nmap

  ___                        
 ( _ ) _ __ ___   __ _ _ __  
 / _ \| '_ ` _ \ / _` | '_ \ 
| (_) | | | | | | (_| | |_) |
 \___/|_| |_| |_|\__,_| .__/ 
                      |_|    
          adot8 <3

[+] Scanning 10.10.10.51 [65535 TCP ports]


[+] Enumerating 10.10.10.51 [22,25,80,110,119,4555]

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-03 13:59 CDT
Stats: 0:02:41 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 98.81% done; ETC: 14:02 (0:00:00 remaining)
Stats: 0:04:10 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 97.92% done; ETC: 14:03 (0:00:02 remaining)
Nmap scan report for 10.10.10.51
Host is up (0.045s latency).

PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 7.4p1 Debian 10+deb9u1 (protocol 2.0)
| ssh-hostkey: 
|   2048 77:00:84:f5:78:b9:c7:d3:54:cf:71:2e:0d:52:6d:8b (RSA)
|   256 78:b8:3a:f6:60:19:06:91:f5:53:92:1d:3f:48:ed:53 (ECDSA)
|_  256 e4:45:e9:ed:07:4d:73:69:43:5a:12:70:9d:c4:af:76 (ED25519)
25/tcp   open  smtp    JAMES smtpd 2.3.2
|_smtp-commands: solidstate Hello nmap.scanme.org (10.10.14.6 [10.10.14.6])
80/tcp   open  http    Apache httpd 2.4.25 ((Debian))
|_http-title: Home - Solid State Security
|_http-server-header: Apache/2.4.25 (Debian)
110/tcp  open  pop3    JAMES pop3d 2.3.2
119/tcp  open  nntp    JAMES nntpd (posting ok)
4555/tcp open  rsip?
| fingerprint-strings: 
|   GenericLines: 
|     JAMES Remote Administration Tool 2.3.2
|     Please enter your login and password
|     Login id:
|     Password:
|     Login failed for 
|_    Login id:
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port4555-TCP:V=7.94SVN%I=7%D=6/3%Time=665E1296%P=x86_64-pc-linux-gnu%r(
SF:GenericLines,7C,"JAMES\x20Remote\x20Administration\x20Tool\x202\.3\.2\n
SF:Please\x20enter\x20your\x20login\x20and\x20password\nLogin\x20id:\nPass
SF:word:\nLogin\x20failed\x20for\x20\nLogin\x20id:\n");
Service Info: Host: solidstate; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 261.86 seconds

[+] Enumerating 10.10.10.51 for vulnerabilities [22,25,80,110,119,4555]

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-03 14:03 CDT
Pre-scan script results:
| broadcast-avahi-dos: 
|   Discovered hosts:
|     224.0.0.251
|   After NULL UDP avahi packet DoS (CVE-2011-1002).
|_  Hosts are all up (not vulnerable).
Nmap scan report for solid-state-security.com (10.10.10.51)
Host is up (0.049s latency).

PORT     STATE SERVICE
22/tcp   open  ssh
25/tcp   open  smtp
| smtp-vuln-cve2010-4344: 
|_  The SMTP server is not Exim: NOT VULNERABLE
80/tcp   open  http
| http-sql-injection: 
|   Possible sqli for queries:
|     http://solid-state-security.com:80/assets/js/?C=N%3BO%3DD%27%20OR%20sqlspider
|     http://solid-state-security.com:80/assets/js/?C=S%3BO%3DA%27%20OR%20sqlspider
|     http://solid-state-security.com:80/assets/js/?C=M%3BO%3DA%27%20OR%20sqlspider
|     http://solid-state-security.com:80/assets/js/?C=D%3BO%3DA%27%20OR%20sqlspider
|     http://solid-state-security.com:80/assets/js/?C=S%3BO%3DA%27%20OR%20sqlspider
|     http://solid-state-security.com:80/assets/js/?C=D%3BO%3DA%27%20OR%20sqlspider
|     http://solid-state-security.com:80/assets/js/?C=M%3BO%3DA%27%20OR%20sqlspider
|     http://solid-state-security.com:80/assets/js/?C=N%3BO%3DA%27%20OR%20sqlspider
|     http://solid-state-security.com:80/assets/js/?C=S%3BO%3DD%27%20OR%20sqlspider
|     http://solid-state-security.com:80/assets/js/?C=D%3BO%3DA%27%20OR%20sqlspider
|     http://solid-state-security.com:80/assets/js/?C=M%3BO%3DA%27%20OR%20sqlspider
|     http://solid-state-security.com:80/assets/js/?C=N%3BO%3DA%27%20OR%20sqlspider
|     http://solid-state-security.com:80/assets/js/?C=M%3BO%3DD%27%20OR%20sqlspider
|     http://solid-state-security.com:80/assets/js/?C=S%3BO%3DA%27%20OR%20sqlspider
|     http://solid-state-security.com:80/assets/js/?C=N%3BO%3DA%27%20OR%20sqlspider
|     http://solid-state-security.com:80/assets/js/?C=D%3BO%3DA%27%20OR%20sqlspider
|     http://solid-state-security.com:80/assets/js/ie/?C=S%3BO%3DA%27%20OR%20sqlspider
|     http://solid-state-security.com:80/assets/js/ie/?C=D%3BO%3DA%27%20OR%20sqlspider
|     http://solid-state-security.com:80/assets/js/ie/?C=M%3BO%3DA%27%20OR%20sqlspider
|_    http://solid-state-security.com:80/assets/js/ie/?C=N%3BO%3DD%27%20OR%20sqlspider
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
| http-csrf: 
| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=solid-state-security.com
|   Found the following possible CSRF vulnerabilities: 
|     
|     Path: http://solid-state-security.com:80/
|     Form id: name
|     Form action: #
|     
|     Path: http://solid-state-security.com:80/about.html
|     Form id: name
|     Form action: #
|     
|     Path: http://solid-state-security.com:80/services.html
|     Form id: name
|     Form action: #
|     
|     Path: http://solid-state-security.com:80/index.html
|     Form id: name
|_    Form action: #
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-enum: 
|   /README.txt: Interesting, a readme.
|_  /images/: Potentially interesting directory w/ listing on 'apache/2.4.25 (debian)'
110/tcp  open  pop3
119/tcp  open  nntp
4555/tcp open  rsip

Nmap done: 1 IP address (1 host up) scanned in 425.44 seconds

[+] Scanning 10.10.10.51 [1000 UDP ports]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-03 14:10 CDT
Initiating Ping Scan at 14:10
Scanning 10.10.10.51 [4 ports]
Completed Ping Scan at 14:10, 0.07s elapsed (1 total hosts)
Initiating UDP Scan at 14:10
Scanning solid-state-security.com (10.10.10.51) [100 ports]
Increasing send delay for 10.10.10.51 from 0 to 50 due to 11 out of 16 dropped probes since last increase.
Increasing send delay for 10.10.10.51 from 50 to 100 due to 11 out of 13 dropped probes since last increase.
Completed UDP Scan at 14:11, 32.22s elapsed (100 total ports)
Nmap scan report for solid-state-security.com (10.10.10.51)
Host is up (0.045s latency).
Not shown: 63 open|filtered udp ports (no-response)
PORT      STATE  SERVICE
53/udp    closed domain
68/udp    closed dhcpc
69/udp    closed tftp
135/udp   closed msrpc
136/udp   closed profile
137/udp   closed netbios-ns
138/udp   closed netbios-dgm
158/udp   closed pcmail-srv
162/udp   closed snmptrap
177/udp   closed xdmcp
427/udp   closed svrloc
497/udp   closed retrospect
515/udp   closed printer
518/udp   closed ntalk
593/udp   closed http-rpc-epmap
996/udp   closed vsinet
998/udp   closed puparp
1023/udp  closed unknown
1433/udp  closed ms-sql-s
1646/udp  closed radacct
1701/udp  closed L2TP
1718/udp  closed h225gatedisc
1812/udp  closed radius
2049/udp  closed nfs
2222/udp  closed msantipiracy
3456/udp  closed IISrpc-or-vat
5632/udp  closed pcanywherestat
30718/udp closed unknown
31337/udp closed BackOrifice
32769/udp closed filenet-rpc
32771/udp closed sometimes-rpc6
49156/udp closed unknown
49181/udp closed unknown
49182/udp closed unknown
49188/udp closed unknown
49190/udp closed unknown
49193/udp closed unknown

Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 32.49 seconds
           Raw packets sent: 640 (40.623KB) | Rcvd: 39 (2.836KB)

[+] Completed!
                

Last updated

Was this helpful?