nmap
___
( _ ) _ __ ___ __ _ _ __
/ _ \| '_ ` _ \ / _` | '_ \
| (_) | | | | | | (_| | |_) |
\___/|_| |_| |_|\__,_| .__/
|_|
adot8 <3
[+] Scanning 10.10.11.11 [65535 TCP ports]
[+] Enumerating 10.10.11.11 [22,80]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-24 16:38 CDT
Nmap scan report for 10.10.11.11
Host is up (0.12s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.11 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 3072 06:2d:3b:85:10:59:ff:73:66:27:7f:0e:ae:03:ea:f4 (RSA)
| 256 59:03:dc:52:87:3a:35:99:34:44:74:33:78:31:35:fb (ECDSA)
|_ 256 ab:13:38:e4:3e:e0:24:b4:69:38:a9:63:82:38:dd:f4 (ED25519)
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
|_http-server-header: Apache/2.4.41 (Ubuntu)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.39 seconds
[+] Enumerating 10.10.11.11 for vulnerabilities [22,80]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-24 16:38 CDT
Pre-scan script results:
| broadcast-avahi-dos:
| Discovered hosts:
| 224.0.0.251
| After NULL UDP avahi packet DoS (CVE-2011-1002).
|_ Hosts are all up (not vulnerable).
Nmap scan report for 10.10.11.11
Host is up (0.12s latency).
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
| http-fileupload-exploiter:
|
| Couldn't find a file-type field.
|
| Couldn't find a file-type field.
|
| Couldn't find a file-type field.
|
| Couldn't find a file-type field.
|
| Couldn't find a file-type field.
|
| Couldn't find a file-type field.
|
|_ Couldn't find a file-type field.
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-vuln-cve2017-1001000: ERROR: Script execution failed (use -d to debug)
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-csrf:
| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=10.10.11.11
| Found the following possible CSRF vulnerabilities:
|
| Path: http://10.10.11.11:80/
| Form id:
| Form action:
|
| Path: http://10.10.11.11:80/
| Form id:
| Form action:
|
| Path: http://10.10.11.11:80/do.php
| Form id:
| Form action:
|
| Path: http://10.10.11.11:80/index.php
| Form id:
| Form action:
|
| Path: http://10.10.11.11:80/index.php
| Form id:
| Form action:
|
| Path: http://10.10.11.11:80/contact.php
| Form id:
| Form action:
|
| Path: http://10.10.11.11:80/contact.php
| Form id:
| Form action:
|
| Path: http://10.10.11.11:80/about.php
| Form id:
|_ Form action:
Nmap done: 1 IP address (1 host up) scanned in 636.72 seconds
[+] Scanning 10.10.11.11 [1000 UDP ports]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-24 16:48 CDT
Initiating Ping Scan at 16:48
Scanning 10.10.11.11 [4 ports]
Completed Ping Scan at 16:48, 0.15s elapsed (1 total hosts)
Initiating UDP Scan at 16:48
Scanning board.htb (10.10.11.11) [100 ports]
Increasing send delay for 10.10.11.11 from 0 to 50 due to 11 out of 18 dropped probes since last increase.
Increasing send delay for 10.10.11.11 from 50 to 100 due to max_successful_tryno increase to 5
Increasing send delay for 10.10.11.11 from 100 to 200 due to max_successful_tryno increase to 6
Warning: 10.10.11.11 giving up on port because retransmission cap hit (6).
Increasing send delay for 10.10.11.11 from 200 to 400 due to 11 out of 12 dropped probes since last increase.
Increasing send delay for 10.10.11.11 from 400 to 800 due to 11 out of 14 dropped probes since last increase.
Completed UDP Scan at 16:50, 74.31s elapsed (100 total ports)
Nmap scan report for board.htb (10.10.11.11)
Host is up (0.12s latency).
Not shown: 74 closed udp ports (port-unreach)
PORT STATE SERVICE
9/udp open|filtered discard
19/udp open|filtered chargen
67/udp open|filtered dhcps
68/udp open|filtered dhcpc
80/udp open|filtered http
88/udp open|filtered kerberos-sec
123/udp open|filtered ntp
135/udp open|filtered msrpc
139/udp open|filtered netbios-ssn
161/udp open|filtered snmp
177/udp open|filtered xdmcp
514/udp open|filtered syslog
997/udp open|filtered maitrd
1025/udp open|filtered blackjack
1028/udp open|filtered ms-lsa
1719/udp open|filtered h323gatestat
1812/udp open|filtered radius
2000/udp open|filtered cisco-sccp
2049/udp open|filtered nfs
3283/udp open|filtered netassistant
5353/udp open|filtered zeroconf
33281/udp open|filtered unknown
49153/udp open|filtered unknown
49156/udp open|filtered unknown
49192/udp open|filtered unknown
65024/udp open|filtered unknown
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 74.64 seconds
Raw packets sent: 498 (30.958KB) | Rcvd: 185 (31.468KB)
[+] Completed!
Last updated
Was this helpful?