# Nmap 7.93 scan initiated Wed Feb 1 17:49:39 2023 as: nmap -vv --reason -Pn -T4 -sU -A --top-ports 100 -oN /home/kali/htb/broscience/results/scans/_top_100_udp_nmap.txt -oX /home/kali/htb/broscience/results/scans/xml/_top_100_udp_nmap.xml 10.10.11.195 Warning: 10.10.11.195 giving up on port because retransmission cap hit (6). Increasing send delay for 10.10.11.195 from 100 to 200 due to 11 out of 11 dropped probes since last increase. Increasing send delay for 10.10.11.195 from 200 to 400 due to 11 out of 12 dropped probes since last increase. Increasing send delay for 10.10.11.195 from 400 to 800 due to 11 out of 14 dropped probes since last increase. adjust_timeouts2: packet supposedly had rtt of -161451 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -161451 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -186670 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -186670 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -989326 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -989326 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -1019435 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -1019435 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -578820 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -578820 microseconds. Ignoring time. Nmap scan report for broscience.htb (10.10.11.195) Host is up, received user-set (0.087s latency). Scanned at 2023-02-01 17:49:39 CET for 293s PORT STATE SERVICE REASON VERSION 7/udp open|filtered echo no-response 9/udp closed discard port-unreach ttl 63 17/udp closed qotd port-unreach ttl 63 19/udp open|filtered chargen no-response 49/udp open|filtered tacacs no-response 53/udp open|filtered domain no-response 67/udp open|filtered dhcps no-response 68/udp open|filtered dhcpc no-response 69/udp closed tftp port-unreach ttl 63 80/udp closed http port-unreach ttl 63 88/udp closed kerberos-sec port-unreach ttl 63 111/udp closed rpcbind port-unreach ttl 63 120/udp open|filtered cfdptkt no-response 123/udp closed ntp port-unreach ttl 63 135/udp open|filtered msrpc no-response 136/udp closed profile port-unreach ttl 63 137/udp closed netbios-ns port-unreach ttl 63 138/udp closed netbios-dgm port-unreach ttl 63 139/udp open|filtered netbios-ssn no-response 158/udp open|filtered pcmail-srv no-response 161/udp closed snmp port-unreach ttl 63 162/udp closed snmptrap port-unreach ttl 63 177/udp closed xdmcp port-unreach ttl 63 427/udp closed svrloc port-unreach ttl 63 443/udp closed https port-unreach ttl 63 445/udp open|filtered microsoft-ds no-response 497/udp open|filtered retrospect no-response 500/udp closed isakmp port-unreach ttl 63 514/udp closed syslog port-unreach ttl 63 515/udp closed printer port-unreach ttl 63 518/udp closed ntalk port-unreach ttl 63 520/udp closed route port-unreach ttl 63 593/udp closed http-rpc-epmap port-unreach ttl 63 623/udp closed asf-rmcp port-unreach ttl 63 626/udp closed serialnumberd port-unreach ttl 63 631/udp closed ipp port-unreach ttl 63 996/udp open|filtered vsinet no-response 997/udp closed maitrd port-unreach ttl 63 998/udp open|filtered puparp no-response 999/udp open|filtered applix no-response 1022/udp closed exp2 port-unreach ttl 63 1023/udp closed unknown port-unreach ttl 63 1025/udp open|filtered blackjack no-response 1026/udp closed win-rpc port-unreach ttl 63 1027/udp open|filtered unknown no-response 1028/udp closed ms-lsa port-unreach ttl 63 1029/udp closed solid-mux port-unreach ttl 63 1030/udp open|filtered iad1 no-response 1433/udp open|filtered ms-sql-s no-response 1434/udp closed ms-sql-m port-unreach ttl 63 1645/udp closed radius port-unreach ttl 63 1646/udp closed radacct port-unreach ttl 63 1701/udp closed L2TP port-unreach ttl 63 1718/udp closed h225gatedisc port-unreach ttl 63 1719/udp closed h323gatestat port-unreach ttl 63 1812/udp closed radius port-unreach ttl 63 1813/udp open|filtered radacct no-response 1900/udp open|filtered upnp no-response 2000/udp closed cisco-sccp port-unreach ttl 63 2048/udp closed dls-monitor port-unreach ttl 63 2049/udp closed nfs port-unreach ttl 63 2222/udp open|filtered msantipiracy no-response 2223/udp closed rockwell-csp2 port-unreach ttl 63 3283/udp closed netassistant port-unreach ttl 63 3456/udp closed IISrpc-or-vat port-unreach ttl 63 3703/udp closed adobeserver-3 port-unreach ttl 63 4444/udp closed krb524 port-unreach ttl 63 4500/udp open|filtered nat-t-ike no-response 5000/udp open|filtered upnp no-response 5060/udp closed sip port-unreach ttl 63 5353/udp open|filtered zeroconf no-response 5632/udp open|filtered pcanywherestat no-response 9200/udp closed wap-wsp port-unreach ttl 63 10000/udp closed ndmp port-unreach ttl 63 17185/udp open|filtered wdbrpc no-response 20031/udp closed bakbonenetvault port-unreach ttl 63 30718/udp closed unknown port-unreach ttl 63 31337/udp open|filtered BackOrifice no-response 32768/udp closed omad port-unreach ttl 63 32769/udp closed filenet-rpc port-unreach ttl 63 32771/udp open|filtered sometimes-rpc6 no-response 32815/udp closed unknown port-unreach ttl 63 33281/udp closed unknown port-unreach ttl 63 49152/udp open|filtered unknown no-response 49153/udp closed unknown port-unreach ttl 63 49154/udp closed unknown port-unreach ttl 63 49156/udp open|filtered unknown no-response 49181/udp closed unknown port-unreach ttl 63 49182/udp closed unknown port-unreach ttl 63 49185/udp closed unknown port-unreach ttl 63 49186/udp open|filtered unknown no-response 49188/udp closed unknown port-unreach ttl 63 49190/udp closed unknown port-unreach ttl 63 49191/udp closed unknown port-unreach ttl 63 49192/udp open|filtered unknown no-response 49193/udp closed unknown port-unreach ttl 63 49194/udp closed unknown port-unreach ttl 63 49200/udp open|filtered unknown no-response 49201/udp closed unknown port-unreach ttl 63 65024/udp closed unknown port-unreach ttl 63 Too many fingerprints match this host to give specific OS details TCP/IP fingerprint: SCAN(V=7.93%E=4%D=2/1%OT=%CT=%CU=9%PV=Y%DS=2%DC=T%G=N%TM=63DA9948%P=x86_64-pc-linux-gnu) SEQ(CI=Z%II=I) SEQ(CI=Z) T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=) T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=) T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=) U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G) IE(R=Y%DFI=N%T=40%CD=S) Network Distance: 2 hops TRACEROUTE (using port 162/udp) HOP RTT ADDRESS 1 31.00 ms 10.10.16.1 2 328.64 ms broscience.htb (10.10.11.195) Read data files from: /usr/bin/../share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Wed Feb 1 17:54:32 2023 -- 1 IP address (1 host up) scanned in 293.59 seconds