initial commit
This commit is contained in:
66
Walkthroughs/RedTeaming/Password_Attacks/nmap.output
Normal file
66
Walkthroughs/RedTeaming/Password_Attacks/nmap.output
Normal file
@@ -0,0 +1,66 @@
|
||||
Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-20 19:08 CEST
|
||||
Stats: 0:00:19 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
|
||||
SYN Stealth Scan Timing: About 83.84% done; ETC: 19:08 (0:00:04 remaining)
|
||||
Nmap scan report for passwordattack.thm (10.10.21.161)
|
||||
Host is up (0.044s latency).
|
||||
Not shown: 65529 closed tcp ports (reset)
|
||||
PORT STATE SERVICE VERSION
|
||||
21/tcp open ftp vsftpd 3.0.3
|
||||
| ftp-syst:
|
||||
| STAT:
|
||||
| FTP server status:
|
||||
| Connected to ::ffff:10.14.99.89
|
||||
| Logged in as ftp
|
||||
| TYPE: ASCII
|
||||
| No session bandwidth limit
|
||||
| Session timeout in seconds is 300
|
||||
| Control connection is plain text
|
||||
| Data connections will be plain text
|
||||
| At session startup, client count was 1
|
||||
| vsFTPd 3.0.3 - secure, fast, stable
|
||||
|_End of status
|
||||
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|
||||
|_drwxr-xr-x 2 111 116 4096 Oct 12 2021 files
|
||||
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0)
|
||||
| ssh-hostkey:
|
||||
| 2048 84:03:54:aa:5c:b4:df:a2:78:59:e4:c2:f1:ea:1b:ae (RSA)
|
||||
| 256 17:b1:65:8e:0a:75:6d:4b:c4:65:1f:b5:4d:95:21:ac (ECDSA)
|
||||
|_ 256 0f:c7:6e:6b:09:54:65:48:52:08:ec:1c:93:33:b4:1d (ED25519)
|
||||
25/tcp open smtp Postfix smtpd
|
||||
|_ssl-date: TLS randomness does not represent time
|
||||
| ssl-cert: Subject: commonName=localhost
|
||||
| Subject Alternative Name: DNS:localhost
|
||||
| Not valid before: 2021-10-07T08:49:39
|
||||
|_Not valid after: 2031-10-05T08:49:39
|
||||
|_smtp-commands: mail.thm.labs, SIZE 10240000, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, CHUNKING
|
||||
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|
||||
|_http-server-header: Apache/2.4.29 (Ubuntu)
|
||||
|_http-title: Apache2 Ubuntu Default Page: It works
|
||||
465/tcp open ssl/smtp Postfix smtpd
|
||||
| ssl-cert: Subject: commonName=localhost
|
||||
| Subject Alternative Name: DNS:localhost
|
||||
| Not valid before: 2021-10-07T08:49:39
|
||||
|_Not valid after: 2031-10-05T08:49:39
|
||||
|_ssl-date: TLS randomness does not represent time
|
||||
|_smtp-commands: mail.thm.labs, PIPELINING, SIZE 10240000, ETRN, AUTH PLAIN LOGIN, AUTH=PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN, CHUNKING
|
||||
587/tcp open smtp Postfix smtpd
|
||||
|_ssl-date: TLS randomness does not represent time
|
||||
|_smtp-commands: mail.thm.labs, PIPELINING, SIZE 10240000, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, CHUNKING
|
||||
| ssl-cert: Subject: commonName=localhost
|
||||
| Subject Alternative Name: DNS:localhost
|
||||
| Not valid before: 2021-10-07T08:49:39
|
||||
|_Not valid after: 2031-10-05T08:49:39
|
||||
Device type: general purpose
|
||||
Running: Linux 4.X
|
||||
OS CPE: cpe:/o:linux:linux_kernel:4.15
|
||||
OS details: Linux 4.15
|
||||
Network Distance: 2 hops
|
||||
Service Info: Host: mail.thm.labs; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
|
||||
|
||||
TRACEROUTE (using port 3389/tcp)
|
||||
HOP RTT ADDRESS
|
||||
1 46.25 ms 10.14.0.1
|
||||
2 46.97 ms passwordattack.thm (10.10.21.161)
|
||||
|
||||
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
|
||||
Nmap done: 1 IP address (1 host up) scanned in 59.60 seconds
|
||||
Reference in New Issue
Block a user