Skip to content

Instantly share code, notes, and snippets.

@jleedev
Created February 12, 2017 23:30
Show Gist options
  • Save jleedev/e607903c37a7f00aee55946dbc9f7cd9 to your computer and use it in GitHub Desktop.
Save jleedev/e607903c37a7f00aee55946dbc9f7cd9 to your computer and use it in GitHub Desktop.
HTTP/1.0 200 OK
Server: alphapd
Date: Sun Feb 12 16:21:12 2017
Pragma: no-cache
Cache-Control: no-cache
Content-type: text/html
Starting Nmap 6.47 ( http://nmap.org ) at 2017-02-12 23:26 UTC
NSE: Loaded 118 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 2) scan.
NSE: Starting runlevel 2 (of 2) scan.
Initiating ARP Ping Scan at 23:26
Scanning 192.168.1.12 [1 port]
Completed ARP Ping Scan at 23:26, 0.24s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 23:26
Completed Parallel DNS resolution of 1 host. at 23:26, 0.02s elapsed
DNS resolution of 1 IPs took 0.03s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating SYN Stealth Scan at 23:26
Scanning 192.168.1.12 [1000 ports]
Discovered open port 443/tcp on 192.168.1.12
Discovered open port 80/tcp on 192.168.1.12
Completed SYN Stealth Scan at 23:26, 2.63s elapsed (1000 total ports)
Initiating Service scan at 23:26
Scanning 2 services on 192.168.1.12
Service scan Timing: About 50.00% done; ETC: 23:28 (0:01:12 remaining)
Completed Service scan at 23:27, 88.62s elapsed (2 services on 1 host)
Initiating OS detection (try #1) against 192.168.1.12
NSE: Script scanning 192.168.1.12.
NSE: Starting runlevel 1 (of 2) scan.
Initiating NSE at 23:27
NSE Timing: About 96.88% done; ETC: 23:28 (0:00:01 remaining)
Completed NSE at 23:28, 32.34s elapsed
NSE: Starting runlevel 2 (of 2) scan.
Nmap scan report for 192.168.1.12
Host is up (0.0098s latency).
Scanned at 2017-02-12 23:26:21 UTC for 129s
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
80/tcp open http
|_http-favicon: Unknown favicon MD5: 842C79AB11F38323FC554AFBEA5C990A
|_http-methods: No Allow or Public header in OPTIONS response (status code 400)
| http-server-header: Software version grabbed from Server header.
| Consider submitting a service fingerprint.
|_Run with --script-args http-server-header.skip
|_http-title: D-Link Corporation. | WIRELESS INTERNET CAMERA | HOME
443/tcp open ssl/https
|_http-favicon: Unknown favicon MD5: 842C79AB11F38323FC554AFBEA5C990A
|_http-methods: No Allow or Public header in OPTIONS response (status code 400)
| http-server-header: Software version grabbed from Server header.
| Consider submitting a service fingerprint.
|_Run with --script-args http-server-header.skip
|_http-title: D-Link Corporation. | WIRELESS INTERNET CAMERA | HOME
/organizationName=D-LINK/stateOrProvinceName=Taiwan/countryName=TW/organizationalUnitName=DHPD Dept./localityName=Taipie
/organizationName=D-LINK/stateOrProvinceName=Taiwan/countryName=TW/organizationalUnitName=DHPD Dept./localityName=Taipie
| Public Key type: rsa
| Public Key bits: 1024
| Not valid before: 2017-02-11T16:21:00+00:00
| Not valid after: 2022-02-10T16:21:00+00:00
| MD5: 355e 073d 1f25 c0d4 eba7 9274 b55c 5684
| SHA-1: fe64 d0bc 6600 acf9 03a3 1f55 6356 b1e8 3416 2a7b
| -----BEGIN CERTIFICATE-----
| MIIDLjCCApegAwIBAgIJAOO+i02DDLT1MA0GCSqGSIb3DQEBCwUAMG4xCzAJBgNV
| BAYTAlRXMQ8wDQYDVQQIEwZUYWl3YW4xDzANBgNVBAcTBlRhaXBpZTEPMA0GA1UE
| ChMGRC1MSU5LMRMwEQYDVQQLEwpESFBEIERlcHQuMRcwFQYDVQQDFA53d3cuZGxp
| bmsuY29tDTAeFw0xNzAyMTExNjIxMDBaFw0yMjAyMTAxNjIxMDBaMG4xCzAJBgNV
| BAYTAlRXMQ8wDQYDVQQIEwZUYWl3YW4xDzANBgNVBAcTBlRhaXBpZTEPMA0GA1UE
| ChMGRC1MSU5LMRMwEQYDVQQLEwpESFBEIERlcHQuMRcwFQYDVQQDFA53d3cuZGxp
| bmsuY29tDTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA4LWvfx1cWkZYXRTC
| PoZL4NfNYfaZV26ghYelibkzMz7Y3iPvRDeI3vzIK/PGki9XJLeCbbCjcirPbhEh
| 2UfNlCjKSczizgrJvmld8Cbo3T5juiBgVfURr7t4/rZh0qd6wS5TlL/c0qNsV4iX
| kjLIE1ryfqfr27EZ40mM3hsZH/UCAwEAAaOB0zCB0DAdBgNVHQ4EFgQUgLJZLxSV
| PIBEUnPtuudV3fVCNmYwgaAGA1UdIwSBmDCBlYAUgLJZLxSVPIBEUnPtuudV3fVC
| NmahcqRwMG4xCzAJBgNVBAYTAlRXMQ8wDQYDVQQIEwZUYWl3YW4xDzANBgNVBAcT
| BlRhaXBpZTEPMA0GA1UEChMGRC1MSU5LMRMwEQYDVQQLEwpESFBEIERlcHQuMRcw
| FQYDVQQDFA53d3cuZGxpbmsuY29tDYIJAOO+i02DDLT1MAwGA1UdEwQFMAMBAf8w
| DQYJKoZIhvcNAQELBQADgYEAbKUZW4NiBj7MfmwsQc+x9Co3bE2Z4xxxlBkikgda
| evPCZhSDFUV57O5HqdoouBww3atQ+PaCwGSiKVWyiBGc2ZfL2BnBK5PRiOSUyqAn
| KucVEE8y0OU3qkQP2bFOizQNzFc8hTPSpDaCcrADaUCeC5RoXZj5bW1qbLWuSINS
| VQY=
|_-----END CERTIFICATE-----
MAC Address: B0:C5:54:2D:24:9F (D-Link International)
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.13 - 2.6.32
TCP/IP fingerprint:
OS:SCAN(V=6.47%E=4%D=2/12%OT=80%CT=1%CU=39203%PV=Y%DS=1%DC=D%G=Y%M=B0C554%T
OS:M=58A0EF9E%P=arm-unknown-linux-gnueabihf)SEQ(SP=CD%GCD=1%ISR=CD%TI=Z%CI=
OS:Z%TS=8)OPS(O1=M5B4ST11NW1%O2=M5B4ST11NW1%O3=M5B4NNT11NW1%O4=M5B4ST11NW1%
OS:O5=M5B4ST11NW1%O6=M5B4ST11)WIN(W1=16A0%W2=16A0%W3=16A0%W4=16A0%W5=16A0%W
OS:6=16A0)ECN(R=Y%DF=Y%T=40%W=16D0%O=M5B4NNSNW1%CC=N%Q=)T1(R=Y%DF=Y%T=40%S=
OS:O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=Y%DF=Y%T=40%W=16A0%S=O%A=S+%F=AS%O=M5B4S
OS:T11NW1%RD=0%Q=)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T
OS:=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=
OS:0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=40%IPL=
OS:164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S)
Uptime guess: 1.089 days (since Sat Feb 11 21:20:46 2017)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=205 (Good luck!)
IP ID Sequence Generation: All zeros
TRACEROUTE
HOP RTT ADDRESS
1 9.79 ms 192.168.1.12
NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 2) scan.
NSE: Starting runlevel 2 (of 2) scan.
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 134.19 seconds
Raw packets sent: 1128 (52.032KB) | Rcvd: 1123 (47.348KB)
pi@raspberrypi:~ $
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment