nmap -n -vvv -sS -sV -sC -p- -oA nmap/version --stylesheet https://jiveturkey.rocks/assets/reports/nmap/nmap-bootstrap.xsl 192.168.9.130
Fri Dec 4 13:19:08 2020 – Fri Dec 4 13:21:53 2020
1 hosts scanned.
1 hosts up.
0 hosts down.
State | Address | Hostname | TCP (open) | UDP (open) |
---|---|---|---|---|
up | 192.168.9.130 | 3 | 0 |
Port | Protocol | State Reason |
Service | Product | Version | Extra Info |
---|---|---|---|---|---|---|
21 | tcp | open syn-ack |
ftp | vsftpd | 3.0.3 | |
cpe:/a:vsftpd:vsftpd:3.0.3ftp-anonAnonymous FTP login allowed (FTP code 230) dr-xr-xr-x 2 ftp ftp 4096 Nov 08 15:29 anon ftp-systSTAT: FTP server status: Connected to ::ffff:192.168.9.129 Logged in as ftp TYPE: ASCII No session bandwidth limit Session timeout in seconds is 300 Control connection is plain text Data connections will be plain text At session startup, client count was 1 vsFTPd 3.0.3 - secure, fast, stable End of status | ||||||
22 | tcp | open syn-ack |
ssh | OpenSSH | 7.9p1 Debian 10+deb10u2 | protocol 2.0 |
cpe:/a:openbsd:openssh:7.9p1ssh-hostkey2048 43:30:8c:57:bc:49:68:49:9c:9a:53:e7:a9:b7:83:9f (RSA) ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCq+oocbQT+c73wXXDmSQrhe8f9OGxx41deFh60k1K/eyHSzEpU01VrC8sPUhhnx9YweljhcWt8XmdmQNqciXz9F8Io6/u441nwziXBKNmjeKzY/B9VRQXKwaQfNOtkJ/g1QijMT7xG/A6x3bI1Es5RMTuMHwf8/6P23s0OJWW2P0IPNW2dfTpdAcgXOoSZyA+ZrV8jvOuoADGWq93zHAW663HBHMOyzW452coJZ12I6DVvXURXAfNZygBmswh5Hf+gJ1UNMYJjuoEhmiPCMZK2F8GVdP0W4qEEY4ECwaz8NpKgn8OsbYYBmNyAavLtNGr+IYweLtj7WVGeaV/la423 256 c9:8d:46:c8:ef:33:d2:62:21:3a:bf:95:cb:fb:44:a3 (ECDSA) ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBJ5iBoU1MSkyJr0Off1VNkZfhbQr6ro41DQRKqraAi/DLKRJhWiObYTaoIzzNOiuoYyyIPSGl/WHKal8Lkz9qmc= 256 9b:86:ff:5c:6c:61:50:d0:36:59:b0:7a:bf:77:b2:a6 (ED25519) ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMR0YBLhRmjcBvgDcedoiY4c0Ndrc+uYld9hYYerGvvb | ||||||
1337 | tcp | open syn-ack |
waste | |||
fingerprint-stringsDNSStatusRequestTCP, DNSVersionBindReqTCP, NULL, RPCCheck, SMBProgNeg: # WARZONE 2 # WARZONE 2 # WARZONE 2 # {SECRET SYSTEM REMOTE ACCESS} Username : GenericLines, GetRequest, HTTPOptions, RTSPRequest, TLSSessionReq: # WARZONE 2 # WARZONE 2 # WARZONE 2 # {SECRET SYSTEM REMOTE ACCESS} Username :Password :Token : Help, Kerberos, SSLSessionReq, TerminalServerCookie: # WARZONE 2 # WARZONE 2 # WARZONE 2 # {SECRET SYSTEM REMOTE ACCESS} Username :Password : |
Address | Port | Protocol | Service | Product | Version | CPE | Extra info |
---|---|---|---|---|---|---|---|
192.168.9.130 | 21 | tcp | ftp | vsftpd | 3.0.3 | cpe:/a:vsftpd:vsftpd:3.0.3 | |
192.168.9.130 | 22 | tcp | ssh | OpenSSH | 7.9p1 Debian 10+deb10u2 | cpe:/a:openbsd:openssh:7.9p1 | protocol 2.0 |
192.168.9.130 | 1337 | tcp | waste |