Skip to content

Instantly share code, notes, and snippets.

@hellove1985
Created August 28, 2012 05:18
Show Gist options
  • Save hellove1985/3495181 to your computer and use it in GitHub Desktop.
Save hellove1985/3495181 to your computer and use it in GitHub Desktop.
nmap result of metasploitable2
root@linuy: ~/# nmap -sS -T4 -A 10.1.1.130
Starting Nmap 5.51 ( http://nmap.org ) at 2012-08-28 13:03 CST
Nmap scan report for 10.1.1.130
Host is up (0.00041s latency).
Not shown: 977 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 2.3.4
|_ftp-anon: Anonymous FTP login allowed (FTP code 230)
22/tcp open ssh OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0)
| ssh-hostkey: 1024 60:0f:cf:e1:c0:5f:6a:74:d6:90:24:fa:c4:d5:6c:cd (DSA)
|_2048 56:56:24:0f:21:1d:de:a7:2b:ae:61:b1:24:3d:e8:f3 (RSA)
23/tcp open telnet Linux telnetd
25/tcp open smtp Postfix smtpd
53/tcp open domain ISC BIND 9.4.2
80/tcp open http Apache httpd 2.2.8 ((Ubuntu) DAV/2)
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-title: Metasploitable2 - Linux
111/tcp open rpcbind
139/tcp open netbios-ssn Samba smbd 3.X (workgroup: WORKGROUP)
445/tcp open netbios-ssn Samba smbd 3.X (workgroup: WORKGROUP)
512/tcp open exec netkit-rsh rexecd
513/tcp open login?
514/tcp open shell?
1099/tcp open rmi Java RMI Registry
1524/tcp open ingreslock?
2049/tcp open rpcbind
2121/tcp open ftp ProFTPD 1.3.1
3306/tcp open mysql MySQL 5.0.51a-3ubuntu5
| mysql-info: Protocol: 10
| Version: 5.0.51a-3ubuntu5
| Thread ID: 301
| Some Capabilities: Connect with DB, Compress, SSL, Transactions, Secure Connection
| Status: Autocommit
|_Salt: L))1ZRj?<OXLTA(CWm?0
5432/tcp open postgresql PostgreSQL DB 8.3.0 - 8.3.7
5900/tcp open vnc VNC (protocol 3.3)
6000/tcp open X11 (access denied)
6667/tcp open irc Unreal ircd
8009/tcp open ajp13?
8180/tcp open unknown
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port514-TCP:V=5.51%I=7%D=8/28%Time=503C512B%P=x86_64-unknown-linux-gnu%
SF:r(NULL,33,"\x01getnameinfo:\x20Temporary\x20failure\x20in\x20name\x20re
SF:solution\n")%r(afp,33,"\x01getnameinfo:\x20Temporary\x20failure\x20in\x
SF:20name\x20resolution\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port1524-TCP:V=5.51%I=7%D=8/28%Time=503C512C%P=x86_64-unknown-linux-gnu
SF:%r(NULL,17,"root@metasploitable:/#\x20")%r(GenericLines,73,"root@metasp
SF:loitable:/#\x20root@metasploitable:/#\x20root@metasploitable:/#\x20root
SF:@metasploitable:/#\x20root@metasploitable:/#\x20")%r(GetRequest,17,"roo
SF:t@metasploitable:/#\x20")%r(HTTPOptions,94,"root@metasploitable:/#\x20b
SF:ash:\x20OPTIONS:\x20command\x20not\x20found\nroot@metasploitable:/#\x20
SF:root@metasploitable:/#\x20root@metasploitable:/#\x20root@metasploitable
SF::/#\x20")%r(RTSPRequest,94,"root@metasploitable:/#\x20bash:\x20OPTIONS:
SF:\x20command\x20not\x20found\nroot@metasploitable:/#\x20root@metasploita
SF:ble:/#\x20root@metasploitable:/#\x20root@metasploitable:/#\x20")%r(RPCC
SF:heck,17,"root@metasploitable:/#\x20")%r(DNSVersionBindReq,17,"root@meta
SF:sploitable:/#\x20")%r(DNSStatusRequest,17,"root@metasploitable:/#\x20")
SF:%r(Help,63,"root@metasploitable:/#\x20bash:\x20HELP:\x20command\x20not\
SF:x20found\nroot@metasploitable:/#\x20root@metasploitable:/#\x20")%r(SSLS
SF:essionReq,51,"root@metasploitable:/#\x20bash:\x20{O\?G,\x03Sw=:\x20comm
SF:and\x20not\x20found\nroot@metasploitable:/#\x20")%r(SMBProgNeg,17,"root
SF:@metasploitable:/#\x20")%r(X11Probe,17,"root@metasploitable:/#\x20")%r(
SF:FourOhFourRequest,17,"root@metasploitable:/#\x20")%r(LPDString,4F,"root
SF:@metasploitable:/#\x20bash:\x20default:\x20command\x20not\x20found\nroo
SF:t@metasploitable:/#\x20")%r(LDAPBindReq,17,"root@metasploitable:/#\x20"
SF:)%r(SIPOptions,395,"root@metasploitable:/#\x20bash:\x20OPTIONS:\x20comm
SF:and\x20not\x20found\nroot@metasploitable:/#\x20root@metasploitable:/#\x
SF:20bash:\x20Via::\x20command\x20not\x20found\nroot@metasploitable:/#\x20
SF:root@metasploitable:/#\x20bash:\x20syntax\x20error\x20near\x20unexpecte
SF:d\x20token\x20`;'\nroot@metasploitable:/#\x20root@metasploitable:/#\x20
SF:bash:\x20syntax\x20error\x20near\x20unexpected\x20token\x20`newline'\nr
SF:oot@metasploitable:/#\x20root@metasploitable:/#\x20bash:\x20Call-ID::\x
SF:20command\x20not\x20found\nroot@metasploitable:/#\x20root@metasploitabl
SF:e:/#\x20bash:\x20CSeq::\x20command\x20not\x20found\nroot@metasploitable
SF::/#\x20root@metasploitable:/#\x20bash:\x20Max-Forwards::\x20command\x20
SF:not\x20found\nroot@metasploitable:/#\x20root@metasploitable:/#\x20bash:
SF:\x20Content-Length::\x20command\x20not\x20found\nroot@metasploitable:/#
SF:\x20root@metasploitable:/#\x20bash:\x20syntax\x20error\x20near\x20unexp
SF:ected\x20token\x20`newline'\nroot@metasploitable:/#\x20root@metasploita
SF:ble:/#\x20bash:\x20Accept::\x20command\x20not\x20found\nroot@metasploit
SF:able:/#\x20root@metasploitable:/#\x20root@metasploitable:/#\x20root@m");
MAC Address: 00:0C:29:AF:18:60 (VMware)
Device type: general purpose
Running: Linux 2.6.X
OS details: Linux 2.6.9 - 2.6.31
Network Distance: 1 hop
Service Info: Hosts: metasploitable.localdomain, localhost, irc.Metasploitable.LAN; OSs: Unix, Linux
Host script results:
|_nbstat: NetBIOS name: METASPLOITABLE, NetBIOS user: <unknown>, NetBIOS MAC: <unknown>
| smb-os-discovery:
| OS: Unix (Samba 3.0.20-Debian)
| Name: WORKGROUP\Unknown
|_ System time: 2012-07-29 17:45:43 UTC-4
TRACEROUTE
HOP RTT ADDRESS
1 0.41 ms 10.1.1.130
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 153.82 seconds
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment