Files
TryHackMe/CTF/Corridor/nmap_scan1.txt
2025-12-04 09:57:17 +01:00

22 lines
864 B
Plaintext

# Nmap 7.95 scan initiated Fri Oct 17 14:43:38 2025 as: /usr/lib/nmap/nmap --privileged -A -T4 -oN nmap_scan1.txt 10.10.113.20
Nmap scan report for 10.10.113.20
Host is up (0.085s latency).
Not shown: 999 closed tcp ports (reset)
PORT STATE SERVICE VERSION
80/tcp open http Werkzeug httpd 2.0.3 (Python 3.10.2)
|_http-title: Corridor
|_http-server-header: Werkzeug/2.0.3 Python/3.10.2
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.19
Network Distance: 2 hops
TRACEROUTE (using port 111/tcp)
HOP RTT ADDRESS
1 155.99 ms 10.14.0.1
2 155.95 ms 10.10.113.20
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Fri Oct 17 14:43:51 2025 -- 1 IP address (1 host up) scanned in 12.98 seconds