Skip to content

Instantly share code, notes, and snippets.

@jpluimers jpluimers/citizen-nmap.txt Secret
Created Jul 25, 2017

Embed
What would you like to do?
CitiZen nmap output
# nmap -O -v -A -p- -Pn 192.168.72.27
Starting Nmap 7.50 ( https://nmap.org ) at 2017-07-24 19:06 CEST
NSE: Loaded 144 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 19:06
Completed NSE at 19:06, 0.00s elapsed
Initiating NSE at 19:06
Completed NSE at 19:06, 0.00s elapsed
Initiating ARP Ping Scan at 19:06
Scanning 192.168.72.27 [1 port]
Completed ARP Ping Scan at 19:06, 0.22s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 19:06
Completed Parallel DNS resolution of 1 host. at 19:06, 0.00s elapsed
Initiating SYN Stealth Scan at 19:06
Scanning beaglebone.fritz.box (192.168.72.27) [65535 ports]
Discovered open port 22/tcp on 192.168.72.27
Discovered open port 80/tcp on 192.168.72.27
SYN Stealth Scan Timing: About 2.13% done; ETC: 19:30 (0:23:46 remaining)
Increasing send delay for 192.168.72.27 from 0 to 5 due to 608 out of 2026 dropped probes since last increase.
Increasing send delay for 192.168.72.27 from 5 to 10 due to 11 out of 24 dropped probes since last increase.
Increasing send delay for 192.168.72.27 from 10 to 20 due to 11 out of 24 dropped probes since last increase.
Increasing send delay for 192.168.72.27 from 20 to 40 due to 11 out of 24 dropped probes since last increase.
Increasing send delay for 192.168.72.27 from 40 to 80 due to 11 out of 30 dropped probes since last increase.
SYN Stealth Scan Timing: About 2.83% done; ETC: 19:42 (0:34:58 remaining)
SYN Stealth Scan Timing: About 4.14% done; ETC: 19:45 (0:37:27 remaining)
SYN Stealth Scan Timing: About 4.62% done; ETC: 19:52 (0:43:41 remaining)
SYN Stealth Scan Timing: About 5.11% done; ETC: 19:57 (0:48:37 remaining)
SYN Stealth Scan Timing: About 5.59% done; ETC: 20:02 (0:52:38 remaining)
SYN Stealth Scan Timing: About 6.08% done; ETC: 20:05 (0:55:55 remaining)
SYN Stealth Scan Timing: About 6.66% done; ETC: 20:09 (0:59:08 remaining)
SYN Stealth Scan Timing: About 7.38% done; ETC: 20:13 (1:02:19 remaining)
SYN Stealth Scan Timing: About 8.45% done; ETC: 20:18 (1:05:44 remaining)
SYN Stealth Scan Timing: About 10.24% done; ETC: 20:23 (1:09:23 remaining)
SYN Stealth Scan Timing: About 30.74% done; ETC: 20:40 (1:05:30 remaining)
SYN Stealth Scan Timing: About 36.70% done; ETC: 20:42 (1:00:45 remaining)
SYN Stealth Scan Timing: About 42.31% done; ETC: 20:43 (0:55:55 remaining)
Discovered open port 35505/tcp on 192.168.72.27
SYN Stealth Scan Timing: About 47.74% done; ETC: 20:43 (0:51:02 remaining)
Discovered open port 81/tcp on 192.168.72.27
SYN Stealth Scan Timing: About 53.02% done; ETC: 20:44 (0:46:08 remaining)
SYN Stealth Scan Timing: About 58.25% done; ETC: 20:44 (0:41:11 remaining)
SYN Stealth Scan Timing: About 63.43% done; ETC: 20:45 (0:36:13 remaining)
SYN Stealth Scan Timing: About 68.57% done; ETC: 20:45 (0:31:13 remaining)
Stats: 1:11:21 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
SYN Stealth Scan Timing: About 71.56% done; ETC: 20:45 (0:28:17 remaining)
Stats: 1:11:22 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
SYN Stealth Scan Timing: About 71.57% done; ETC: 20:45 (0:28:17 remaining)
Stats: 1:11:22 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
SYN Stealth Scan Timing: About 71.58% done; ETC: 20:45 (0:28:17 remaining)
SYN Stealth Scan Timing: About 76.66% done; ETC: 20:46 (0:23:17 remaining)
SYN Stealth Scan Timing: About 81.70% done; ETC: 20:46 (0:18:17 remaining)
SYN Stealth Scan Timing: About 86.75% done; ETC: 20:46 (0:13:16 remaining)
SYN Stealth Scan Timing: About 91.78% done; ETC: 20:46 (0:08:15 remaining)
Discovered open port 1883/tcp on 192.168.72.27
SYN Stealth Scan Timing: About 96.82% done; ETC: 20:46 (0:03:11 remaining)
Completed SYN Stealth Scan at 20:53, 6427.25s elapsed (65535 total ports)
Initiating Service scan at 20:53
Scanning 5 services on beaglebone.fritz.box (192.168.72.27)
Completed Service scan at 20:55, 118.80s elapsed (5 services on 1 host)
Initiating OS detection (try #1) against beaglebone.fritz.box (192.168.72.27)
NSE: Script scanning 192.168.72.27.
Initiating NSE at 20:55
Completed NSE at 20:55, 10.75s elapsed
Initiating NSE at 20:55
Completed NSE at 20:55, 1.15s elapsed
Nmap scan report for beaglebone.fritz.box (192.168.72.27)
Host is up (0.00057s latency).
Not shown: 65530 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.1 (protocol 2.0)
| ssh-hostkey:
| 2048 49:30:e9:a1:ea:19:80:92:b2:11:00:54:b8:ff:05:2d (RSA)
|_ 256 c8:62:74:78:98:dc:14:3a:64:47:50:47:44:71:a3:43 (ECDSA)
80/tcp open http Hiawatha httpd 9.2
|_http-server-header: Hiawatha v9.2
|_http-title: Remote Console on LAN
81/tcp open hosts2-ns?
1883/tcp open mosquitto version 1.4
| mqtt-subscribe:
| Topics and their most recent payloads:
| $SYS/broker/clients/total: 3
| $SYS/broker/load/publish/sent/15min: 3.11
| $SYS/broker/load/publish/sent/1min: 42.94
| $SYS/broker/messages/stored: 47
| $SYS/broker/clients/active: 3
| $SYS/broker/publish/bytes/received: 25
| $SYS/broker/load/connections/5min: 0.33
| $SYS/broker/load/bytes/sent/15min: 129.76
| $SYS/broker/load/messages/sent/15min: 5.29
| $SYS/broker/clients/connected: 3
| $SYS/broker/heap/current: 13296
| $SYS/broker/load/messages/sent/5min: 11.72
| $SYS/broker/version: mosquitto version 1.4
| N/04a316ec55ae/system/0/Serial: {"value": "04a316ec55ae"}
| $SYS/broker/load/bytes/sent/1min: 1735.51
| $SYS/broker/load/connections/15min: 0.12
| $SYS/broker/timestamp: 2017-03-30 13:27:21+0200
| $SYS/broker/load/bytes/received/5min: 16.38
| $SYS/broker/subscriptions/count: 6
| $SYS/broker/messages/received: 863
| $SYS/broker/connection/local.ccgx_1d91cc57272d/state: 1
| $SYS/broker/bytes/sent: 3934
| $SYS/broker/load/messages/received/5min: 2.49
| $SYS/broker/bytes/received: 1980
| $SYS/broker/publish/messages/received: 0
| $SYS/broker/publish/bytes/sent: 211
| $SYS/broker/publish/messages/dropped: 0
| $SYS/broker/load/connections/1min: 1.06
| $SYS/broker/load/sockets/5min: 0.33
| $SYS/broker/clients/disconnected: 0
| $SYS/broker/heap/maximum: 13504
| $SYS/broker/clients/expired: 0
| $SYS/broker/load/sockets/1min: 1.04
| $SYS/broker/load/bytes/received/1min: 52.72
| $SYS/broker/load/messages/received/15min: 2.17
| $SYS/broker/load/sockets/15min: 0.12
| $SYS/broker/load/publish/sent/5min: 9.23
| $SYS/broker/uptime: 25696 seconds
| $SYS/broker/load/bytes/received/15min: 8.40
| $SYS/broker/load/messages/sent/1min: 46.66
| $SYS/broker/load/bytes/sent/5min: 376.60
| $SYS/broker/connection/ccgx_1d91cc57272d/state: 1
| $SYS/broker/publish/messages/sent: 48
| $SYS/broker/retained messages/count: 47
| $SYS/broker/load/messages/received/1min: 3.72
| $SYS/broker/clients/inactive: 0
|_ $SYS/broker/messages/sent: 910
35505/tcp open unknown
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.0 301 Moved Permanently
| Date: Mon, 24 Jul 2017 18:54:27 GMT
| Location: http://192.168.72.27/
| Content-Length: 0
| GetRequest, HTTPOptions:
| HTTP/1.0 301 Moved Permanently
| Date: Mon, 24 Jul 2017 18:53:40 GMT
| Location: http://192.168.72.27/
| Content-Length: 0
| RTSPRequest, SIPOptions:
| HTTP/1.1 400 Bad Request
|_ Content-Length: 0
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port35505-TCP:V=7.50%I=7%D=7/24%Time=59764233%P=armv7hl-suse-linux-gnue
SF:abi%r(GetRequest,7B,"HTTP/1\.0\x20301\x20Moved\x20Permanently\r\nDate:\
SF:x20Mon,\x2024\x20Jul\x202017\x2018:53:40\x20GMT\r\nLocation:\x20http://
SF:192\.168\.72\.27/\r\nContent-Length:\x200\r\n\r\n")%r(HTTPOptions,7B,"H
SF:TTP/1\.0\x20301\x20Moved\x20Permanently\r\nDate:\x20Mon,\x2024\x20Jul\x
SF:202017\x2018:53:40\x20GMT\r\nLocation:\x20http://192\.168\.72\.27/\r\nC
SF:ontent-Length:\x200\r\n\r\n")%r(RTSPRequest,2F,"HTTP/1\.1\x20400\x20Bad
SF:\x20Request\r\nContent-Length:\x200\r\n\r\n")%r(FourOhFourRequest,7B,"H
SF:TTP/1\.0\x20301\x20Moved\x20Permanently\r\nDate:\x20Mon,\x2024\x20Jul\x
SF:202017\x2018:54:27\x20GMT\r\nLocation:\x20http://192\.168\.72\.27/\r\nC
SF:ontent-Length:\x200\r\n\r\n")%r(SIPOptions,2F,"HTTP/1\.1\x20400\x20Bad\
SF:x20Request\r\nContent-Length:\x200\r\n\r\n");
MAC Address: 04:A3:16:EC:55:AE (Texas Instruments)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.8
Uptime guess: 0.294 days (since Mon Jul 24 13:51:59 2017)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=260 (Good luck!)
IP ID Sequence Generation: All zeros
TRACEROUTE
HOP RTT ADDRESS
1 0.57 ms beaglebone.fritz.box (192.168.72.27)
NSE: Script Post-scanning.
Initiating NSE at 20:55
Completed NSE at 20:55, 0.00s elapsed
Initiating NSE at 20:55
Completed NSE at 20:55, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 6573.42 seconds
Raw packets sent: 82312 (3.624MB) | Rcvd: 82306 (3.295MB)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.