The nmap scan identified various devices on the 192.168.2.0/24 network including switches, routers, firewalls, PCs and servers running Windows, Linux and Mac OS X. Open ports included HTTP, SSH, Telnet, RDP and various application ports. The OS, device type and vendor were identified for each device based on the scan results.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
185 views20 pages
Nmap
The nmap scan identified various devices on the 192.168.2.0/24 network including switches, routers, firewalls, PCs and servers running Windows, Linux and Mac OS X. Open ports included HTTP, SSH, Telnet, RDP and various application ports. The OS, device type and vendor were identified for each device based on the scan results.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20
msf > nmap -O 192.168.2.
0/24 [*] exec: nmap -O 192.168.2.0/24
Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-11-13 18:52 CST
Nmap scan report for 192.168.2.2 Host is up (0.0010s latency). Not shown: 999 closed ports PORT STATE SERVICE 23/tcp open telnet MAC Address: D4:8C:B5:E8:BE:FF (Cisco Systems) Device type: switch|router|firewall Running: Cisco IOS 12.X|15.X, Cisco embedded OS CPE: cpe:/h:cisco:catalyst_2950 cpe:/h:cisco:catalyst_2960 cpe:/h:cisco:catalyst_3550 cpe:/h:cisco:catalyst_3560 cpe:/h:cisco:catalyst_3750 cpe:/h:cisco:catalyst_4500 cpe:/o:cisco:ios:12 cpe:/o:cisco:ios:15 OS details: Cisco 2950, 2960, 3550, 3560, 3750, or 4500 switch or 6500 router (IOS 12.1 - 15.0); or Adaptive Security Appliance firewall Network Distance: 1 hop
Nmap scan report for a_d_pc_18.redutez.edu.mx (192.168.2.3)
Host is up (0.00021s latency). Not shown: 984 closed ports PORT STATE SERVICE 80/tcp open http 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 443/tcp open https 445/tcp open microsoft-ds 3389/tcp open ms-wbt-server 49152/tcp open unknown 49153/tcp open unknown 49154/tcp open unknown 49155/tcp open unknown 49157/tcp open unknown 49158/tcp open unknown 49159/tcp open unknown 49160/tcp open unknown 49161/tcp open unknown MAC Address: 00:0C:29:14:31:00 (VMware) Device type: general purpose Running: Microsoft Windows 2008|10|7|8.1 OS CPE: cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows cpe:/o:microsoft:windows_7::- cpe:/o:microsoft:windows_7::sp1 cpe:/o:microsoft:windows_8 OS details: Microsoft Windows Server 2008 SP2 or Windows 10 Tech Preview, Microsoft Windows 7 SP0 - SP1, Windows Server 2008 SP1, Windows 8, or Windows 8.1 Update 1 Network Distance: 1 hop
Nmap scan report for win-nsfog5misvr.redutez.edu.mx (192.168.2.4)
Host is up (0.00018s latency). Not shown: 999 filtered ports PORT STATE SERVICE 22/tcp open ssh MAC Address: 00:50:56:91:5D:99 (VMware) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6 OS details: Linux 2.6.32, Linux 2.6.9 - 2.6.30 Network Distance: 1 hop
Nmap scan report for 192.168.2.7
Host is up (0.00030s latency). Not shown: 984 closed ports PORT STATE SERVICE 53/tcp open domain 88/tcp open kerberos-sec 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 445/tcp open microsoft-ds 464/tcp open kpasswd5 593/tcp open http-rpc-epmap 636/tcp open ldapssl 1025/tcp open NFS-or-IIS 1027/tcp open IIS 1053/tcp open remote-as 1093/tcp open proofd 3268/tcp open globalcatLDAP 3269/tcp open globalcatLDAPssl 3389/tcp open ms-wbt-server MAC Address: 00:50:56:91:72:38 (VMware) Device type: general purpose Running: Microsoft Windows XP|2003 OS CPE: cpe:/o:microsoft:windows_xp::sp2 cpe:/o:microsoft:windows_server_2003::sp1 cpe:/o:microsoft:windows_server_2003::sp2 OS details: Microsoft Windows XP SP2 or Windows Server 2003 SP1 or SP2 Network Distance: 1 hop Nmap scan report for sdutez.redutez.edu.mx (192.168.2.8) Host is up (0.00012s latency). Not shown: 975 closed ports PORT STATE SERVICE 42/tcp open nameserver 53/tcp open domain 80/tcp open http 88/tcp open kerberos-sec 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 443/tcp open https 445/tcp open microsoft-ds 464/tcp open kpasswd5 593/tcp open http-rpc-epmap 636/tcp open ldapssl 1026/tcp open LSA-or-nterm 1029/tcp open ms-lsa 1045/tcp open fpitp 1046/tcp open wfremotertm 1058/tcp open nim 1062/tcp open veracity 1063/tcp open kyoceranetdev 1070/tcp open gmrupdateserv 1071/tcp open bsquare-voip 1433/tcp open ms-sql-s 3268/tcp open globalcatLDAP 3269/tcp open globalcatLDAPssl 3389/tcp open ms-wbt-server MAC Address: 00:04:76:F5:BE:10 (3 Com) Device type: general purpose Running: Microsoft Windows 2000 OS CPE: cpe:/o:microsoft:windows_2000::sp3 cpe:/o:microsoft:windows_2000::sp4 OS details: Microsoft Windows 2000 Server SP3 or SP4 Network Distance: 1 hop
Nmap scan report for dns1.utzac.edu.mx (192.168.2.9)
Host is up (0.00020s latency). Not shown: 985 closed ports PORT STATE SERVICE 80/tcp open http 135/tcp open msrpc 139/tcp open netbios-ssn 445/tcp open microsoft-ds 1433/tcp open ms-sql-s 2382/tcp open ms-olap3 2383/tcp open ms-olap4 3389/tcp open ms-wbt-server 8009/tcp open ajp13 8080/tcp open http-proxy 49152/tcp open unknown 49153/tcp open unknown 49154/tcp open unknown 49155/tcp open unknown 49156/tcp open unknown MAC Address: 00:50:56:91:02:03 (VMware) Device type: general purpose Running: Microsoft Windows 2008|10 OS CPE: cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows OS details: Microsoft Windows Server 2008 SP2 or Windows 10 Tech Preview Network Distance: 1 hop
Nmap scan report for 192.168.2.17
Host is up (0.0011s latency). Not shown: 999 closed ports PORT STATE SERVICE 23/tcp open telnet MAC Address: 00:17:61:20:01:44 (Private) Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6 OS details: Linux 2.6.9 - 2.6.33 Network Distance: 1 hop
Nmap scan report for 192.168.2.21
Host is up (-0.100s latency). All 1000 scanned ports on 192.168.2.21 are filtered MAC Address: C0:C1:C0:59:55:2C (Cisco-Linksys) Too many fingerprints match this host to give specific OS details Network Distance: 1 hop
Nmap scan report for a_1_pc_1.redutez.edu.mx (192.168.2.23)
Host is up (-0.100s latency). All 1000 scanned ports on a_1_pc_1.redutez.edu.mx (192.168.2.23) are filtered MAC Address: 58:6D:8F:9C:E8:8D (Cisco-Linksys) Too many fingerprints match this host to give specific OS details Network Distance: 1 hop
Nmap scan report for 192.168.2.26
Host is up (-0.076s latency). All 1000 scanned ports on 192.168.2.26 are filtered MAC Address: 74:EA:3A:D1:2F:A7 (Tp-link Technologies Co.) Too many fingerprints match this host to give specific OS details Network Distance: 1 hop
Nmap scan report for pc_21_a.redutez.edu.mx (192.168.2.51)
Host is up (0.00035s latency). All 1000 scanned ports on pc_21_a.redutez.edu.mx (192.168.2.51) are filtered MAC Address: 84:C9:B2:A1:29:F9 (D-Link International) Too many fingerprints match this host to give specific OS details Network Distance: 1 hop
Nmap scan report for pc_24_a.redutez.edu.mx (192.168.2.54)
Host is up (0.00084s latency). Not shown: 997 closed ports PORT STATE SERVICE 22/tcp open ssh 53/tcp open domain 80/tcp open http MAC Address: 00:15:6D:F9:5C:98 (Ubiquiti Networks) Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6 OS details: Linux 2.6.9 - 2.6.19 Network Distance: 1 hop
Nmap scan report for 192.168.2.89
Host is up (0.00020s latency). Not shown: 999 filtered ports PORT STATE SERVICE 2968/tcp open enpp MAC Address: 00:18:71:70:70:4F (Hewlett-Packard Company) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Microsoft Windows 2000|XP OS CPE: cpe:/o:microsoft:windows_2000::sp4 cpe:/o:microsoft:windows_xp::sp2 cpe:/o:microsoft:windows_xp::sp3 OS details: Microsoft Windows 2000 SP4, Microsoft Windows XP SP2 or SP3, Microsoft Windows XP SP3 Network Distance: 1 hop
Nmap scan report for pc_1_c.redutez.edu.mx (192.168.2.109)
Host is up (0.0011s latency). Not shown: 997 closed ports PORT STATE SERVICE 22/tcp open ssh 23/tcp open telnet 80/tcp open http MAC Address: 00:1A:C1:CD:F7:00 (3Com) Device type: switch Running: 3Com embedded OS CPE: cpe:/h:3com:superstack_3_switch_4400 OS details: 3Com SuperStack 3 Switch 4400 Network Distance: 1 hop
Nmap scan report for pc_6_c.redutez.edu.mx (192.168.2.114)
Host is up (0.00037s latency). All 1000 scanned ports on pc_6_c.redutez.edu.mx (192.168.2.114) are closed MAC Address: 18:67:B0:4B:FD:87 (Samsung Electronics Co.) Too many fingerprints match this host to give specific OS details Network Distance: 1 hop
Nmap scan report for 192.168.2.138
Host is up (-0.100s latency). All 1000 scanned ports on 192.168.2.138 are filtered MAC Address: 64:51:06:5F:22:7B (Hewlett Packard) Too many fingerprints match this host to give specific OS details Network Distance: 1 hop
Nmap scan report for pc_11_d.redutez.edu.mx (192.168.2.145)
Host is up (-0.100s latency). All 1000 scanned ports on pc_11_d.redutez.edu.mx (192.168.2.145) are filtered MAC Address: 64:51:06:5F:22:83 (Hewlett Packard) Too many fingerprints match this host to give specific OS details Network Distance: 1 hop
Nmap scan report for pc_14_d.redutez.edu.mx (192.168.2.148)
Host is up (0.00044s latency). Not shown: 998 closed ports PORT STATE SERVICE 80/tcp open http 3306/tcp open mysql MAC Address: A8:20:66:41:94:D1 (Apple) Device type: general purpose|media device|phone Running: Apple Mac OS X 10.7.X|10.9.X|10.8.X, Apple iOS 4.X|5.X|6.X OS CPE: cpe:/o:apple:mac_os_x:10.7 cpe:/o:apple:mac_os_x:10.9 cpe:/o:apple:mac_os_x:10.8 cpe:/o:apple:iphone_os:4 cpe:/a:apple:apple_tv:4 cpe:/o:apple:iphone_os:5 cpe:/o:apple:iphone_os:6 OS details: Apple Mac OS X 10.7.0 (Lion) - 10.10 (Yosemite) or iOS 4.1 - 8.1.2 (Darwin 10.0.0 - 14.0.0) Network Distance: 1 hop
Nmap scan report for 192.168.2.150
Host is up (0.00081s latency). All 1000 scanned ports on 192.168.2.150 are closed MAC Address: 00:0C:29:1A:01:6A (VMware) Too many fingerprints match this host to give specific OS details Network Distance: 1 hop
Nmap scan report for a_id_pc_8.redutez.edu.mx (192.168.2.168)
Host is up (0.0015s latency). Not shown: 997 closed ports PORT STATE SERVICE 23/tcp open telnet 80/tcp open http 5060/tcp open sip MAC Address: 00:A8:59:C9:8F:0C (Unknown) Device type: general purpose Running: Wind River VxWorks OS CPE: cpe:/o:windriver:vxworks OS details: VxWorks Network Distance: 1 hop
Nmap scan report for a_id_pc_9.redutez.edu.mx (192.168.2.169)
Host is up (0.0017s latency). Not shown: 997 closed ports PORT STATE SERVICE 23/tcp open telnet 80/tcp open http 5060/tcp open sip MAC Address: 00:A8:59:C9:8F:0A (Unknown) Device type: general purpose Running: Wind River VxWorks OS CPE: cpe:/o:windriver:vxworks OS details: VxWorks Network Distance: 1 hop
Nmap scan report for a_id_pc_11.redutez.edu.mx (192.168.2.171)
Host is up (0.00079s latency). Not shown: 997 closed ports PORT STATE SERVICE 23/tcp open telnet 80/tcp open http 5060/tcp open sip MAC Address: 00:A8:59:C9:8E:3E (Unknown) Device type: general purpose Running: Wind River VxWorks OS CPE: cpe:/o:windriver:vxworks OS details: VxWorks Network Distance: 1 hop
Nmap scan report for 192.168.2.172
Host is up (0.0010s latency). Not shown: 997 closed ports PORT STATE SERVICE 23/tcp open telnet 80/tcp open http 5060/tcp open sip MAC Address: 00:A8:59:C9:90:C4 (Unknown) Device type: general purpose Running: Wind River VxWorks OS CPE: cpe:/o:windriver:vxworks OS details: VxWorks Network Distance: 1 hop
Nmap scan report for 192.168.2.130
Host is up (0.000031s latency). All 1000 scanned ports on 192.168.2.130 are closed Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: storage-misc|general purpose Running: Buffalo embedded, Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6 OS details: Buffalo Cloudstor NAS device, Linux 2.6.14 - 2.6.34, Linux 2.6.17 (Mandriva), Linux 2.6.23, Linux 2.6.24, Linux 2.6.32 Network Distance: 0 hops
OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 256 IP addresses (24 hosts up) scanned in 297.83 seconds
msf > nmap -O 192.168.2.0/24
[*] exec: nmap -O 192.168.2.0/24
Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-11-13 18:52 CST
Nmap scan report for 192.168.2.2 Host is up (0.0010s latency). Not shown: 999 closed ports PORT STATE SERVICE 23/tcp open telnet MAC Address: D4:8C:B5:E8:BE:FF (Cisco Systems) Device type: switch|router|firewall Running: Cisco IOS 12.X|15.X, Cisco embedded
exec: nmap -sp 192.168.2.0/24
nmap: option '-sp' is ambiguous; possibilities: '--spoof_mac' '--spoof-mac' Nmap 6.49BETA4 ( https://nmap.org ) Usage: nmap [Scan Type(s)] [Options] {target specification} TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc. Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254 -iL <inputfilename>: Input from list of hosts/networks -iR <num hosts>: Choose random targets --exclude <host1[,host2][,host3],...>: Exclude hosts/networks --excludefile <exclude_file>: Exclude list from file HOST DISCOVERY: -sL: List Scan - simply list targets to scan -sn: Ping Scan - disable port scan -Pn: Treat all hosts as online -- skip host discovery -PS/PA/PU/PY[portlist]: TCP SYN/ACK, UDP or SCTP discovery to given ports -PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes -PO[protocol list]: IP Protocol Ping -n/-R: Never do DNS resolution/Always resolve [default: sometimes] --dns-servers <serv1[,serv2],...>: Specify custom DNS servers --system-dns: Use OS's DNS resolver --traceroute: Trace hop path to each host SCAN TECHNIQUES: -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans -sU: UDP Scan -sN/sF/sX: TCP Null, FIN, and Xmas scans --scanflags <flags>: Customize TCP scan flags -sI <zombie host[:probeport]>: Idle scan -sY/sZ: SCTP INIT/COOKIE-ECHO scans -sO: IP protocol scan -b <FTP relay host>: FTP bounce scan PORT SPECIFICATION AND SCAN ORDER: -p <port ranges>: Only scan specified ports Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080,S:9 --exclude-ports <port ranges>: Exclude the specified ports from scanning -F: Fast mode - Scan fewer ports than the default scan -r: Scan ports consecutively - don't randomize --top-ports <number>: Scan <number> most common ports --port-ratio <ratio>: Scan ports more common than <ratio> SERVICE/VERSION DETECTION: -sV: Probe open ports to determine service/version info --version-intensity <level>: Set from 0 (light) to 9 (try all probes) --version-light: Limit to most likely probes (intensity 2) --version-all: Try every single probe (intensity 9) --version-trace: Show detailed version scan activity (for debugging) SCRIPT SCAN: -sC: equivalent to --script=default --script=<Lua scripts>: <Lua scripts> is a comma separated list of directories, script-files or script-categories --script-args=<n1=v1,[n2=v2,...]>: provide arguments to scripts --script-args-file=filename: provide NSE script args in a file --script-trace: Show all data sent and received --script-updatedb: Update the script database. --script-help=<Lua scripts>: Show help about scripts. <Lua scripts> is a comma-separated list of script-files or script-categories. OS DETECTION: -O: Enable OS detection --osscan-limit: Limit OS detection to promising targets --osscan-guess: Guess OS more aggressively TIMING AND PERFORMANCE: Options which take <time> are in seconds, or append 'ms' (milliseconds), 's' (seconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m). -T<0-5>: Set timing template (higher is faster) --min-hostgroup/max-hostgroup <size>: Parallel host scan group sizes --min-parallelism/max-parallelism <numprobes>: Probe parallelization --min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout <time>: Specifies probe round trip time. --max-retries <tries>: Caps number of port scan probe retransmissions. --host-timeout <time>: Give up on target after this long --scan-delay/--max-scan-delay <time>: Adjust delay between probes --min-rate <number>: Send packets no slower than <number> per second --max-rate <number>: Send packets no faster than <number> per second FIREWALL/IDS EVASION AND SPOOFING: -f; --mtu <val>: fragment packets (optionally w/given MTU) -D <decoy1,decoy2[,ME],...>: Cloak a scan with decoys -S <IP_Address>: Spoof source address -e <iface>: Use specified interface -g/--source-port <portnum>: Use given port number --proxies <url1,[url2],...>: Relay connections through HTTP/SOCKS4 proxies --data <hex string>: Append a custom payload to sent packets --data-string <string>: Append a custom ASCII string to sent packets --data-length <num>: Append random data to sent packets --ip-options <options>: Send packets with specified ip options --ttl <val>: Set IP time-to-live field --spoof-mac <mac address/prefix/vendor name>: Spoof your MAC address --badsum: Send packets with a bogus TCP/UDP/SCTP checksum OUTPUT: -oN/-oX/-oS/-oG <file>: Output scan in normal, XML, s|<rIpt kIddi3, and Grepable format, respectively, to the given filename. -oA <basename>: Output in the three major formats at once -v: Increase verbosity level (use -vv or more for greater effect) -d: Increase debugging level (use -dd or more for greater effect) --reason: Display the reason a port is in a particular state --open: Only show open (or possibly open) ports --packet-trace: Show all packets sent and received --iflist: Print host interfaces and routes (for debugging) --append-output: Append to rather than clobber specified output files --resume <filename>: Resume an aborted scan --stylesheet <path/URL>: XSL stylesheet to transform XML output to HTML --webxml: Reference stylesheet from Nmap.Org for more portable XML --no-stylesheet: Prevent associating of XSL stylesheet w/XML output MISC: -6: Enable IPv6 scanning -A: Enable OS detection, version detection, script scanning, and traceroute --datadir <dirname>: Specify custom Nmap data file location --send-eth/--send-ip: Send using raw ethernet frames or IP packets --privileged: Assume that the user is fully privileged --unprivileged: Assume the user lacks raw socket privileges -V: Print version number -h: Print this help summary page. EXAMPLES: nmap -v -A scanme.nmap.org nmap -v -sn 192.168.0.0/16 10.0.0.0/8 nmap -v -iR 10000 -Pn -p 80 SEE THE MAN PAGE (https://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES msf > nmap -sP 192.168.2.0/24 [*] exec: nmap -sP 192.168.2.0/24
Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-11-13 19:06 CST
Nmap scan report for 192.168.2.2 Host is up (0.00071s latency). MAC Address: D4:8C:B5:E8:BE:FF (Cisco Systems) Nmap scan report for a_d_pc_18.redutez.edu.mx (192.168.2.3) Host is up (0.00030s latency). MAC Address: 00:0C:29:14:31:00 (VMware) Nmap scan report for win-nsfog5misvr.redutez.edu.mx (192.168.2.4) Host is up (0.00034s latency). MAC Address: 00:50:56:91:5D:99 (VMware) Nmap scan report for 192.168.2.7 Host is up (0.00031s latency). MAC Address: 00:50:56:91:72:38 (VMware) Nmap scan report for sdutez.redutez.edu.mx (192.168.2.8) Host is up (0.00011s latency). MAC Address: 00:04:76:F5:BE:10 (3 Com) Nmap scan report for dns1.utzac.edu.mx (192.168.2.9) Host is up (0.00031s latency). MAC Address: 00:50:56:91:02:03 (VMware) Nmap scan report for 192.168.2.17 Host is up (-0.097s latency). MAC Address: 00:17:61:20:01:44 (Private) Nmap scan report for 192.168.2.21 Host is up (-0.100s latency). MAC Address: C0:C1:C0:59:55:2C (Cisco-Linksys) Nmap scan report for a_1_pc_1.redutez.edu.mx (192.168.2.23) Host is up (-0.100s latency). MAC Address: 58:6D:8F:9C:E8:8D (Cisco-Linksys) Nmap scan report for 192.168.2.26 Host is up (-0.100s latency). MAC Address: 74:EA:3A:D1:2F:A7 (Tp-link Technologies Co.) Nmap scan report for pc_21_a.redutez.edu.mx (192.168.2.51) Host is up (-0.100s latency). MAC Address: 84:C9:B2:A1:29:F9 (D-Link International) Nmap scan report for pc_24_a.redutez.edu.mx (192.168.2.54) Host is up (-0.099s latency). MAC Address: 00:15:6D:F9:5C:98 (Ubiquiti Networks) Nmap scan report for 192.168.2.89 Host is up (-0.10s latency). MAC Address: 00:18:71:70:70:4F (Hewlett-Packard Company) Nmap scan report for pc_1_c.redutez.edu.mx (192.168.2.109) Host is up (-0.099s latency). MAC Address: 00:1A:C1:CD:F7:00 (3Com) Nmap scan report for pc_6_c.redutez.edu.mx (192.168.2.114) Host is up (-0.10s latency). MAC Address: 18:67:B0:4B:FD:87 (Samsung Electronics Co.) Nmap scan report for 192.168.2.128 Host is up (0.00097s latency). MAC Address: 24:BE:05:01:32:15 (Hewlett Packard) Nmap scan report for pc_4_d.redutez.edu.mx (192.168.2.138) Host is up (-0.100s latency). MAC Address: 64:51:06:5F:22:7B (Hewlett Packard) Nmap scan report for pc_14_d.redutez.edu.mx (192.168.2.148) Host is up (0.00051s latency). MAC Address: A8:20:66:41:94:D1 (Apple) Nmap scan report for 192.168.2.150 Host is up (0.00077s latency). MAC Address: 00:0C:29:1A:01:6A (VMware) Nmap scan report for a_id_pc_8.redutez.edu.mx (192.168.2.168) Host is up (-0.099s latency). MAC Address: 00:A8:59:C9:8F:0C (Unknown) Nmap scan report for a_id_pc_9.redutez.edu.mx (192.168.2.169) Host is up (-0.098s latency). MAC Address: 00:A8:59:C9:8F:0A (Unknown) Nmap scan report for a_id_pc_11.redutez.edu.mx (192.168.2.171) Host is up (0.00082s latency). MAC Address: 00:A8:59:C9:8E:3E (Unknown) Nmap scan report for 192.168.2.172 Host is up (-0.100s latency). MAC Address: 00:A8:59:C9:90:C4 (Unknown) Nmap scan report for 192.168.2.130 Host is up. Nmap done: 256 IP addresses (24 hosts up) scanned in 5.46 seconds
OS CPE: cpe:/h:cisco:catalyst_2950 cpe:/h:cisco:catalyst_2960 cpe:/h:cisco:catalyst_3550
cpe:/h:cisco:catalyst_3560 cpe:/h:cisco:catalyst_3750 cpe:/h:cisco:catalyst_4500 cpe:/o:cisco:ios:12 cpe:/o:cisco:ios:15 OS details: Cisco 2950, 2960, 3550, 3560, 3750, or 4500 switch or 6500 router (IOS 12.1 - 15.0); or Adaptive Security Appliance firewall Network Distance: 1 hop
Nmap scan report for a_d_pc_18.redutez.edu.mx (192.168.2.3)
Host is up (0.00021s latency). Not shown: 984 closed ports PORT STATE SERVICE 80/tcp open http 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 443/tcp open https 445/tcp open microsoft-ds 3389/tcp open ms-wbt-server 49152/tcp open unknown 49153/tcp open unknown 49154/tcp open unknown 49155/tcp open unknown 49157/tcp open unknown 49158/tcp open unknown 49159/tcp open unknown 49160/tcp open unknown 49161/tcp open unknown MAC Address: 00:0C:29:14:31:00 (VMware) Device type: general purpose Running: Microsoft Windows 2008|10|7|8.1 OS CPE: cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows cpe:/o:microsoft:windows_7::- cpe:/o:microsoft:windows_7::sp1 cpe:/o:microsoft:windows_8 OS details: Microsoft Windows Server 2008 SP2 or Windows 10 Tech Preview, Microsoft Windows 7 SP0 - SP1, Windows Server 2008 SP1, Windows 8, or Windows 8.1 Update 1 Network Distance: 1 hop
Nmap scan report for win-nsfog5misvr.redutez.edu.mx (192.168.2.4)
Host is up (0.00018s latency). Not shown: 999 filtered ports PORT STATE SERVICE 22/tcp open ssh MAC Address: 00:50:56:91:5D:99 (VMware) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6 OS details: Linux 2.6.32, Linux 2.6.9 - 2.6.30 Network Distance: 1 hop
Nmap scan report for 192.168.2.7
Host is up (0.00030s latency). Not shown: 984 closed ports PORT STATE SERVICE 53/tcp open domain 88/tcp open kerberos-sec 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 445/tcp open microsoft-ds 464/tcp open kpasswd5 593/tcp open http-rpc-epmap 636/tcp open ldapssl 1025/tcp open NFS-or-IIS 1027/tcp open IIS 1053/tcp open remote-as 1093/tcp open proofd 3268/tcp open globalcatLDAP 3269/tcp open globalcatLDAPssl 3389/tcp open ms-wbt-server MAC Address: 00:50:56:91:72:38 (VMware) Device type: general purpose Running: Microsoft Windows XP|2003 OS CPE: cpe:/o:microsoft:windows_xp::sp2 cpe:/o:microsoft:windows_server_2003::sp1 cpe:/o:microsoft:windows_server_2003::sp2 OS details: Microsoft Windows XP SP2 or Windows Server 2003 SP1 or SP2 Network Distance: 1 hop
Nmap scan report for sdutez.redutez.edu.mx (192.168.2.8)
Host is up (0.00012s latency). Not shown: 975 closed ports PORT STATE SERVICE 42/tcp open nameserver 53/tcp open domain 80/tcp open http 88/tcp open kerberos-sec 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 443/tcp open https 445/tcp open microsoft-ds 464/tcp open kpasswd5 593/tcp open http-rpc-epmap 636/tcp open ldapssl 1026/tcp open LSA-or-nterm 1029/tcp open ms-lsa 1045/tcp open fpitp 1046/tcp open wfremotertm 1058/tcp open nim 1062/tcp open veracity 1063/tcp open kyoceranetdev 1070/tcp open gmrupdateserv 1071/tcp open bsquare-voip 1433/tcp open ms-sql-s 3268/tcp open globalcatLDAP 3269/tcp open globalcatLDAPssl 3389/tcp open ms-wbt-server MAC Address: 00:04:76:F5:BE:10 (3 Com) Device type: general purpose Running: Microsoft Windows 2000 OS CPE: cpe:/o:microsoft:windows_2000::sp3 cpe:/o:microsoft:windows_2000::sp4 OS details: Microsoft Windows 2000 Server SP3 or SP4 Network Distance: 1 hop
Nmap scan report for dns1.utzac.edu.mx (192.168.2.9)
Host is up (0.00020s latency). Not shown: 985 closed ports PORT STATE SERVICE 80/tcp open http 135/tcp open msrpc 139/tcp open netbios-ssn 445/tcp open microsoft-ds 1433/tcp open ms-sql-s 2382/tcp open ms-olap3 2383/tcp open ms-olap4 3389/tcp open ms-wbt-server 8009/tcp open ajp13 8080/tcp open http-proxy 49152/tcp open unknown 49153/tcp open unknown 49154/tcp open unknown 49155/tcp open unknown 49156/tcp open unknown MAC Address: 00:50:56:91:02:03 (VMware) Device type: general purpose Running: Microsoft Windows 2008|10 OS CPE: cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows OS details: Microsoft Windows Server 2008 SP2 or Windows 10 Tech Preview Network Distance: 1 hop
Nmap scan report for 192.168.2.17
Host is up (0.0011s latency). Not shown: 999 closed ports PORT STATE SERVICE 23/tcp open telnet MAC Address: 00:17:61:20:01:44 (Private) Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6 OS details: Linux 2.6.9 - 2.6.33 Network Distance: 1 hop
Nmap scan report for 192.168.2.21
Host is up (-0.100s latency). All 1000 scanned ports on 192.168.2.21 are filtered MAC Address: C0:C1:C0:59:55:2C (Cisco-Linksys) Too many fingerprints match this host to give specific OS details Network Distance: 1 hop
Nmap scan report for a_1_pc_1.redutez.edu.mx (192.168.2.23)
Host is up (-0.100s latency). All 1000 scanned ports on a_1_pc_1.redutez.edu.mx (192.168.2.23) are filtered MAC Address: 58:6D:8F:9C:E8:8D (Cisco-Linksys) Too many fingerprints match this host to give specific OS details Network Distance: 1 hop
Nmap scan report for 192.168.2.26
Host is up (-0.076s latency). All 1000 scanned ports on 192.168.2.26 are filtered MAC Address: 74:EA:3A:D1:2F:A7 (Tp-link Technologies Co.) Too many fingerprints match this host to give specific OS details Network Distance: 1 hop Nmap scan report for pc_21_a.redutez.edu.mx (192.168.2.51) Host is up (0.00035s latency). All 1000 scanned ports on pc_21_a.redutez.edu.mx (192.168.2.51) are filtered MAC Address: 84:C9:B2:A1:29:F9 (D-Link International) Too many fingerprints match this host to give specific OS details Network Distance: 1 hop
Nmap scan report for pc_24_a.redutez.edu.mx (192.168.2.54)
Host is up (0.00084s latency). Not shown: 997 closed ports PORT STATE SERVICE 22/tcp open ssh 53/tcp open domain 80/tcp open http MAC Address: 00:15:6D:F9:5C:98 (Ubiquiti Networks) Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6 OS details: Linux 2.6.9 - 2.6.19 Network Distance: 1 hop
Nmap scan report for 192.168.2.89
Host is up (0.00020s latency). Not shown: 999 filtered ports PORT STATE SERVICE 2968/tcp open enpp MAC Address: 00:18:71:70:70:4F (Hewlett-Packard Company) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Microsoft Windows 2000|XP OS CPE: cpe:/o:microsoft:windows_2000::sp4 cpe:/o:microsoft:windows_xp::sp2 cpe:/o:microsoft:windows_xp::sp3 OS details: Microsoft Windows 2000 SP4, Microsoft Windows XP SP2 or SP3, Microsoft Windows XP SP3 Network Distance: 1 hop
Nmap scan report for pc_1_c.redutez.edu.mx (192.168.2.109)
Host is up (0.0011s latency). Not shown: 997 closed ports PORT STATE SERVICE 22/tcp open ssh 23/tcp open telnet 80/tcp open http MAC Address: 00:1A:C1:CD:F7:00 (3Com) Device type: switch Running: 3Com embedded OS CPE: cpe:/h:3com:superstack_3_switch_4400 OS details: 3Com SuperStack 3 Switch 4400 Network Distance: 1 hop
Nmap scan report for pc_6_c.redutez.edu.mx (192.168.2.114)
Host is up (0.00037s latency). All 1000 scanned ports on pc_6_c.redutez.edu.mx (192.168.2.114) are closed MAC Address: 18:67:B0:4B:FD:87 (Samsung Electronics Co.) Too many fingerprints match this host to give specific OS details Network Distance: 1 hop
Nmap scan report for 192.168.2.138
Host is up (-0.100s latency). All 1000 scanned ports on 192.168.2.138 are filtered MAC Address: 64:51:06:5F:22:7B (Hewlett Packard) Too many fingerprints match this host to give specific OS details Network Distance: 1 hop
Nmap scan report for pc_11_d.redutez.edu.mx (192.168.2.145)
Host is up (-0.100s latency). All 1000 scanned ports on pc_11_d.redutez.edu.mx (192.168.2.145) are filtered MAC Address: 64:51:06:5F:22:83 (Hewlett Packard) Too many fingerprints match this host to give specific OS details Network Distance: 1 hop
Nmap scan report for pc_14_d.redutez.edu.mx (192.168.2.148)
Host is up (0.00044s latency). Not shown: 998 closed ports PORT STATE SERVICE 80/tcp open http 3306/tcp open mysql MAC Address: A8:20:66:41:94:D1 (Apple) Device type: general purpose|media device|phone Running: Apple Mac OS X 10.7.X|10.9.X|10.8.X, Apple iOS 4.X|5.X|6.X OS CPE: cpe:/o:apple:mac_os_x:10.7 cpe:/o:apple:mac_os_x:10.9 cpe:/o:apple:mac_os_x:10.8 cpe:/o:apple:iphone_os:4 cpe:/a:apple:apple_tv:4 cpe:/o:apple:iphone_os:5 cpe:/o:apple:iphone_os:6 OS details: Apple Mac OS X 10.7.0 (Lion) - 10.10 (Yosemite) or iOS 4.1 - 8.1.2 (Darwin 10.0.0 - 14.0.0) Network Distance: 1 hop
Nmap scan report for 192.168.2.150
Host is up (0.00081s latency). All 1000 scanned ports on 192.168.2.150 are closed MAC Address: 00:0C:29:1A:01:6A (VMware) Too many fingerprints match this host to give specific OS details Network Distance: 1 hop
Nmap scan report for a_id_pc_8.redutez.edu.mx (192.168.2.168)
Host is up (0.0015s latency). Not shown: 997 closed ports PORT STATE SERVICE 23/tcp open telnet 80/tcp open http 5060/tcp open sip MAC Address: 00:A8:59:C9:8F:0C (Unknown) Device type: general purpose Running: Wind River VxWorks OS CPE: cpe:/o:windriver:vxworks OS details: VxWorks Network Distance: 1 hop
Nmap scan report for a_id_pc_9.redutez.edu.mx (192.168.2.169)
Host is up (0.0017s latency). Not shown: 997 closed ports PORT STATE SERVICE 23/tcp open telnet 80/tcp open http 5060/tcp open sip MAC Address: 00:A8:59:C9:8F:0A (Unknown) Device type: general purpose Running: Wind River VxWorks OS CPE: cpe:/o:windriver:vxworks OS details: VxWorks Network Distance: 1 hop
Nmap scan report for a_id_pc_11.redutez.edu.mx (192.168.2.171)
Host is up (0.00079s latency). Not shown: 997 closed ports PORT STATE SERVICE 23/tcp open telnet 80/tcp open http 5060/tcp open sip MAC Address: 00:A8:59:C9:8E:3E (Unknown) Device type: general purpose Running: Wind River VxWorks OS CPE: cpe:/o:windriver:vxworks OS details: VxWorks Network Distance: 1 hop Nmap scan report for 192.168.2.172 Host is up (0.0010s latency). Not shown: 997 closed ports PORT STATE SERVICE 23/tcp open telnet 80/tcp open http 5060/tcp open sip MAC Address: 00:A8:59:C9:90:C4 (Unknown) Device type: general purpose Running: Wind River VxWorks OS CPE: cpe:/o:windriver:vxworks OS details: VxWorks Network Distance: 1 hop
Nmap scan report for 192.168.2.130
Host is up (0.000031s latency). All 1000 scanned ports on 192.168.2.130 are closed Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: storage-misc|general purpose Running: Buffalo embedded, Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6 OS details: Buffalo Cloudstor NAS device, Linux 2.6.14 - 2.6.34, Linux 2.6.17 (Mandriva), Linux 2.6.23, Linux 2.6.24, Linux 2.6.32 Network Distance: 0 hops
OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 256 IP addresses (24 hosts up) scanned in 297.83 seconds