nmap

adot@kali:~/htb/Classics/Bounty$ nmap -p 80 -A -T4 -v 10.10.10.93 
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-04-01 16:51 CDT
NSE: Loaded 156 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 16:51
Completed NSE at 16:51, 0.00s elapsed
Initiating NSE at 16:51
Completed NSE at 16:51, 0.00s elapsed
Initiating NSE at 16:51
Completed NSE at 16:51, 0.00s elapsed
Initiating Ping Scan at 16:51
Scanning 10.10.10.93 [2 ports]
Completed Ping Scan at 16:51, 0.05s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 16:51
Completed Parallel DNS resolution of 1 host. at 16:51, 0.02s elapsed
Initiating Connect Scan at 16:51
Scanning 10.10.10.93 [1 port]
Discovered open port 80/tcp on 10.10.10.93
Completed Connect Scan at 16:51, 0.04s elapsed (1 total ports)
Initiating Service scan at 16:51
Scanning 1 service on 10.10.10.93
Completed Service scan at 16:51, 6.09s elapsed (1 service on 1 host)
NSE: Script scanning 10.10.10.93.
Initiating NSE at 16:51
Completed NSE at 16:51, 5.06s elapsed
Initiating NSE at 16:51
Completed NSE at 16:51, 0.21s elapsed
Initiating NSE at 16:51
Completed NSE at 16:51, 0.00s elapsed
Nmap scan report for 10.10.10.93
Host is up (0.046s latency).

PORT   STATE SERVICE VERSION
80/tcp open  http    Microsoft IIS httpd 7.5
| http-methods: 
|   Supported Methods: OPTIONS TRACE GET HEAD POST
|_  Potentially risky methods: TRACE
|_http-title: Bounty
|_http-server-header: Microsoft-IIS/7.5
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

NSE: Script Post-scanning.
Initiating NSE at 16:51
Completed NSE at 16:51, 0.00s elapsed
Initiating NSE at 16:51
Completed NSE at 16:51, 0.00s elapsed
Initiating NSE at 16:51
Completed NSE at 16:51, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.84 seconds

Last updated

Was this helpful?