tcp port scan with nmap

Upload: mihnea-dobre

Post on 06-Jan-2016

29 views

Category:

Documents


0 download

DESCRIPTION

Nmap example

TRANSCRIPT

  • Test date: 30-Sep-2015, 12:13:20

    Pentest-Tools.com Report

    TCP Port Scan with NmapTest parameters:

    - Host 89.122.99.188- Ports Top 100 common ports- Ping host True- Detect OS True- Detect svc version True- Traceroute True

    Test result:

    Starting Nmap 6.00 ( http://nmap.org ) at 2015-09-30 12:13 EESTNSE: Loaded 17 scripts for scanning.Initiating Ping Scan at 12:13Scanning 89.122.99.188 [4 ports]Completed Ping Scan at 12:13, 0.07s elapsed (1 total hosts)Initiating SYN Stealth Scan at 12:13Scanning 89.122.99.188 [100 ports]Discovered open port 88/tcp on 89.122.99.188Completed SYN Stealth Scan at 12:13, 1.34s elapsed (100 total ports)Initiating Service scan at 12:13Scanning 1 service on 89.122.99.188Completed Service scan at 12:13, 6.11s elapsed (1 service on 1 host)Initiating OS detection (try #1) against 89.122.99.188Retrying OS detection (try #2) against 89.122.99.188Initiating Traceroute at 12:13Completed Traceroute at 12:13, 2.02s elapsedNSE: Script scanning 89.122.99.188.

    [+] Nmap scan report for 89.122.99.188

    Host is up (0.048s latency).Not shown: 90 closed ports

    PORT STATE SERVICE VERSION

    88/tcp open http Netwave IP camera http config427/tcp filtered svrloc873/tcp filtered rsync1028/tcp filtered unknown1900/tcp filtered upnp2049/tcp filtered nfs5432/tcp filtered postgresql5800/tcp filtered vnc-http6000/tcp filtered X118009/tcp filtered ajp13OS fingerprint not ideal because: Host distance (8 network hops) is greater than fiveNo OS matches for hostUptime guess: 14.082 days (since Wed Sep 16 10:15:06 2015)Network Distance: 7 hopsTCP Sequence Prediction: Difficulty=201 (Good luck!)IP ID Sequence Generation: All zerosService Info: Device: webcam

    TRACEROUTE (using port 80/tcp)

    HOP RTT ADDRESS1 0.48 ms router1-lon.linode.com (212.111.33.229)2 1.31 ms 212.111.33.2333 ...4 17.92 ms 195.66.225.425 48.93 ms 10.0.200.216 48.32 ms 10.0.241.1907 47.26 ms 89.122.99.188

    OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .

    Nmap done: 1 IP address (1 host up) scanned in 14.14 seconds

    Raw packets sent: 192 (10.808KB) | Rcvd: 691 (39.467KB)