Files
CTF/HTB/encoding/results/scans/_top_100_udp_nmap.txt
Simon 82b0759f1e init htb
old htb folders
2023-08-29 21:53:22 +02:00

53 lines
2.9 KiB
Plaintext

# Nmap 7.93 scan initiated Sat Jan 28 20:06:56 2023 as: nmap -vv --reason -Pn -T4 -sU -A --top-ports 100 -oN /home/kali/htb/results/scans/_top_100_udp_nmap.txt -oX /home/kali/htb/results/scans/xml/_top_100_udp_nmap.xml 10.129.123.2
Warning: 10.129.123.2 giving up on port because retransmission cap hit (6).
Increasing send delay for 10.129.123.2 from 100 to 200 due to 11 out of 11 dropped probes since last increase.
Increasing send delay for 10.129.123.2 from 200 to 400 due to 11 out of 11 dropped probes since last increase.
Increasing send delay for 10.129.123.2 from 400 to 800 due to 11 out of 11 dropped probes since last increase.
adjust_timeouts2: packet supposedly had rtt of -184576 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -184576 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -303015 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -303015 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -527666 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -527666 microseconds. Ignoring time.
Nmap scan report for encoding.htb (10.129.123.2)
Host is up, received user-set (0.026s latency).
Scanned at 2023-01-28 20:06:56 CET for 244s
Not shown: 84 closed udp ports (port-unreach)
PORT STATE SERVICE REASON VERSION
68/udp open|filtered dhcpc no-response
80/udp open|filtered http no-response
111/udp open|filtered rpcbind no-response
120/udp open|filtered cfdptkt no-response
135/udp open|filtered msrpc no-response
177/udp open|filtered xdmcp no-response
520/udp open|filtered route no-response
593/udp open|filtered http-rpc-epmap no-response
998/udp open|filtered puparp no-response
999/udp open|filtered applix no-response
3703/udp open|filtered adobeserver-3 no-response
4500/udp open|filtered nat-t-ike no-response
49186/udp open|filtered unknown no-response
49190/udp open|filtered unknown no-response
49192/udp open|filtered unknown no-response
49193/udp open|filtered unknown no-response
Too many fingerprints match this host to give specific OS details
TCP/IP fingerprint:
SCAN(V=7.93%E=4%D=1/28%OT=%CT=%CU=7%PV=Y%DS=2%DC=T%G=N%TM=63D57344%P=x86_64-pc-linux-gnu)
SEQ(CI=Z%II=I)
SEQ(CI=Z)
T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)
IE(R=Y%DFI=N%T=40%CD=S)
Network Distance: 2 hops
TRACEROUTE (using port 49152/udp)
HOP RTT ADDRESS
1 25.83 ms 10.10.14.1
2 26.04 ms encoding.htb (10.129.123.2)
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Jan 28 20:11:00 2023 -- 1 IP address (1 host up) scanned in 243.96 seconds