Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-20 19:08 CEST Stats: 0:00:19 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan SYN Stealth Scan Timing: About 83.84% done; ETC: 19:08 (0:00:04 remaining) Nmap scan report for passwordattack.thm (10.10.21.161) Host is up (0.044s latency). Not shown: 65529 closed tcp ports (reset) PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3 | ftp-syst: | STAT: | FTP server status: | Connected to ::ffff:10.14.99.89 | Logged in as ftp | TYPE: ASCII | No session bandwidth limit | Session timeout in seconds is 300 | Control connection is plain text | Data connections will be plain text | At session startup, client count was 1 | vsFTPd 3.0.3 - secure, fast, stable |_End of status | ftp-anon: Anonymous FTP login allowed (FTP code 230) |_drwxr-xr-x 2 111 116 4096 Oct 12 2021 files 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 2048 84:03:54:aa:5c:b4:df:a2:78:59:e4:c2:f1:ea:1b:ae (RSA) | 256 17:b1:65:8e:0a:75:6d:4b:c4:65:1f:b5:4d:95:21:ac (ECDSA) |_ 256 0f:c7:6e:6b:09:54:65:48:52:08:ec:1c:93:33:b4:1d (ED25519) 25/tcp open smtp Postfix smtpd |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=localhost | Subject Alternative Name: DNS:localhost | Not valid before: 2021-10-07T08:49:39 |_Not valid after: 2031-10-05T08:49:39 |_smtp-commands: mail.thm.labs, SIZE 10240000, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, CHUNKING 80/tcp open http Apache httpd 2.4.29 ((Ubuntu)) |_http-server-header: Apache/2.4.29 (Ubuntu) |_http-title: Apache2 Ubuntu Default Page: It works 465/tcp open ssl/smtp Postfix smtpd | ssl-cert: Subject: commonName=localhost | Subject Alternative Name: DNS:localhost | Not valid before: 2021-10-07T08:49:39 |_Not valid after: 2031-10-05T08:49:39 |_ssl-date: TLS randomness does not represent time |_smtp-commands: mail.thm.labs, PIPELINING, SIZE 10240000, ETRN, AUTH PLAIN LOGIN, AUTH=PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN, CHUNKING 587/tcp open smtp Postfix smtpd |_ssl-date: TLS randomness does not represent time |_smtp-commands: mail.thm.labs, PIPELINING, SIZE 10240000, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, CHUNKING | ssl-cert: Subject: commonName=localhost | Subject Alternative Name: DNS:localhost | Not valid before: 2021-10-07T08:49:39 |_Not valid after: 2031-10-05T08:49:39 Device type: general purpose Running: Linux 4.X OS CPE: cpe:/o:linux:linux_kernel:4.15 OS details: Linux 4.15 Network Distance: 2 hops Service Info: Host: mail.thm.labs; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel TRACEROUTE (using port 3389/tcp) HOP RTT ADDRESS 1 46.25 ms 10.14.0.1 2 46.97 ms passwordattack.thm (10.10.21.161) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 59.60 seconds