# Nmap 7.93 scan initiated Sat Feb 11 20:03:59 2023 as: nmap -vv --reason -Pn -T4 -sV -sC --version-all -A --osscan-guess -oN /home/simon/htb/interface/results/scans/_quick_tcp_nmap.txt -oX /home/simon/htb/interface/results/scans/xml/_quick_tcp_nmap.xml interface.htb adjust_timeouts2: packet supposedly had rtt of -223229 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -223229 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -541797 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -541797 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -189731 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -189731 microseconds. Ignoring time. Nmap scan report for interface.htb (10.129.146.193) Host is up, received user-set (0.054s latency). Scanned at 2023-02-11 20:04:00 CET for 29s Not shown: 998 closed tcp ports (reset) PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 63 OpenSSH 7.6p1 Ubuntu 4ubuntu0.7 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 256 01848c66d34ec4b1611f2d4d389c42c3 (ECDSA) | ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGrQxMOFdtvAa9AGgwirSYniXm7NpzZbgIKhzgCOM1qwqK8QFkN6tZuQsCsRSzZ59+3l+Ycx5lTn11fbqLFqoqM= | 256 cc62905560a658629e6b80105c799b55 (ED25519) |_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPtZ4bP4/4TJNGMNMmXWqt2dLijhttMoaeiJYJRJ4Kqy 80/tcp open http syn-ack ttl 63 nginx 1.14.0 (Ubuntu) |_http-title: Site Maintenance |_http-server-header: nginx/1.14.0 (Ubuntu) | http-methods: |_ Supported Methods: GET HEAD |_http-favicon: Unknown favicon MD5: 21B739D43FCB9BBB83D8541FE4FE88FA Device type: general purpose Running (JUST GUESSING): Linux 5.X|2.6.X|4.X (88%) OS CPE: cpe:/o:linux:linux_kernel:5.0 cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:4 OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU Aggressive OS guesses: Linux 5.0 (88%), Linux 5.0 - 5.4 (88%), Linux 2.6.32 (88%), Linux 5.4 (86%), Linux 4.15 - 5.6 (85%) No exact OS matches for host (test conditions non-ideal). TCP/IP fingerprint: SCAN(V=7.93%E=4%D=2/11%OT=22%CT=1%CU=%PV=Y%DS=2%DC=T%G=N%TM=63E7E6BD%P=x86_64-pc-linux-gnu) SEQ(SP=105%GCD=1%ISR=10C%TI=Z%TS=A) OPS(O1=M569ST11NW7%O2=M569ST11NW7%O3=M569NNT11NW7%O4=M569ST11NW7%O5=M569ST11NW7%O6=M569ST11) WIN(W1=FE88%W2=FE88%W3=FE88%W4=FE88%W5=FE88%W6=FE88) ECN(R=Y%DF=Y%TG=40%W=FAF0%O=M569NNSNW7%CC=Y%Q=) T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=) T2(R=N) T3(R=N) T4(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=) T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=) T6(R=N) T7(R=N) U1(R=N) IE(R=Y%DFI=N%TG=40%CD=S) Uptime guess: 18.716 days (since Tue Jan 24 02:52:54 2023) Network Distance: 2 hops TCP Sequence Prediction: Difficulty=261 (Good luck!) IP ID Sequence Generation: All zeros Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel TRACEROUTE (using port 1720/tcp) HOP RTT ADDRESS 1 58.77 ms 10.10.16.1 2 71.96 ms interface.htb (10.129.146.193) Read data files from: /usr/bin/../share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sat Feb 11 20:04:29 2023 -- 1 IP address (1 host up) scanned in 31.39 seconds