# Nmap 7.93 scan initiated Sat Jan 21 18:40:18 2023 as: nmap -vv --reason -Pn -T4 -sV -p 53 "--script=banner,(dns* or ssl*) and not (brute or broadcast or dos or external or fuzzer)" -oN /home/simon/htb/trick/results/scans/tcp53/tcp_53_dns_nmap.txt -oX /home/simon/htb/trick/results/scans/tcp53/xml/tcp_53_dns_nmap.xml 10.129.227.180 Nmap scan report for trick.htb (10.129.227.180) Host is up, received user-set (0.021s latency). Scanned at 2023-01-21 18:40:20 UTC for 455s PORT STATE SERVICE REASON VERSION 53/tcp open domain syn-ack ISC BIND 9.11.5-P4-5.1+deb10u7 (Debian Linux) | dns-nsid: |_ bind.version: 9.11.5-P4-5.1+deb10u7-Debian | dns-nsec-enum: |_ No NSEC records found | dns-nsec3-enum: |_ DNSSEC NSEC3 not supported Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Host script results: | dns-brute: |_ DNS Brute-force hostnames: No results. Read data files from: /usr/bin/../share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sat Jan 21 18:47:55 2023 -- 1 IP address (1 host up) scanned in 457.45 seconds