Created
August 28, 2012 05:18
-
-
Save hellove1985/3495181 to your computer and use it in GitHub Desktop.
nmap result of metasploitable2
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
root@linuy: ~/# nmap -sS -T4 -A 10.1.1.130 | |
Starting Nmap 5.51 ( http://nmap.org ) at 2012-08-28 13:03 CST | |
Nmap scan report for 10.1.1.130 | |
Host is up (0.00041s latency). | |
Not shown: 977 closed ports | |
PORT STATE SERVICE VERSION | |
21/tcp open ftp vsftpd 2.3.4 | |
|_ftp-anon: Anonymous FTP login allowed (FTP code 230) | |
22/tcp open ssh OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0) | |
| ssh-hostkey: 1024 60:0f:cf:e1:c0:5f:6a:74:d6:90:24:fa:c4:d5:6c:cd (DSA) | |
|_2048 56:56:24:0f:21:1d:de:a7:2b:ae:61:b1:24:3d:e8:f3 (RSA) | |
23/tcp open telnet Linux telnetd | |
25/tcp open smtp Postfix smtpd | |
53/tcp open domain ISC BIND 9.4.2 | |
80/tcp open http Apache httpd 2.2.8 ((Ubuntu) DAV/2) | |
|_http-methods: No Allow or Public header in OPTIONS response (status code 200) | |
|_http-title: Metasploitable2 - Linux | |
111/tcp open rpcbind | |
139/tcp open netbios-ssn Samba smbd 3.X (workgroup: WORKGROUP) | |
445/tcp open netbios-ssn Samba smbd 3.X (workgroup: WORKGROUP) | |
512/tcp open exec netkit-rsh rexecd | |
513/tcp open login? | |
514/tcp open shell? | |
1099/tcp open rmi Java RMI Registry | |
1524/tcp open ingreslock? | |
2049/tcp open rpcbind | |
2121/tcp open ftp ProFTPD 1.3.1 | |
3306/tcp open mysql MySQL 5.0.51a-3ubuntu5 | |
| mysql-info: Protocol: 10 | |
| Version: 5.0.51a-3ubuntu5 | |
| Thread ID: 301 | |
| Some Capabilities: Connect with DB, Compress, SSL, Transactions, Secure Connection | |
| Status: Autocommit | |
|_Salt: L))1ZRj?<OXLTA(CWm?0 | |
5432/tcp open postgresql PostgreSQL DB 8.3.0 - 8.3.7 | |
5900/tcp open vnc VNC (protocol 3.3) | |
6000/tcp open X11 (access denied) | |
6667/tcp open irc Unreal ircd | |
8009/tcp open ajp13? | |
8180/tcp open unknown | |
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |
SF-Port514-TCP:V=5.51%I=7%D=8/28%Time=503C512B%P=x86_64-unknown-linux-gnu% | |
SF:r(NULL,33,"\x01getnameinfo:\x20Temporary\x20failure\x20in\x20name\x20re | |
SF:solution\n")%r(afp,33,"\x01getnameinfo:\x20Temporary\x20failure\x20in\x | |
SF:20name\x20resolution\n"); | |
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |
SF-Port1524-TCP:V=5.51%I=7%D=8/28%Time=503C512C%P=x86_64-unknown-linux-gnu | |
SF:%r(NULL,17,"root@metasploitable:/#\x20")%r(GenericLines,73,"root@metasp | |
SF:loitable:/#\x20root@metasploitable:/#\x20root@metasploitable:/#\x20root | |
SF:@metasploitable:/#\x20root@metasploitable:/#\x20")%r(GetRequest,17,"roo | |
SF:t@metasploitable:/#\x20")%r(HTTPOptions,94,"root@metasploitable:/#\x20b | |
SF:ash:\x20OPTIONS:\x20command\x20not\x20found\nroot@metasploitable:/#\x20 | |
SF:root@metasploitable:/#\x20root@metasploitable:/#\x20root@metasploitable | |
SF::/#\x20")%r(RTSPRequest,94,"root@metasploitable:/#\x20bash:\x20OPTIONS: | |
SF:\x20command\x20not\x20found\nroot@metasploitable:/#\x20root@metasploita | |
SF:ble:/#\x20root@metasploitable:/#\x20root@metasploitable:/#\x20")%r(RPCC | |
SF:heck,17,"root@metasploitable:/#\x20")%r(DNSVersionBindReq,17,"root@meta | |
SF:sploitable:/#\x20")%r(DNSStatusRequest,17,"root@metasploitable:/#\x20") | |
SF:%r(Help,63,"root@metasploitable:/#\x20bash:\x20HELP:\x20command\x20not\ | |
SF:x20found\nroot@metasploitable:/#\x20root@metasploitable:/#\x20")%r(SSLS | |
SF:essionReq,51,"root@metasploitable:/#\x20bash:\x20{O\?G,\x03Sw=:\x20comm | |
SF:and\x20not\x20found\nroot@metasploitable:/#\x20")%r(SMBProgNeg,17,"root | |
SF:@metasploitable:/#\x20")%r(X11Probe,17,"root@metasploitable:/#\x20")%r( | |
SF:FourOhFourRequest,17,"root@metasploitable:/#\x20")%r(LPDString,4F,"root | |
SF:@metasploitable:/#\x20bash:\x20default:\x20command\x20not\x20found\nroo | |
SF:t@metasploitable:/#\x20")%r(LDAPBindReq,17,"root@metasploitable:/#\x20" | |
SF:)%r(SIPOptions,395,"root@metasploitable:/#\x20bash:\x20OPTIONS:\x20comm | |
SF:and\x20not\x20found\nroot@metasploitable:/#\x20root@metasploitable:/#\x | |
SF:20bash:\x20Via::\x20command\x20not\x20found\nroot@metasploitable:/#\x20 | |
SF:root@metasploitable:/#\x20bash:\x20syntax\x20error\x20near\x20unexpecte | |
SF:d\x20token\x20`;'\nroot@metasploitable:/#\x20root@metasploitable:/#\x20 | |
SF:bash:\x20syntax\x20error\x20near\x20unexpected\x20token\x20`newline'\nr | |
SF:oot@metasploitable:/#\x20root@metasploitable:/#\x20bash:\x20Call-ID::\x | |
SF:20command\x20not\x20found\nroot@metasploitable:/#\x20root@metasploitabl | |
SF:e:/#\x20bash:\x20CSeq::\x20command\x20not\x20found\nroot@metasploitable | |
SF::/#\x20root@metasploitable:/#\x20bash:\x20Max-Forwards::\x20command\x20 | |
SF:not\x20found\nroot@metasploitable:/#\x20root@metasploitable:/#\x20bash: | |
SF:\x20Content-Length::\x20command\x20not\x20found\nroot@metasploitable:/# | |
SF:\x20root@metasploitable:/#\x20bash:\x20syntax\x20error\x20near\x20unexp | |
SF:ected\x20token\x20`newline'\nroot@metasploitable:/#\x20root@metasploita | |
SF:ble:/#\x20bash:\x20Accept::\x20command\x20not\x20found\nroot@metasploit | |
SF:able:/#\x20root@metasploitable:/#\x20root@metasploitable:/#\x20root@m"); | |
MAC Address: 00:0C:29:AF:18:60 (VMware) | |
Device type: general purpose | |
Running: Linux 2.6.X | |
OS details: Linux 2.6.9 - 2.6.31 | |
Network Distance: 1 hop | |
Service Info: Hosts: metasploitable.localdomain, localhost, irc.Metasploitable.LAN; OSs: Unix, Linux | |
Host script results: | |
|_nbstat: NetBIOS name: METASPLOITABLE, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> | |
| smb-os-discovery: | |
| OS: Unix (Samba 3.0.20-Debian) | |
| Name: WORKGROUP\Unknown | |
|_ System time: 2012-07-29 17:45:43 UTC-4 | |
TRACEROUTE | |
HOP RTT ADDRESS | |
1 0.41 ms 10.1.1.130 | |
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . | |
Nmap done: 1 IP address (1 host up) scanned in 153.82 seconds | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment