Files
TryHackMe/CTF/RootMe/nmap_scan1.txt
2025-12-04 09:57:17 +01:00

32 lines
1.2 KiB
Plaintext

# Nmap 7.95 scan initiated Sun Oct 19 21:40:19 2025 as: /usr/lib/nmap/nmap --privileged -A -T4 -oN nmap_scan1.txt 10.10.190.121
Nmap scan report for 10.10.190.121
Host is up (0.065s latency).
Not shown: 998 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.13 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 3072 70:9d:db:af:6b:26:f4:13:2e:c2:31:04:40:7b:3d:6d (RSA)
| 256 08:b3:c0:4f:48:c0:98:f7:65:2b:82:35:e2:fb:bd:a1 (ECDSA)
|_ 256 8e:00:eb:e6:49:98:97:6f:d3:d8:28:dd:70:7f:ad:5e (ED25519)
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|_http-title: HackIT - Home
| http-cookie-flags:
| /:
| PHPSESSID:
|_ httponly flag not set
|_http-server-header: Apache/2.4.41 (Ubuntu)
Device type: general purpose
Running: Linux 4.X
OS CPE: cpe:/o:linux:linux_kernel:4.15
OS details: Linux 4.15
Network Distance: 2 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE (using port 21/tcp)
HOP RTT ADDRESS
1 98.09 ms 10.14.0.1
2 70.72 ms 10.10.190.121
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Oct 19 21:40:34 2025 -- 1 IP address (1 host up) scanned in 15.44 seconds