67 lines
2.9 KiB
Plaintext
67 lines
2.9 KiB
Plaintext
Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-20 19:08 CEST
|
|
Stats: 0:00:19 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
|
|
SYN Stealth Scan Timing: About 83.84% done; ETC: 19:08 (0:00:04 remaining)
|
|
Nmap scan report for passwordattack.thm (10.10.21.161)
|
|
Host is up (0.044s latency).
|
|
Not shown: 65529 closed tcp ports (reset)
|
|
PORT STATE SERVICE VERSION
|
|
21/tcp open ftp vsftpd 3.0.3
|
|
| ftp-syst:
|
|
| STAT:
|
|
| FTP server status:
|
|
| Connected to ::ffff:10.14.99.89
|
|
| Logged in as ftp
|
|
| TYPE: ASCII
|
|
| No session bandwidth limit
|
|
| Session timeout in seconds is 300
|
|
| Control connection is plain text
|
|
| Data connections will be plain text
|
|
| At session startup, client count was 1
|
|
| vsFTPd 3.0.3 - secure, fast, stable
|
|
|_End of status
|
|
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|
|
|_drwxr-xr-x 2 111 116 4096 Oct 12 2021 files
|
|
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0)
|
|
| ssh-hostkey:
|
|
| 2048 84:03:54:aa:5c:b4:df:a2:78:59:e4:c2:f1:ea:1b:ae (RSA)
|
|
| 256 17:b1:65:8e:0a:75:6d:4b:c4:65:1f:b5:4d:95:21:ac (ECDSA)
|
|
|_ 256 0f:c7:6e:6b:09:54:65:48:52:08:ec:1c:93:33:b4:1d (ED25519)
|
|
25/tcp open smtp Postfix smtpd
|
|
|_ssl-date: TLS randomness does not represent time
|
|
| ssl-cert: Subject: commonName=localhost
|
|
| Subject Alternative Name: DNS:localhost
|
|
| Not valid before: 2021-10-07T08:49:39
|
|
|_Not valid after: 2031-10-05T08:49:39
|
|
|_smtp-commands: mail.thm.labs, SIZE 10240000, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, CHUNKING
|
|
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|
|
|_http-server-header: Apache/2.4.29 (Ubuntu)
|
|
|_http-title: Apache2 Ubuntu Default Page: It works
|
|
465/tcp open ssl/smtp Postfix smtpd
|
|
| ssl-cert: Subject: commonName=localhost
|
|
| Subject Alternative Name: DNS:localhost
|
|
| Not valid before: 2021-10-07T08:49:39
|
|
|_Not valid after: 2031-10-05T08:49:39
|
|
|_ssl-date: TLS randomness does not represent time
|
|
|_smtp-commands: mail.thm.labs, PIPELINING, SIZE 10240000, ETRN, AUTH PLAIN LOGIN, AUTH=PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN, CHUNKING
|
|
587/tcp open smtp Postfix smtpd
|
|
|_ssl-date: TLS randomness does not represent time
|
|
|_smtp-commands: mail.thm.labs, PIPELINING, SIZE 10240000, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, CHUNKING
|
|
| ssl-cert: Subject: commonName=localhost
|
|
| Subject Alternative Name: DNS:localhost
|
|
| Not valid before: 2021-10-07T08:49:39
|
|
|_Not valid after: 2031-10-05T08:49:39
|
|
Device type: general purpose
|
|
Running: Linux 4.X
|
|
OS CPE: cpe:/o:linux:linux_kernel:4.15
|
|
OS details: Linux 4.15
|
|
Network Distance: 2 hops
|
|
Service Info: Host: mail.thm.labs; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
|
|
|
|
TRACEROUTE (using port 3389/tcp)
|
|
HOP RTT ADDRESS
|
|
1 46.25 ms 10.14.0.1
|
|
2 46.97 ms passwordattack.thm (10.10.21.161)
|
|
|
|
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
|
|
Nmap done: 1 IP address (1 host up) scanned in 59.60 seconds
|