:Tahoma,Arial,sans-serif;co
SF:lor:black;background-color:white;}\\x20b\\x20{font-family:Tahoma,Arial,sa
SF:ns-serif;color:white;background-color:#525D76;}\\x20p\\x20{font-family:Ta
SF:homa,Arial,sans-serif;background:white;color:black;font-size:12px;}\\x20
SF:a\\x20{color:black;}\\x20a\\.name\\x20{color:black;}\\x20\\.line\\x20{height:1
SF:px;background-color:#525D76;border:none;}</style></head><bod")%r(oracle
SF:-tns,95F,"HTTP/1\\.1\\x20400\\x20\\r\\nContent-Type:\\x20text/html;charset=ut
SF:f-8\\r\\nContent-Language:\\x20en\\r\\nContent-Length:\\x202243\\r\\nDate:\\x20M
SF:on,\\x2005\\x20Jun\\x202023\\x2014:35:00\\x20GMT\\r\\nConnection:\\x20close\\r\\n
SF:\\r\\n<!doctype\\x20html><html\\x20lang=\\"en\\"><head><title>HTTP\\x20Status\\
SF:x20400\\x20\\xe2\\x80\\x93\\x20Bad\\x20Request</title><style\\x20type=\\"text/c
SF:ss\\">h1\\x20{font-family:Tahoma,Arial,sans-serif;color:white;background-
SF:color:#525D76;font-size:22px;}\\x20h2\\x20{font-family:Tahoma,Arial,sans-
SF:serif;color:white;background-color:#525D76;font-size:16px;}\\x20h3\\x20{f
SF:ont-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76
SF::black;background-color:white;}\\x20b\\x20{font-family:Tahoma,Arial,sans-
SF:serif;color:white;background-color:#525D76;}\\x20p\\x20{font-family:Tahom
SF:a,Arial,sans-serif;background:white;color:black;font-size:12px;}\\x20a\\x
SF:20{color:black;}\\x20a\\.name\\x20{color:black;}\\x20\\.line\\x20{height:1px;
SF:background-color:#525D76;border:none;}</style></head><bod");
Service Info: Host: BASIC2; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Host script results:
| smb-security-mode: 
|   account_used: guest
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled (dangerous, but default)
| smb2-security-mode: 
|   311: 
|_    Message signing enabled but not required
|_clock-skew: mean: 1h20m00s, deviation: 2h18m35s, median: 0s
| nbstat: NetBIOS name: BASIC2, NetBIOS user: <unknown>, NetBIOS MAC: 000000000000 (Xerox)
| Names:
|   BASIC2<00>           Flags: <unique><active>
|   BASIC2<03>           Flags: <unique><active>
|   BASIC2<20>           Flags: <unique><active>
|   \\x01\\x02__MSBROWSE__\\x02<01>  Flags: <group><active>
|   WORKGROUP<00>        Flags: <group><active> 
|   WORKGROUP<1d>        Flags: <unique><active>
|   WORKGROUP<1e>        Flags: <group><active> 
| Statistics:
|   0000000000000000000000000000000000
|   0000000000000000000000000000000000
|_  0000000000000000000000000000
| smb2-time: 
|   date: 2023-06-05T14:35:03
|_  start_date: N/A
| p2p-conficker: 
|   Checking for Conficker.C or higher...
|   Check 1 (port 59558/tcp): CLEAN (Couldn't connect)
|   Check 2 (port 26083/tcp): CLEAN (Couldn't connect)
|   Check 3 (port 50934/udp): CLEAN (Failed to receive data)
|   Check 4 (port 32522/udp): CLEAN (Failed to receive data)
|_  0/4 checks are positive: Host is CLEAN or ports are blocked
| smb-os-discovery: 
|   OS: Windows 6.1 (Samba 4.3.11-Ubuntu)
|   Computer name: basic2
|   NetBIOS computer name: BASIC2\\x00
|   Domain name: \\x00
|   FQDN: basic2
|_  System time: 2023-06-05T10:35:04-04:00

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 10:35
Completed NSE at 10:35, 0.00s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 10:35
Completed NSE at 10:35, 0.00s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 10:35
Completed NSE at 10:35, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at <https://nmap.org/submit/> .
Nmap done: 1 IP address (1 host up) scanned in 175.45 seconds

website.png

sourcecode.png

gobusterscanfinding.png

development.png

dev.png

j.png

smbclinet.png

smblogin.png

fileinlocalmachine.png