Files
CTF/HTB/trick/results/scans/tcp53/tcp_53_dns_nmap.txt
Simon 82b0759f1e init htb
old htb folders
2023-08-29 21:53:22 +02:00

23 lines
1.1 KiB
Plaintext

# Nmap 7.93 scan initiated Sat Jan 21 18:40:18 2023 as: nmap -vv --reason -Pn -T4 -sV -p 53 "--script=banner,(dns* or ssl*) and not (brute or broadcast or dos or external or fuzzer)" -oN /home/simon/htb/trick/results/scans/tcp53/tcp_53_dns_nmap.txt -oX /home/simon/htb/trick/results/scans/tcp53/xml/tcp_53_dns_nmap.xml 10.129.227.180
Nmap scan report for trick.htb (10.129.227.180)
Host is up, received user-set (0.021s latency).
Scanned at 2023-01-21 18:40:20 UTC for 455s
PORT STATE SERVICE REASON VERSION
53/tcp open domain syn-ack ISC BIND 9.11.5-P4-5.1+deb10u7 (Debian Linux)
| dns-nsid:
|_ bind.version: 9.11.5-P4-5.1+deb10u7-Debian
| dns-nsec-enum:
|_ No NSEC records found
| dns-nsec3-enum:
|_ DNSSEC NSEC3 not supported
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Host script results:
| dns-brute:
|_ DNS Brute-force hostnames: No results.
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Jan 21 18:47:55 2023 -- 1 IP address (1 host up) scanned in 457.45 seconds