nmap

  ___                        
 ( _ ) _ __ ___   __ _ _ __  
 / _ \| '_ ` _ \ / _` | '_ \ 
| (_) | | | | | | (_| | |_) |
 \___/|_| |_| |_|\__,_| .__/ 
                      |_|    
          adot8 <3

[+] Scanning 10.10.10.75 [65535 TCP ports]


[+] Enumerating 10.10.10.75 [22,80]

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-07-02 10:34 CDT
Nmap scan report for 10.10.10.75
Host is up (0.12s latency).

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 c4:f8:ad:e8:f8:04:77:de:cf:15:0d:63:0a:18:7e:49 (RSA)
|   256 22:8f:b1:97:bf:0f:17:08:fc:7e:2c:8f:e9:77:3a:48 (ECDSA)
|_  256 e6:ac:27:a3:b5:a9:f1:12:3c:34:a5:5d:5b:eb:3d:e9 (ED25519)
80/tcp open  http    Apache httpd 2.4.18 ((Ubuntu))
|_http-title: Site doesn't have a title (text/html).
|_http-server-header: Apache/2.4.18 (Ubuntu)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.13 seconds

[+] Enumerating 10.10.10.75 for vulnerabilities [22,80]

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-07-02 10:34 CDT
Pre-scan script results:
| broadcast-avahi-dos: 
|   Discovered hosts:
|     224.0.0.251
|   After NULL UDP avahi packet DoS (CVE-2011-1002).
|_  Hosts are all up (not vulnerable).
Nmap scan report for 10.10.10.75
Host is up (0.13s latency).

PORT   STATE SERVICE
22/tcp open  ssh
80/tcp open  http
|_http-dombased-xss: Couldn't find any DOM based XSS.
|_http-csrf: Couldn't find any CSRF vulnerabilities.
| http-slowloris-check: 
|   VULNERABLE:
|   Slowloris DOS attack
|     State: LIKELY VULNERABLE
|     IDs:  CVE:CVE-2007-6750
|       Slowloris tries to keep many connections to the target web server open and hold
|       them open as long as possible.  It accomplishes this by opening connections to
|       the target web server and sending a partial request. By doing so, it starves
|       the http server's resources causing Denial Of Service.
|       
|     Disclosure date: 2009-09-17
|     References:
|       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750
|_      http://ha.ckers.org/slowloris/
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.

Nmap done: 1 IP address (1 host up) scanned in 346.74 seconds

[+] Scanning 10.10.10.75 [1000 UDP ports]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-07-02 10:40 CDT
Initiating Ping Scan at 10:40
Scanning 10.10.10.75 [4 ports]
Completed Ping Scan at 10:40, 0.17s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 10:40
Completed Parallel DNS resolution of 1 host. at 10:40, 0.02s elapsed
Initiating UDP Scan at 10:40
Scanning 10.10.10.75 [100 ports]
Increasing send delay for 10.10.10.75 from 0 to 50 due to max_successful_tryno increase to 5
Increasing send delay for 10.10.10.75 from 50 to 100 due to max_successful_tryno increase to 6
Warning: 10.10.10.75 giving up on port because retransmission cap hit (6).
Increasing send delay for 10.10.10.75 from 100 to 200 due to 11 out of 12 dropped probes since last increase.
Increasing send delay for 10.10.10.75 from 200 to 400 due to 11 out of 11 dropped probes since last increase.
Increasing send delay for 10.10.10.75 from 400 to 800 due to 11 out of 11 dropped probes since last increase.
Completed UDP Scan at 10:41, 89.61s elapsed (100 total ports)
Nmap scan report for 10.10.10.75
Host is up (0.13s latency).
Not shown: 87 closed udp ports (port-unreach)
PORT      STATE         SERVICE
19/udp    open|filtered chargen
67/udp    open|filtered dhcps
88/udp    open|filtered kerberos-sec
135/udp   open|filtered msrpc
631/udp   open|filtered ipp
998/udp   open|filtered puparp
3283/udp  open|filtered netassistant
3703/udp  open|filtered adobeserver-3
5000/udp  open|filtered upnp
49152/udp open|filtered unknown
49186/udp open|filtered unknown
49191/udp open|filtered unknown
49192/udp open|filtered unknown

Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 89.95 seconds
           Raw packets sent: 416 (26.225KB) | Rcvd: 218 (34.412KB)

[+] Completed!

Last updated

Was this helpful?