23 lines
1.1 KiB
Plaintext
23 lines
1.1 KiB
Plaintext
# Nmap 7.93 scan initiated Sat Jan 21 18:40:18 2023 as: nmap -vv --reason -Pn -T4 -sV -p 53 "--script=banner,(dns* or ssl*) and not (brute or broadcast or dos or external or fuzzer)" -oN /home/simon/htb/trick/results/scans/tcp53/tcp_53_dns_nmap.txt -oX /home/simon/htb/trick/results/scans/tcp53/xml/tcp_53_dns_nmap.xml 10.129.227.180
|
|
Nmap scan report for trick.htb (10.129.227.180)
|
|
Host is up, received user-set (0.021s latency).
|
|
Scanned at 2023-01-21 18:40:20 UTC for 455s
|
|
|
|
PORT STATE SERVICE REASON VERSION
|
|
53/tcp open domain syn-ack ISC BIND 9.11.5-P4-5.1+deb10u7 (Debian Linux)
|
|
| dns-nsid:
|
|
|_ bind.version: 9.11.5-P4-5.1+deb10u7-Debian
|
|
| dns-nsec-enum:
|
|
|_ No NSEC records found
|
|
| dns-nsec3-enum:
|
|
|_ DNSSEC NSEC3 not supported
|
|
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
|
|
|
|
Host script results:
|
|
| dns-brute:
|
|
|_ DNS Brute-force hostnames: No results.
|
|
|
|
Read data files from: /usr/bin/../share/nmap
|
|
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
|
|
# Nmap done at Sat Jan 21 18:47:55 2023 -- 1 IP address (1 host up) scanned in 457.45 seconds
|