46 lines
2.5 KiB
Plaintext
46 lines
2.5 KiB
Plaintext
# Nmap 7.93 scan initiated Sat Feb 11 20:03:59 2023 as: nmap -vv --reason -Pn -T4 -sU -A --top-ports 100 -oN /home/simon/htb/interface/results/scans/_top_100_udp_nmap.txt -oX /home/simon/htb/interface/results/scans/xml/_top_100_udp_nmap.xml interface.htb
|
|
Warning: 10.129.146.193 giving up on port because retransmission cap hit (6).
|
|
Increasing send delay for 10.129.146.193 from 100 to 200 due to 11 out of 11 dropped probes since last increase.
|
|
Increasing send delay for 10.129.146.193 from 200 to 400 due to 11 out of 11 dropped probes since last increase.
|
|
Increasing send delay for 10.129.146.193 from 400 to 800 due to 11 out of 12 dropped probes since last increase.
|
|
adjust_timeouts2: packet supposedly had rtt of -432739 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -432739 microseconds. Ignoring time.
|
|
Nmap scan report for interface.htb (10.129.146.193)
|
|
Host is up, received user-set (0.035s latency).
|
|
Scanned at 2023-02-11 20:04:01 CET for 231s
|
|
Not shown: 87 closed udp ports (port-unreach)
|
|
PORT STATE SERVICE REASON VERSION
|
|
17/udp open|filtered qotd no-response
|
|
68/udp open|filtered dhcpc no-response
|
|
80/udp open|filtered http no-response
|
|
177/udp open|filtered xdmcp no-response
|
|
593/udp open|filtered http-rpc-epmap no-response
|
|
631/udp open|filtered ipp no-response
|
|
1029/udp open|filtered solid-mux no-response
|
|
1719/udp open|filtered h323gatestat no-response
|
|
3703/udp open|filtered adobeserver-3 no-response
|
|
4444/udp open|filtered krb524 no-response
|
|
32815/udp open|filtered unknown no-response
|
|
49154/udp open|filtered unknown no-response
|
|
65024/udp open|filtered unknown no-response
|
|
Too many fingerprints match this host to give specific OS details
|
|
TCP/IP fingerprint:
|
|
SCAN(V=7.93%E=4%D=2/11%OT=%CT=%CU=7%PV=Y%DS=2%DC=T%G=N%TM=63E7E788%P=x86_64-pc-linux-gnu)
|
|
SEQ(CI=Z%II=I)
|
|
SEQ(CI=Z)
|
|
T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
|
|
T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
|
|
U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)
|
|
IE(R=Y%DFI=N%T=40%CD=S)
|
|
|
|
Network Distance: 2 hops
|
|
|
|
TRACEROUTE (using port 49192/udp)
|
|
HOP RTT ADDRESS
|
|
1 33.86 ms 10.10.16.1
|
|
2 33.95 ms interface.htb (10.129.146.193)
|
|
|
|
Read data files from: /usr/bin/../share/nmap
|
|
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
|
|
# Nmap done at Sat Feb 11 20:07:52 2023 -- 1 IP address (1 host up) scanned in 233.62 seconds
|