# Nmap 7.95 scan initiated Wed Dec 3 12:50:40 2025 as: /usr/lib/nmap/nmap --privileged -T4 -A -oN nmap_scan.txt 10.80.178.179 Nmap scan report for 10.80.178.179 Host is up (0.042s latency). Not shown: 995 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.6p1 Ubuntu 3ubuntu13.11 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 256 88:83:8a:dc:57:aa:18:a5:f4:3b:72:30:77:bd:2b:67 (ECDSA) |_ 256 54:89:e7:16:f7:b6:57:4e:94:3f:7f:3d:ba:62:ed:b2 (ED25519) 80/tcp open http nginx 1.24.0 (Ubuntu) |_http-server-header: nginx/1.24.0 (Ubuntu) |_http-title: HopSec Asylum - Security Console 8000/tcp open http-alt | fingerprint-strings: | FourOhFourRequest: | HTTP/1.0 404 Not Found | Content-Type: text/html | X-Frame-Options: DENY | Content-Length: 179 | Vary: Accept-Language | Content-Language: en | X-Content-Type-Options: nosniff | | |
|The requested resource was not found on this server.
| | | GenericLines, Help, RTSPRequest, SIPOptions, Socks5, TerminalServerCookie: | HTTP/1.1 400 Bad Request | GetRequest, HTTPOptions: | HTTP/1.0 302 Found | Content-Type: text/html; charset=utf-8 | Location: /posts/ | X-Frame-Options: DENY | Content-Length: 0 | Vary: Accept-Language | Content-Language: en |_ X-Content-Type-Options: nosniff | http-title: Fakebook - Sign In |_Requested resource was /accounts/login/?next=/posts/ 8080/tcp open http SimpleHTTPServer 0.6 (Python 3.12.3) |_http-server-header: SimpleHTTP/0.6 Python/3.12.3 9001/tcp open tor-orport? | fingerprint-strings: | NULL: | ASYLUM GATE CONTROL SYSTEM - SCADA TERMINAL v2.1 | [AUTHORIZED PERSONNEL ONLY] | WARNING: This system controls critical infrastructure | access attempts are logged and monitored | Unauthorized access will result in immediate termination | Authentication required to access SCADA terminal | Provide authorization token from Part 1 to proceed |_ [AUTH] Enter authorization token: 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port8000-TCP:V=7.95%I=7%D=12/3%Time=69302418%P=aarch64-unknown-linux-gn SF:u%r(GenericLines,1C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\n\r\n")%r(Get SF:Request,C9,"HTTP/1\.0\x20302\x20Found\r\nContent-Type:\x20text/html;\x2 SF:0charset=utf-8\r\nLocation:\x20/posts/\r\nX-Frame-Options:\x20DENY\r\nC SF:ontent-Length:\x200\r\nVary:\x20Accept-Language\r\nContent-Language:\x2 SF:0en\r\nX-Content-Type-Options:\x20nosniff\r\n\r\n")%r(FourOhFourRequest SF:,160,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text/html\r\ SF:nX-Frame-Options:\x20DENY\r\nContent-Length:\x20179\r\nVary:\x20Accept- SF:Language\r\nContent-Language:\x20en\r\nX-Content-Type-Options:\x20nosni SF:ff\r\n\r\n\n\n\n\n\x20\x20 SF:The\x20requested\x20resource\x20was\x20not\x20found\x20on\x20thi SF:s\x20server\.
\n\n\n")%r(Socks5,1C,"HTTP/1\.1\x20400\x SF:20Bad\x20Request\r\n\r\n")%r(HTTPOptions,C9,"HTTP/1\.0\x20302\x20Found\ SF:r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nLocation:\x20/posts/ SF:\r\nX-Frame-Options:\x20DENY\r\nContent-Length:\x200\r\nVary:\x20Accept SF:-Language\r\nContent-Language:\x20en\r\nX-Content-Type-Options:\x20nosn SF:iff\r\n\r\n")%r(RTSPRequest,1C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\n\ SF:r\n")%r(Help,1C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\n\r\n")%r(Termina SF:lServerCookie,1C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\n\r\n")%r(SIPOpt SF:ions,1C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\n\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port9001-TCP:V=7.95%I=7%D=12/3%Time=69302418%P=aarch64-unknown-linux-gn SF:u%r(NULL,34F,"\n\xe2\x95\x94\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x9 SF:5\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x SF:95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\ SF:x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2 SF:\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe SF:2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\x SF:e2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\ SF:xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90 SF:\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x9 SF:0\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x SF:90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\ SF:x90\xe2\x95\x97\n\xe2\x95\x91\x20\x20\x20\x20\x20ASYLUM\x20GATE\x20CONT SF:ROL\x20SYSTEM\x20-\x20SCADA\x20TERMINAL\x20v2\.1\x20\x20\x20\x20\x20\x2 SF:0\x20\x20\x20\x20\xe2\x95\x91\n\xe2\x95\x91\x20\x20\x20\x20\x20\x20\x20 SF:\x20\x20\x20\x20\x20\x20\x20\[AUTHORIZED\x20PERSONNEL\x20ONLY\]\x20\x20 SF:\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x2 SF:0\x20\x20\xe2\x95\x91\n\xe2\x95\x9a\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90 SF:\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x9 SF:0\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x SF:90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\ SF:x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95 SF:\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x9 SF:5\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x SF:95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\ SF:x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2 SF:\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe SF:2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\xe2\x95\x90\x SF:e2\x95\x90\xe2\x95\x9d\n\n\[!\]\x20WARNING:\x20This\x20system\x20contro SF:ls\x20critical\x20infrastructure\n\[!\]\x20All\x20access\x20attempts\x2 SF:0are\x20logged\x20and\x20monitored\n\[!\]\x20Unauthorized\x20access\x20 SF:will\x20result\x20in\x20immediate\x20termination\n\n\[!\]\x20Authentica SF:tion\x20required\x20to\x20access\x20SCADA\x20terminal\n\[!\]\x20Provide SF:\x20authorization\x20token\x20from\x20Part\x201\x20to\x20proceed\n\n\n\ SF:[AUTH\]\x20Enter\x20authorization\x20token:\x20"); Device type: general purpose Running: Linux 4.X OS CPE: cpe:/o:linux:linux_kernel:4.15 OS details: Linux 4.15 Network Distance: 3 hops Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel TRACEROUTE (using port 1025/tcp) HOP RTT ADDRESS 1 40.99 ms 192.168.128.1 2 ... 3 41.87 ms 10.80.178.179 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Wed Dec 3 12:53:08 2025 -- 1 IP address (1 host up) scanned in 148.66 seconds