0% found this document useful (0 votes)
140 views2 pages

Nmap

This document summarizes the results of a port scan on a host. It found several ports open including ports 21, 80, 443, 139, 445, 3389 indicating services like FTP, HTTP, SSL/HTTPS, SMB/NetBIOS, and RDP. The OS is identified as Windows Server 2003 SP2. Several applications were also identified running on open ports like Apache HTTPD 2.2.11 on ports 80 and 443, and MySQL on port 3306. Network information like the NetBIOS name, user, and MAC address are also provided.

Uploaded by

Andik Syafruddin
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
140 views2 pages

Nmap

This document summarizes the results of a port scan on a host. It found several ports open including ports 21, 80, 443, 139, 445, 3389 indicating services like FTP, HTTP, SSL/HTTPS, SMB/NetBIOS, and RDP. The OS is identified as Windows Server 2003 SP2. Several applications were also identified running on open ports like Apache HTTPD 2.2.11 on ports 80 and 443, and MySQL on port 3306. Network information like the NetBIOS name, user, and MAC address are also provided.

Uploaded by

Andik Syafruddin
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

Not shown: 976 closed ports

PORT
STATE SERVICE
VERSION
21/tcp open tcpwrapped
80/tcp open http
Apache httpd 2.2.11 ((Win32) DAV/2 mod_ssl/2.2.11 O
penSSL/0.9.8i PHP/5.2.9)
|_ html-title: Site doesn't have a title (text/html).
135/tcp open msrpc
Microsoft Windows RPC
139/tcp open netbios-ssn
443/tcp open ssl/http
Apache httpd 2.2.11 ((Win32) DAV/2 mod_ssl/2.2.11 O
penSSL/0.9.8i PHP/5.2.9)
|_ sslv2: server still supports SSLv2
|_ html-title: Site doesn't have a title (text/html).
445/tcp open microsoft-ds Microsoft Windows 2003 microsoft-ds
554/tcp open rtsp?
1025/tcp open msrpc
Microsoft Windows RPC
1052/tcp open ddt?
1100/tcp open unknown
1106/tcp open unknown
1723/tcp open pptp
Microsoft (Firmware: 3790)
2301/tcp open compaqdiag?
2381/tcp open http
Apache SSL-only mode httpd
|_ html-title: 400 Bad Request
3306/tcp open mysql
MySQL (unauthorized)
3389/tcp open microsoft-rdp Microsoft Terminal Service
4899/tcp open radmin?
5555/tcp open omniback
HP OpenView Omniback
9001/tcp open tor-orport?
9002/tcp open unknown
9003/tcp open unknown
9009/tcp open unknown
9010/tcp open unknown
9011/tcp open unknown
2 services unrecognized despite returning data. If you know the service/version,
please submit the following fingerprints at http://www.insecure.org/cgi-bin/ser
vicefp-submit.cgi :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port554-TCP:V=5.00%I=7%D=6/6%Time=4DEC55DE%P=i686-pc-linux-gnu%r(RTSPRe
SF:quest,26,"RTSP/1\.0\x20500\x20Internal\x20Server\x20Error\r\n\r\n")%r(H
SF:TTPOptions,26,"RTSP/1\.0\x20500\x20Internal\x20Server\x20Error\r\n\r\n"
SF:)%r(SIPOptions,38,"RTSP/1\.0\x20500\x20Internal\x20Server\x20Error\r\nC
SF:Seq:\x2042\x20OPTIONS\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port2301-TCP:V=5.00%I=7%D=6/6%Time=4DEC55DA%P=i686-pc-linux-gnu%r(HTTPO
SF:ptions,238,"HTTP/1\.1\x20302\x20Found\r\nDate:\x20Mon,\x2006\x20Jun\x20
SF:2011\x2004:22:17\x20GMT\r\nServer:\x20CompaqHTTPServer/9\.9\x20HP\x20Sy
SF:stem\x20Management\x20Homepage/3\.0\.2\.77\x20httpd/2\.2\.6\+\r\nLocati
SF:on:\x20/red2301\.html\?RedirectUrl=/\r\nSet-Cookie:\x20Compaq-HMMD=0001
SF:-250a14d2-ef5f-1840-9e18-f3c3276a841a-1307334137046875;\x20path=/\r\nCo
SF:ntent-Length:\x20211\r\nConnection:\x20close\r\nContent-Type:\x20text/h
SF:tml;\x20charset=iso-8859-1\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//I
SF:ETF//DTD\x20HTML\x202\.0//EN\">\n<html><head>\n<title>302\x20Found</tit
SF:le>\n</head><body>\n<h1>Found</h1>\n<p>The\x20document\x20has\x20moved\
SF:x20<a\x20href=\"/red2301\.html\?RedirectUrl=/\">here</a>\.</p>\n</body>
SF:</html>\n")%r(GetRequest,238,"HTTP/1\.1\x20302\x20Found\r\nDate:\x20Mon
SF:,\x2006\x20Jun\x202011\x2004:22:22\x20GMT\r\nServer:\x20CompaqHTTPServe
SF:r/9\.9\x20HP\x20System\x20Management\x20Homepage/3\.0\.2\.77\x20httpd/2
SF:\.2\.6\+\r\nLocation:\x20/red2301\.html\?RedirectUrl=/\r\nSet-Cookie:\x
SF:20Compaq-HMMD=0001-2ad20b41-eb4e-364b-8e5f-4faf40e87414-130733414207812
SF:5;\x20path=/\r\nContent-Length:\x20211\r\nConnection:\x20close\r\nConte
SF:nt-Type:\x20text/html;\x20charset=iso-8859-1\r\n\r\n<!DOCTYPE\x20HTML\x

SF:20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\n<html><head>\n<title
SF:>302\x20Found</title>\n</head><body>\n<h1>Found</h1>\n<p>The\x20documen
SF:t\x20has\x20moved\x20<a\x20href=\"/red2301\.html\?RedirectUrl=/\">here<
SF:/a>\.</p>\n</body></html>\n")%r(RTSPRequest,238,"HTTP/1\.1\x20302\x20Fo
SF:und\r\nDate:\x20Mon,\x2006\x20Jun\x202011\x2004:22:22\x20GMT\r\nServer:
SF:\x20CompaqHTTPServer/9\.9\x20HP\x20System\x20Management\x20Homepage/3\.
SF:0\.2\.77\x20httpd/2\.2\.6\+\r\nLocation:\x20/red2301\.html\?RedirectUrl
SF:=/\r\nSet-Cookie:\x20Compaq-HMMD=0001-1ecfcb8d-a87a-e147-bfb7-3ff15ee63
SF:726-1307334142093750;\x20path=/\r\nContent-Length:\x20211\r\nConnection
SF::\x20close\r\nContent-Type:\x20text/html;\x20charset=iso-8859-1\r\n\r\n
SF:<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\n<
SF:html><head>\n<title>302\x20Found</title>\n</head><body>\n<h1>Found</h1>
SF:\n<p>The\x20document\x20has\x20moved\x20<a\x20href=\"/red2301\.html\?Re
SF:directUrl=/\">here</a>\.</p>\n</body></html>\n");
No exact OS matches for host (If you know what OS is running on it, see http://n
map.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=5.00%D=6/6%OT=21%CT=1%CU=44777%PV=Y%DS=5%G=Y%TM=4DEC60B1%P=i686-p
OS:c-linux-gnu)SEQ(SP=104%GCD=1%ISR=10D%TI=I%CI=I%TS=0)SEQ(SP=104%GCD=1%ISR
OS:=10D%TS=0)OPS(O1=M5B4NW0NNT00NNS%O2=M5B4NW0NNT00NNS%O3=M5B4NW0NNT00%O4=M
OS:5B4NW0NNT00NNS%O5=M5B4NW0NNT00NNS%O6=M5B4NNT00NNS)WIN(W1=4470%W2=41A0%W3
OS:=4100%W4=40E8%W5=40E8%W6=402E)ECN(R=N)T1(R=Y%DF=N%T=85%S=O%A=S+%F=AS%RD=
OS:0%Q=)T2(R=N)T3(R=N)T4(R=N)T5(R=Y%DF=N%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
OS:T6(R=Y%DF=N%T=80%W=0%S=A%A=O%F=R%O=%RD=0%Q=)T7(R=N)U1(R=Y%DF=N%T=80%IPL=
OS:B0%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=B559%RUD=G)IE(R=N)
Network Distance: 5 hops
Service Info: OS: Windows
Host script results:
|_ nbstat: NetBIOS name: MONITORINGCCTV, NetBIOS user: <unknown>, NetBIOS MAC: 0
0:26:55:87:ac:a4
| smb-os-discovery: Windows Server 2003 3790 Service Pack 2
| LAN Manager: Windows Server 2003 5.2
| Name: WORKGROUP\MONITORINGCCTV
|_ System time: 2011-06-06 12:07:52 UTC+7
TRACEROUTE (using port 143/tcp)
HOP RTT ADDRESS
1
! maximum TTL reached (50)
OS and Service detection performed. Please report any incorrect results at http:
//nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 2788.94 seconds

You might also like