53 lines
2.9 KiB
Plaintext
53 lines
2.9 KiB
Plaintext
# Nmap 7.93 scan initiated Sat Jan 28 20:06:56 2023 as: nmap -vv --reason -Pn -T4 -sU -A --top-ports 100 -oN /home/kali/htb/results/scans/_top_100_udp_nmap.txt -oX /home/kali/htb/results/scans/xml/_top_100_udp_nmap.xml 10.129.123.2
|
|
Warning: 10.129.123.2 giving up on port because retransmission cap hit (6).
|
|
Increasing send delay for 10.129.123.2 from 100 to 200 due to 11 out of 11 dropped probes since last increase.
|
|
Increasing send delay for 10.129.123.2 from 200 to 400 due to 11 out of 11 dropped probes since last increase.
|
|
Increasing send delay for 10.129.123.2 from 400 to 800 due to 11 out of 11 dropped probes since last increase.
|
|
adjust_timeouts2: packet supposedly had rtt of -184576 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -184576 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -303015 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -303015 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -527666 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -527666 microseconds. Ignoring time.
|
|
Nmap scan report for encoding.htb (10.129.123.2)
|
|
Host is up, received user-set (0.026s latency).
|
|
Scanned at 2023-01-28 20:06:56 CET for 244s
|
|
Not shown: 84 closed udp ports (port-unreach)
|
|
PORT STATE SERVICE REASON VERSION
|
|
68/udp open|filtered dhcpc no-response
|
|
80/udp open|filtered http no-response
|
|
111/udp open|filtered rpcbind no-response
|
|
120/udp open|filtered cfdptkt no-response
|
|
135/udp open|filtered msrpc no-response
|
|
177/udp open|filtered xdmcp no-response
|
|
520/udp open|filtered route no-response
|
|
593/udp open|filtered http-rpc-epmap no-response
|
|
998/udp open|filtered puparp no-response
|
|
999/udp open|filtered applix no-response
|
|
3703/udp open|filtered adobeserver-3 no-response
|
|
4500/udp open|filtered nat-t-ike no-response
|
|
49186/udp open|filtered unknown no-response
|
|
49190/udp open|filtered unknown no-response
|
|
49192/udp open|filtered unknown no-response
|
|
49193/udp open|filtered unknown no-response
|
|
Too many fingerprints match this host to give specific OS details
|
|
TCP/IP fingerprint:
|
|
SCAN(V=7.93%E=4%D=1/28%OT=%CT=%CU=7%PV=Y%DS=2%DC=T%G=N%TM=63D57344%P=x86_64-pc-linux-gnu)
|
|
SEQ(CI=Z%II=I)
|
|
SEQ(CI=Z)
|
|
T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
|
|
T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
|
|
U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)
|
|
IE(R=Y%DFI=N%T=40%CD=S)
|
|
|
|
Network Distance: 2 hops
|
|
|
|
TRACEROUTE (using port 49152/udp)
|
|
HOP RTT ADDRESS
|
|
1 25.83 ms 10.10.14.1
|
|
2 26.04 ms encoding.htb (10.129.123.2)
|
|
|
|
Read data files from: /usr/bin/../share/nmap
|
|
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
|
|
# Nmap done at Sat Jan 28 20:11:00 2023 -- 1 IP address (1 host up) scanned in 243.96 seconds
|