nmap
___
( _ ) _ __ ___ __ _ _ __
/ _ \| '_ ` _ \ / _` | '_ \
| (_) | | | | | | (_| | |_) |
\___/|_| |_| |_|\__,_| .__/
|_|
adot8 <3
[+] Scanning 10.10.10.51 [65535 TCP ports]
[+] Enumerating 10.10.10.51 [22,25,80,110,119,4555]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-03 13:59 CDT
Stats: 0:02:41 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 98.81% done; ETC: 14:02 (0:00:00 remaining)
Stats: 0:04:10 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 97.92% done; ETC: 14:03 (0:00:02 remaining)
Nmap scan report for 10.10.10.51
Host is up (0.045s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u1 (protocol 2.0)
| ssh-hostkey:
| 2048 77:00:84:f5:78:b9:c7:d3:54:cf:71:2e:0d:52:6d:8b (RSA)
| 256 78:b8:3a:f6:60:19:06:91:f5:53:92:1d:3f:48:ed:53 (ECDSA)
|_ 256 e4:45:e9:ed:07:4d:73:69:43:5a:12:70:9d:c4:af:76 (ED25519)
25/tcp open smtp JAMES smtpd 2.3.2
|_smtp-commands: solidstate Hello nmap.scanme.org (10.10.14.6 [10.10.14.6])
80/tcp open http Apache httpd 2.4.25 ((Debian))
|_http-title: Home - Solid State Security
|_http-server-header: Apache/2.4.25 (Debian)
110/tcp open pop3 JAMES pop3d 2.3.2
119/tcp open nntp JAMES nntpd (posting ok)
4555/tcp open rsip?
| fingerprint-strings:
| GenericLines:
| JAMES Remote Administration Tool 2.3.2
| Please enter your login and password
| Login id:
| Password:
| Login failed for
|_ Login id:
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port4555-TCP:V=7.94SVN%I=7%D=6/3%Time=665E1296%P=x86_64-pc-linux-gnu%r(
SF:GenericLines,7C,"JAMES\x20Remote\x20Administration\x20Tool\x202\.3\.2\n
SF:Please\x20enter\x20your\x20login\x20and\x20password\nLogin\x20id:\nPass
SF:word:\nLogin\x20failed\x20for\x20\nLogin\x20id:\n");
Service Info: Host: solidstate; OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 261.86 seconds
[+] Enumerating 10.10.10.51 for vulnerabilities [22,25,80,110,119,4555]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-03 14:03 CDT
Pre-scan script results:
| broadcast-avahi-dos:
| Discovered hosts:
| 224.0.0.251
| After NULL UDP avahi packet DoS (CVE-2011-1002).
|_ Hosts are all up (not vulnerable).
Nmap scan report for solid-state-security.com (10.10.10.51)
Host is up (0.049s latency).
PORT STATE SERVICE
22/tcp open ssh
25/tcp open smtp
| smtp-vuln-cve2010-4344:
|_ The SMTP server is not Exim: NOT VULNERABLE
80/tcp open http
| http-sql-injection:
| Possible sqli for queries:
| http://solid-state-security.com:80/assets/js/?C=N%3BO%3DD%27%20OR%20sqlspider
| http://solid-state-security.com:80/assets/js/?C=S%3BO%3DA%27%20OR%20sqlspider
| http://solid-state-security.com:80/assets/js/?C=M%3BO%3DA%27%20OR%20sqlspider
| http://solid-state-security.com:80/assets/js/?C=D%3BO%3DA%27%20OR%20sqlspider
| http://solid-state-security.com:80/assets/js/?C=S%3BO%3DA%27%20OR%20sqlspider
| http://solid-state-security.com:80/assets/js/?C=D%3BO%3DA%27%20OR%20sqlspider
| http://solid-state-security.com:80/assets/js/?C=M%3BO%3DA%27%20OR%20sqlspider
| http://solid-state-security.com:80/assets/js/?C=N%3BO%3DA%27%20OR%20sqlspider
| http://solid-state-security.com:80/assets/js/?C=S%3BO%3DD%27%20OR%20sqlspider
| http://solid-state-security.com:80/assets/js/?C=D%3BO%3DA%27%20OR%20sqlspider
| http://solid-state-security.com:80/assets/js/?C=M%3BO%3DA%27%20OR%20sqlspider
| http://solid-state-security.com:80/assets/js/?C=N%3BO%3DA%27%20OR%20sqlspider
| http://solid-state-security.com:80/assets/js/?C=M%3BO%3DD%27%20OR%20sqlspider
| http://solid-state-security.com:80/assets/js/?C=S%3BO%3DA%27%20OR%20sqlspider
| http://solid-state-security.com:80/assets/js/?C=N%3BO%3DA%27%20OR%20sqlspider
| http://solid-state-security.com:80/assets/js/?C=D%3BO%3DA%27%20OR%20sqlspider
| http://solid-state-security.com:80/assets/js/ie/?C=S%3BO%3DA%27%20OR%20sqlspider
| http://solid-state-security.com:80/assets/js/ie/?C=D%3BO%3DA%27%20OR%20sqlspider
| http://solid-state-security.com:80/assets/js/ie/?C=M%3BO%3DA%27%20OR%20sqlspider
|_ http://solid-state-security.com:80/assets/js/ie/?C=N%3BO%3DD%27%20OR%20sqlspider
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
| http-csrf:
| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=solid-state-security.com
| Found the following possible CSRF vulnerabilities:
|
| Path: http://solid-state-security.com:80/
| Form id: name
| Form action: #
|
| Path: http://solid-state-security.com:80/about.html
| Form id: name
| Form action: #
|
| Path: http://solid-state-security.com:80/services.html
| Form id: name
| Form action: #
|
| Path: http://solid-state-security.com:80/index.html
| Form id: name
|_ Form action: #
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-enum:
| /README.txt: Interesting, a readme.
|_ /images/: Potentially interesting directory w/ listing on 'apache/2.4.25 (debian)'
110/tcp open pop3
119/tcp open nntp
4555/tcp open rsip
Nmap done: 1 IP address (1 host up) scanned in 425.44 seconds
[+] Scanning 10.10.10.51 [1000 UDP ports]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-03 14:10 CDT
Initiating Ping Scan at 14:10
Scanning 10.10.10.51 [4 ports]
Completed Ping Scan at 14:10, 0.07s elapsed (1 total hosts)
Initiating UDP Scan at 14:10
Scanning solid-state-security.com (10.10.10.51) [100 ports]
Increasing send delay for 10.10.10.51 from 0 to 50 due to 11 out of 16 dropped probes since last increase.
Increasing send delay for 10.10.10.51 from 50 to 100 due to 11 out of 13 dropped probes since last increase.
Completed UDP Scan at 14:11, 32.22s elapsed (100 total ports)
Nmap scan report for solid-state-security.com (10.10.10.51)
Host is up (0.045s latency).
Not shown: 63 open|filtered udp ports (no-response)
PORT STATE SERVICE
53/udp closed domain
68/udp closed dhcpc
69/udp closed tftp
135/udp closed msrpc
136/udp closed profile
137/udp closed netbios-ns
138/udp closed netbios-dgm
158/udp closed pcmail-srv
162/udp closed snmptrap
177/udp closed xdmcp
427/udp closed svrloc
497/udp closed retrospect
515/udp closed printer
518/udp closed ntalk
593/udp closed http-rpc-epmap
996/udp closed vsinet
998/udp closed puparp
1023/udp closed unknown
1433/udp closed ms-sql-s
1646/udp closed radacct
1701/udp closed L2TP
1718/udp closed h225gatedisc
1812/udp closed radius
2049/udp closed nfs
2222/udp closed msantipiracy
3456/udp closed IISrpc-or-vat
5632/udp closed pcanywherestat
30718/udp closed unknown
31337/udp closed BackOrifice
32769/udp closed filenet-rpc
32771/udp closed sometimes-rpc6
49156/udp closed unknown
49181/udp closed unknown
49182/udp closed unknown
49188/udp closed unknown
49190/udp closed unknown
49193/udp closed unknown
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 32.49 seconds
Raw packets sent: 640 (40.623KB) | Rcvd: 39 (2.836KB)
[+] Completed!
Last updated
Was this helpful?