0% found this document useful (0 votes)
185 views20 pages

Nmap

The nmap scan identified various devices on the 192.168.2.0/24 network including switches, routers, firewalls, PCs and servers running Windows, Linux and Mac OS X. Open ports included HTTP, SSH, Telnet, RDP and various application ports. The OS, device type and vendor were identified for each device based on the scan results.

Uploaded by

Luis Ledezma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
185 views20 pages

Nmap

The nmap scan identified various devices on the 192.168.2.0/24 network including switches, routers, firewalls, PCs and servers running Windows, Linux and Mac OS X. Open ports included HTTP, SSH, Telnet, RDP and various application ports. The OS, device type and vendor were identified for each device based on the scan results.

Uploaded by

Luis Ledezma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

msf > nmap -O 192.168.2.

0/24
[*] exec: nmap -O 192.168.2.0/24

Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-11-13 18:52 CST


Nmap scan report for 192.168.2.2
Host is up (0.0010s latency).
Not shown: 999 closed ports
PORT STATE SERVICE
23/tcp open telnet
MAC Address: D4:8C:B5:E8:BE:FF (Cisco Systems)
Device type: switch|router|firewall
Running: Cisco IOS 12.X|15.X, Cisco embedded
OS CPE: cpe:/h:cisco:catalyst_2950 cpe:/h:cisco:catalyst_2960 cpe:/h:cisco:catalyst_3550
cpe:/h:cisco:catalyst_3560 cpe:/h:cisco:catalyst_3750 cpe:/h:cisco:catalyst_4500
cpe:/o:cisco:ios:12 cpe:/o:cisco:ios:15
OS details: Cisco 2950, 2960, 3550, 3560, 3750, or 4500 switch or 6500 router (IOS 12.1 -
15.0); or Adaptive Security Appliance firewall
Network Distance: 1 hop

Nmap scan report for a_d_pc_18.redutez.edu.mx (192.168.2.3)


Host is up (0.00021s latency).
Not shown: 984 closed ports
PORT STATE SERVICE
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
389/tcp open ldap
443/tcp open https
445/tcp open microsoft-ds
3389/tcp open ms-wbt-server
49152/tcp open unknown
49153/tcp open unknown
49154/tcp open unknown
49155/tcp open unknown
49157/tcp open unknown
49158/tcp open unknown
49159/tcp open unknown
49160/tcp open unknown
49161/tcp open unknown
MAC Address: 00:0C:29:14:31:00 (VMware)
Device type: general purpose
Running: Microsoft Windows 2008|10|7|8.1
OS CPE: cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows
cpe:/o:microsoft:windows_7::- cpe:/o:microsoft:windows_7::sp1 cpe:/o:microsoft:windows_8
OS details: Microsoft Windows Server 2008 SP2 or Windows 10 Tech Preview, Microsoft
Windows 7 SP0 - SP1, Windows Server 2008 SP1, Windows 8, or Windows 8.1 Update 1
Network Distance: 1 hop

Nmap scan report for win-nsfog5misvr.redutez.edu.mx (192.168.2.4)


Host is up (0.00018s latency).
Not shown: 999 filtered ports
PORT STATE SERVICE
22/tcp open ssh
MAC Address: 00:50:56:91:5D:99 (VMware)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1
closed port
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.32, Linux 2.6.9 - 2.6.30
Network Distance: 1 hop

Nmap scan report for 192.168.2.7


Host is up (0.00030s latency).
Not shown: 984 closed ports
PORT STATE SERVICE
53/tcp open domain
88/tcp open kerberos-sec
135/tcp open msrpc
139/tcp open netbios-ssn
389/tcp open ldap
445/tcp open microsoft-ds
464/tcp open kpasswd5
593/tcp open http-rpc-epmap
636/tcp open ldapssl
1025/tcp open NFS-or-IIS
1027/tcp open IIS
1053/tcp open remote-as
1093/tcp open proofd
3268/tcp open globalcatLDAP
3269/tcp open globalcatLDAPssl
3389/tcp open ms-wbt-server
MAC Address: 00:50:56:91:72:38 (VMware)
Device type: general purpose
Running: Microsoft Windows XP|2003
OS CPE: cpe:/o:microsoft:windows_xp::sp2 cpe:/o:microsoft:windows_server_2003::sp1
cpe:/o:microsoft:windows_server_2003::sp2
OS details: Microsoft Windows XP SP2 or Windows Server 2003 SP1 or SP2
Network Distance: 1 hop
Nmap scan report for sdutez.redutez.edu.mx (192.168.2.8)
Host is up (0.00012s latency).
Not shown: 975 closed ports
PORT STATE SERVICE
42/tcp open nameserver
53/tcp open domain
80/tcp open http
88/tcp open kerberos-sec
135/tcp open msrpc
139/tcp open netbios-ssn
389/tcp open ldap
443/tcp open https
445/tcp open microsoft-ds
464/tcp open kpasswd5
593/tcp open http-rpc-epmap
636/tcp open ldapssl
1026/tcp open LSA-or-nterm
1029/tcp open ms-lsa
1045/tcp open fpitp
1046/tcp open wfremotertm
1058/tcp open nim
1062/tcp open veracity
1063/tcp open kyoceranetdev
1070/tcp open gmrupdateserv
1071/tcp open bsquare-voip
1433/tcp open ms-sql-s
3268/tcp open globalcatLDAP
3269/tcp open globalcatLDAPssl
3389/tcp open ms-wbt-server
MAC Address: 00:04:76:F5:BE:10 (3 Com)
Device type: general purpose
Running: Microsoft Windows 2000
OS CPE: cpe:/o:microsoft:windows_2000::sp3 cpe:/o:microsoft:windows_2000::sp4
OS details: Microsoft Windows 2000 Server SP3 or SP4
Network Distance: 1 hop

Nmap scan report for dns1.utzac.edu.mx (192.168.2.9)


Host is up (0.00020s latency).
Not shown: 985 closed ports
PORT STATE SERVICE
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
1433/tcp open ms-sql-s
2382/tcp open ms-olap3
2383/tcp open ms-olap4
3389/tcp open ms-wbt-server
8009/tcp open ajp13
8080/tcp open http-proxy
49152/tcp open unknown
49153/tcp open unknown
49154/tcp open unknown
49155/tcp open unknown
49156/tcp open unknown
MAC Address: 00:50:56:91:02:03 (VMware)
Device type: general purpose
Running: Microsoft Windows 2008|10
OS CPE: cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows
OS details: Microsoft Windows Server 2008 SP2 or Windows 10 Tech Preview
Network Distance: 1 hop

Nmap scan report for 192.168.2.17


Host is up (0.0011s latency).
Not shown: 999 closed ports
PORT STATE SERVICE
23/tcp open telnet
MAC Address: 00:17:61:20:01:44 (Private)
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.9 - 2.6.33
Network Distance: 1 hop

Nmap scan report for 192.168.2.21


Host is up (-0.100s latency).
All 1000 scanned ports on 192.168.2.21 are filtered
MAC Address: C0:C1:C0:59:55:2C (Cisco-Linksys)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop

Nmap scan report for a_1_pc_1.redutez.edu.mx (192.168.2.23)


Host is up (-0.100s latency).
All 1000 scanned ports on a_1_pc_1.redutez.edu.mx (192.168.2.23) are filtered
MAC Address: 58:6D:8F:9C:E8:8D (Cisco-Linksys)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop

Nmap scan report for 192.168.2.26


Host is up (-0.076s latency).
All 1000 scanned ports on 192.168.2.26 are filtered
MAC Address: 74:EA:3A:D1:2F:A7 (Tp-link Technologies Co.)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop

Nmap scan report for pc_21_a.redutez.edu.mx (192.168.2.51)


Host is up (0.00035s latency).
All 1000 scanned ports on pc_21_a.redutez.edu.mx (192.168.2.51) are filtered
MAC Address: 84:C9:B2:A1:29:F9 (D-Link International)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop

Nmap scan report for pc_24_a.redutez.edu.mx (192.168.2.54)


Host is up (0.00084s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
22/tcp open ssh
53/tcp open domain
80/tcp open http
MAC Address: 00:15:6D:F9:5C:98 (Ubiquiti Networks)
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.9 - 2.6.19
Network Distance: 1 hop

Nmap scan report for 192.168.2.89


Host is up (0.00020s latency).
Not shown: 999 filtered ports
PORT STATE SERVICE
2968/tcp open enpp
MAC Address: 00:18:71:70:70:4F (Hewlett-Packard Company)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1
closed port
Device type: general purpose
Running: Microsoft Windows 2000|XP
OS CPE: cpe:/o:microsoft:windows_2000::sp4 cpe:/o:microsoft:windows_xp::sp2
cpe:/o:microsoft:windows_xp::sp3
OS details: Microsoft Windows 2000 SP4, Microsoft Windows XP SP2 or SP3, Microsoft
Windows XP SP3
Network Distance: 1 hop

Nmap scan report for pc_1_c.redutez.edu.mx (192.168.2.109)


Host is up (0.0011s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
22/tcp open ssh
23/tcp open telnet
80/tcp open http
MAC Address: 00:1A:C1:CD:F7:00 (3Com)
Device type: switch
Running: 3Com embedded
OS CPE: cpe:/h:3com:superstack_3_switch_4400
OS details: 3Com SuperStack 3 Switch 4400
Network Distance: 1 hop

Nmap scan report for pc_6_c.redutez.edu.mx (192.168.2.114)


Host is up (0.00037s latency).
All 1000 scanned ports on pc_6_c.redutez.edu.mx (192.168.2.114) are closed
MAC Address: 18:67:B0:4B:FD:87 (Samsung Electronics Co.)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop

Nmap scan report for 192.168.2.138


Host is up (-0.100s latency).
All 1000 scanned ports on 192.168.2.138 are filtered
MAC Address: 64:51:06:5F:22:7B (Hewlett Packard)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop

Nmap scan report for pc_11_d.redutez.edu.mx (192.168.2.145)


Host is up (-0.100s latency).
All 1000 scanned ports on pc_11_d.redutez.edu.mx (192.168.2.145) are filtered
MAC Address: 64:51:06:5F:22:83 (Hewlett Packard)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop

Nmap scan report for pc_14_d.redutez.edu.mx (192.168.2.148)


Host is up (0.00044s latency).
Not shown: 998 closed ports
PORT STATE SERVICE
80/tcp open http
3306/tcp open mysql
MAC Address: A8:20:66:41:94:D1 (Apple)
Device type: general purpose|media device|phone
Running: Apple Mac OS X 10.7.X|10.9.X|10.8.X, Apple iOS 4.X|5.X|6.X
OS CPE: cpe:/o:apple:mac_os_x:10.7 cpe:/o:apple:mac_os_x:10.9
cpe:/o:apple:mac_os_x:10.8 cpe:/o:apple:iphone_os:4 cpe:/a:apple:apple_tv:4
cpe:/o:apple:iphone_os:5 cpe:/o:apple:iphone_os:6
OS details: Apple Mac OS X 10.7.0 (Lion) - 10.10 (Yosemite) or iOS 4.1 - 8.1.2 (Darwin
10.0.0 - 14.0.0)
Network Distance: 1 hop

Nmap scan report for 192.168.2.150


Host is up (0.00081s latency).
All 1000 scanned ports on 192.168.2.150 are closed
MAC Address: 00:0C:29:1A:01:6A (VMware)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop

Nmap scan report for a_id_pc_8.redutez.edu.mx (192.168.2.168)


Host is up (0.0015s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
23/tcp open telnet
80/tcp open http
5060/tcp open sip
MAC Address: 00:A8:59:C9:8F:0C (Unknown)
Device type: general purpose
Running: Wind River VxWorks
OS CPE: cpe:/o:windriver:vxworks
OS details: VxWorks
Network Distance: 1 hop

Nmap scan report for a_id_pc_9.redutez.edu.mx (192.168.2.169)


Host is up (0.0017s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
23/tcp open telnet
80/tcp open http
5060/tcp open sip
MAC Address: 00:A8:59:C9:8F:0A (Unknown)
Device type: general purpose
Running: Wind River VxWorks
OS CPE: cpe:/o:windriver:vxworks
OS details: VxWorks
Network Distance: 1 hop

Nmap scan report for a_id_pc_11.redutez.edu.mx (192.168.2.171)


Host is up (0.00079s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
23/tcp open telnet
80/tcp open http
5060/tcp open sip
MAC Address: 00:A8:59:C9:8E:3E (Unknown)
Device type: general purpose
Running: Wind River VxWorks
OS CPE: cpe:/o:windriver:vxworks
OS details: VxWorks
Network Distance: 1 hop

Nmap scan report for 192.168.2.172


Host is up (0.0010s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
23/tcp open telnet
80/tcp open http
5060/tcp open sip
MAC Address: 00:A8:59:C9:90:C4 (Unknown)
Device type: general purpose
Running: Wind River VxWorks
OS CPE: cpe:/o:windriver:vxworks
OS details: VxWorks
Network Distance: 1 hop

Nmap scan report for 192.168.2.130


Host is up (0.000031s latency).
All 1000 scanned ports on 192.168.2.130 are closed
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1
closed port
Device type: storage-misc|general purpose
Running: Buffalo embedded, Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Buffalo Cloudstor NAS device, Linux 2.6.14 - 2.6.34, Linux 2.6.17 (Mandriva),
Linux 2.6.23, Linux 2.6.24, Linux 2.6.32
Network Distance: 0 hops

OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .


Nmap done: 256 IP addresses (24 hosts up) scanned in 297.83 seconds

msf > nmap -O 192.168.2.0/24


[*] exec: nmap -O 192.168.2.0/24

Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-11-13 18:52 CST


Nmap scan report for 192.168.2.2
Host is up (0.0010s latency).
Not shown: 999 closed ports
PORT STATE SERVICE
23/tcp open telnet
MAC Address: D4:8C:B5:E8:BE:FF (Cisco Systems)
Device type: switch|router|firewall
Running: Cisco IOS 12.X|15.X, Cisco embedded

exec: nmap -sp 192.168.2.0/24


nmap: option '-sp' is ambiguous; possibilities: '--spoof_mac' '--spoof-mac'
Nmap 6.49BETA4 ( https://nmap.org )
Usage: nmap [Scan Type(s)] [Options] {target specification}
TARGET SPECIFICATION:
Can pass hostnames, IP addresses, networks, etc.
Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254
-iL <inputfilename>: Input from list of hosts/networks
-iR <num hosts>: Choose random targets
--exclude <host1[,host2][,host3],...>: Exclude hosts/networks
--excludefile <exclude_file>: Exclude list from file
HOST DISCOVERY:
-sL: List Scan - simply list targets to scan
-sn: Ping Scan - disable port scan
-Pn: Treat all hosts as online -- skip host discovery
-PS/PA/PU/PY[portlist]: TCP SYN/ACK, UDP or SCTP discovery to given ports
-PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes
-PO[protocol list]: IP Protocol Ping
-n/-R: Never do DNS resolution/Always resolve [default: sometimes]
--dns-servers <serv1[,serv2],...>: Specify custom DNS servers
--system-dns: Use OS's DNS resolver
--traceroute: Trace hop path to each host
SCAN TECHNIQUES:
-sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans
-sU: UDP Scan
-sN/sF/sX: TCP Null, FIN, and Xmas scans
--scanflags <flags>: Customize TCP scan flags
-sI <zombie host[:probeport]>: Idle scan
-sY/sZ: SCTP INIT/COOKIE-ECHO scans
-sO: IP protocol scan
-b <FTP relay host>: FTP bounce scan
PORT SPECIFICATION AND SCAN ORDER:
-p <port ranges>: Only scan specified ports
Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080,S:9
--exclude-ports <port ranges>: Exclude the specified ports from scanning
-F: Fast mode - Scan fewer ports than the default scan
-r: Scan ports consecutively - don't randomize
--top-ports <number>: Scan <number> most common ports
--port-ratio <ratio>: Scan ports more common than <ratio>
SERVICE/VERSION DETECTION:
-sV: Probe open ports to determine service/version info
--version-intensity <level>: Set from 0 (light) to 9 (try all probes)
--version-light: Limit to most likely probes (intensity 2)
--version-all: Try every single probe (intensity 9)
--version-trace: Show detailed version scan activity (for debugging)
SCRIPT SCAN:
-sC: equivalent to --script=default
--script=<Lua scripts>: <Lua scripts> is a comma separated list of
directories, script-files or script-categories
--script-args=<n1=v1,[n2=v2,...]>: provide arguments to scripts
--script-args-file=filename: provide NSE script args in a file
--script-trace: Show all data sent and received
--script-updatedb: Update the script database.
--script-help=<Lua scripts>: Show help about scripts.
<Lua scripts> is a comma-separated list of script-files or
script-categories.
OS DETECTION:
-O: Enable OS detection
--osscan-limit: Limit OS detection to promising targets
--osscan-guess: Guess OS more aggressively
TIMING AND PERFORMANCE:
Options which take <time> are in seconds, or append 'ms' (milliseconds),
's' (seconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m).
-T<0-5>: Set timing template (higher is faster)
--min-hostgroup/max-hostgroup <size>: Parallel host scan group sizes
--min-parallelism/max-parallelism <numprobes>: Probe parallelization
--min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout <time>: Specifies
probe round trip time.
--max-retries <tries>: Caps number of port scan probe retransmissions.
--host-timeout <time>: Give up on target after this long
--scan-delay/--max-scan-delay <time>: Adjust delay between probes
--min-rate <number>: Send packets no slower than <number> per second
--max-rate <number>: Send packets no faster than <number> per second
FIREWALL/IDS EVASION AND SPOOFING:
-f; --mtu <val>: fragment packets (optionally w/given MTU)
-D <decoy1,decoy2[,ME],...>: Cloak a scan with decoys
-S <IP_Address>: Spoof source address
-e <iface>: Use specified interface
-g/--source-port <portnum>: Use given port number
--proxies <url1,[url2],...>: Relay connections through HTTP/SOCKS4 proxies
--data <hex string>: Append a custom payload to sent packets
--data-string <string>: Append a custom ASCII string to sent packets
--data-length <num>: Append random data to sent packets
--ip-options <options>: Send packets with specified ip options
--ttl <val>: Set IP time-to-live field
--spoof-mac <mac address/prefix/vendor name>: Spoof your MAC address
--badsum: Send packets with a bogus TCP/UDP/SCTP checksum
OUTPUT:
-oN/-oX/-oS/-oG <file>: Output scan in normal, XML, s|<rIpt kIddi3,
and Grepable format, respectively, to the given filename.
-oA <basename>: Output in the three major formats at once
-v: Increase verbosity level (use -vv or more for greater effect)
-d: Increase debugging level (use -dd or more for greater effect)
--reason: Display the reason a port is in a particular state
--open: Only show open (or possibly open) ports
--packet-trace: Show all packets sent and received
--iflist: Print host interfaces and routes (for debugging)
--append-output: Append to rather than clobber specified output files
--resume <filename>: Resume an aborted scan
--stylesheet <path/URL>: XSL stylesheet to transform XML output to HTML
--webxml: Reference stylesheet from Nmap.Org for more portable XML
--no-stylesheet: Prevent associating of XSL stylesheet w/XML output
MISC:
-6: Enable IPv6 scanning
-A: Enable OS detection, version detection, script scanning, and traceroute
--datadir <dirname>: Specify custom Nmap data file location
--send-eth/--send-ip: Send using raw ethernet frames or IP packets
--privileged: Assume that the user is fully privileged
--unprivileged: Assume the user lacks raw socket privileges
-V: Print version number
-h: Print this help summary page.
EXAMPLES:
nmap -v -A scanme.nmap.org
nmap -v -sn 192.168.0.0/16 10.0.0.0/8
nmap -v -iR 10000 -Pn -p 80
SEE THE MAN PAGE (https://nmap.org/book/man.html) FOR MORE OPTIONS AND
EXAMPLES
msf > nmap -sP 192.168.2.0/24
[*] exec: nmap -sP 192.168.2.0/24

Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-11-13 19:06 CST


Nmap scan report for 192.168.2.2
Host is up (0.00071s latency).
MAC Address: D4:8C:B5:E8:BE:FF (Cisco Systems)
Nmap scan report for a_d_pc_18.redutez.edu.mx (192.168.2.3)
Host is up (0.00030s latency).
MAC Address: 00:0C:29:14:31:00 (VMware)
Nmap scan report for win-nsfog5misvr.redutez.edu.mx (192.168.2.4)
Host is up (0.00034s latency).
MAC Address: 00:50:56:91:5D:99 (VMware)
Nmap scan report for 192.168.2.7
Host is up (0.00031s latency).
MAC Address: 00:50:56:91:72:38 (VMware)
Nmap scan report for sdutez.redutez.edu.mx (192.168.2.8)
Host is up (0.00011s latency).
MAC Address: 00:04:76:F5:BE:10 (3 Com)
Nmap scan report for dns1.utzac.edu.mx (192.168.2.9)
Host is up (0.00031s latency).
MAC Address: 00:50:56:91:02:03 (VMware)
Nmap scan report for 192.168.2.17
Host is up (-0.097s latency).
MAC Address: 00:17:61:20:01:44 (Private)
Nmap scan report for 192.168.2.21
Host is up (-0.100s latency).
MAC Address: C0:C1:C0:59:55:2C (Cisco-Linksys)
Nmap scan report for a_1_pc_1.redutez.edu.mx (192.168.2.23)
Host is up (-0.100s latency).
MAC Address: 58:6D:8F:9C:E8:8D (Cisco-Linksys)
Nmap scan report for 192.168.2.26
Host is up (-0.100s latency).
MAC Address: 74:EA:3A:D1:2F:A7 (Tp-link Technologies Co.)
Nmap scan report for pc_21_a.redutez.edu.mx (192.168.2.51)
Host is up (-0.100s latency).
MAC Address: 84:C9:B2:A1:29:F9 (D-Link International)
Nmap scan report for pc_24_a.redutez.edu.mx (192.168.2.54)
Host is up (-0.099s latency).
MAC Address: 00:15:6D:F9:5C:98 (Ubiquiti Networks)
Nmap scan report for 192.168.2.89
Host is up (-0.10s latency).
MAC Address: 00:18:71:70:70:4F (Hewlett-Packard Company)
Nmap scan report for pc_1_c.redutez.edu.mx (192.168.2.109)
Host is up (-0.099s latency).
MAC Address: 00:1A:C1:CD:F7:00 (3Com)
Nmap scan report for pc_6_c.redutez.edu.mx (192.168.2.114)
Host is up (-0.10s latency).
MAC Address: 18:67:B0:4B:FD:87 (Samsung Electronics Co.)
Nmap scan report for 192.168.2.128
Host is up (0.00097s latency).
MAC Address: 24:BE:05:01:32:15 (Hewlett Packard)
Nmap scan report for pc_4_d.redutez.edu.mx (192.168.2.138)
Host is up (-0.100s latency).
MAC Address: 64:51:06:5F:22:7B (Hewlett Packard)
Nmap scan report for pc_14_d.redutez.edu.mx (192.168.2.148)
Host is up (0.00051s latency).
MAC Address: A8:20:66:41:94:D1 (Apple)
Nmap scan report for 192.168.2.150
Host is up (0.00077s latency).
MAC Address: 00:0C:29:1A:01:6A (VMware)
Nmap scan report for a_id_pc_8.redutez.edu.mx (192.168.2.168)
Host is up (-0.099s latency).
MAC Address: 00:A8:59:C9:8F:0C (Unknown)
Nmap scan report for a_id_pc_9.redutez.edu.mx (192.168.2.169)
Host is up (-0.098s latency).
MAC Address: 00:A8:59:C9:8F:0A (Unknown)
Nmap scan report for a_id_pc_11.redutez.edu.mx (192.168.2.171)
Host is up (0.00082s latency).
MAC Address: 00:A8:59:C9:8E:3E (Unknown)
Nmap scan report for 192.168.2.172
Host is up (-0.100s latency).
MAC Address: 00:A8:59:C9:90:C4 (Unknown)
Nmap scan report for 192.168.2.130
Host is up.
Nmap done: 256 IP addresses (24 hosts up) scanned in 5.46 seconds

OS CPE: cpe:/h:cisco:catalyst_2950 cpe:/h:cisco:catalyst_2960 cpe:/h:cisco:catalyst_3550


cpe:/h:cisco:catalyst_3560 cpe:/h:cisco:catalyst_3750 cpe:/h:cisco:catalyst_4500
cpe:/o:cisco:ios:12 cpe:/o:cisco:ios:15
OS details: Cisco 2950, 2960, 3550, 3560, 3750, or 4500 switch or 6500 router (IOS 12.1 -
15.0); or Adaptive Security Appliance firewall
Network Distance: 1 hop

Nmap scan report for a_d_pc_18.redutez.edu.mx (192.168.2.3)


Host is up (0.00021s latency).
Not shown: 984 closed ports
PORT STATE SERVICE
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
389/tcp open ldap
443/tcp open https
445/tcp open microsoft-ds
3389/tcp open ms-wbt-server
49152/tcp open unknown
49153/tcp open unknown
49154/tcp open unknown
49155/tcp open unknown
49157/tcp open unknown
49158/tcp open unknown
49159/tcp open unknown
49160/tcp open unknown
49161/tcp open unknown
MAC Address: 00:0C:29:14:31:00 (VMware)
Device type: general purpose
Running: Microsoft Windows 2008|10|7|8.1
OS CPE: cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows
cpe:/o:microsoft:windows_7::- cpe:/o:microsoft:windows_7::sp1 cpe:/o:microsoft:windows_8
OS details: Microsoft Windows Server 2008 SP2 or Windows 10 Tech Preview, Microsoft
Windows 7 SP0 - SP1, Windows Server 2008 SP1, Windows 8, or Windows 8.1 Update 1
Network Distance: 1 hop

Nmap scan report for win-nsfog5misvr.redutez.edu.mx (192.168.2.4)


Host is up (0.00018s latency).
Not shown: 999 filtered ports
PORT STATE SERVICE
22/tcp open ssh
MAC Address: 00:50:56:91:5D:99 (VMware)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1
closed port
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.32, Linux 2.6.9 - 2.6.30
Network Distance: 1 hop

Nmap scan report for 192.168.2.7


Host is up (0.00030s latency).
Not shown: 984 closed ports
PORT STATE SERVICE
53/tcp open domain
88/tcp open kerberos-sec
135/tcp open msrpc
139/tcp open netbios-ssn
389/tcp open ldap
445/tcp open microsoft-ds
464/tcp open kpasswd5
593/tcp open http-rpc-epmap
636/tcp open ldapssl
1025/tcp open NFS-or-IIS
1027/tcp open IIS
1053/tcp open remote-as
1093/tcp open proofd
3268/tcp open globalcatLDAP
3269/tcp open globalcatLDAPssl
3389/tcp open ms-wbt-server
MAC Address: 00:50:56:91:72:38 (VMware)
Device type: general purpose
Running: Microsoft Windows XP|2003
OS CPE: cpe:/o:microsoft:windows_xp::sp2 cpe:/o:microsoft:windows_server_2003::sp1
cpe:/o:microsoft:windows_server_2003::sp2
OS details: Microsoft Windows XP SP2 or Windows Server 2003 SP1 or SP2
Network Distance: 1 hop

Nmap scan report for sdutez.redutez.edu.mx (192.168.2.8)


Host is up (0.00012s latency).
Not shown: 975 closed ports
PORT STATE SERVICE
42/tcp open nameserver
53/tcp open domain
80/tcp open http
88/tcp open kerberos-sec
135/tcp open msrpc
139/tcp open netbios-ssn
389/tcp open ldap
443/tcp open https
445/tcp open microsoft-ds
464/tcp open kpasswd5
593/tcp open http-rpc-epmap
636/tcp open ldapssl
1026/tcp open LSA-or-nterm
1029/tcp open ms-lsa
1045/tcp open fpitp
1046/tcp open wfremotertm
1058/tcp open nim
1062/tcp open veracity
1063/tcp open kyoceranetdev
1070/tcp open gmrupdateserv
1071/tcp open bsquare-voip
1433/tcp open ms-sql-s
3268/tcp open globalcatLDAP
3269/tcp open globalcatLDAPssl
3389/tcp open ms-wbt-server
MAC Address: 00:04:76:F5:BE:10 (3 Com)
Device type: general purpose
Running: Microsoft Windows 2000
OS CPE: cpe:/o:microsoft:windows_2000::sp3 cpe:/o:microsoft:windows_2000::sp4
OS details: Microsoft Windows 2000 Server SP3 or SP4
Network Distance: 1 hop

Nmap scan report for dns1.utzac.edu.mx (192.168.2.9)


Host is up (0.00020s latency).
Not shown: 985 closed ports
PORT STATE SERVICE
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
1433/tcp open ms-sql-s
2382/tcp open ms-olap3
2383/tcp open ms-olap4
3389/tcp open ms-wbt-server
8009/tcp open ajp13
8080/tcp open http-proxy
49152/tcp open unknown
49153/tcp open unknown
49154/tcp open unknown
49155/tcp open unknown
49156/tcp open unknown
MAC Address: 00:50:56:91:02:03 (VMware)
Device type: general purpose
Running: Microsoft Windows 2008|10
OS CPE: cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows
OS details: Microsoft Windows Server 2008 SP2 or Windows 10 Tech Preview
Network Distance: 1 hop

Nmap scan report for 192.168.2.17


Host is up (0.0011s latency).
Not shown: 999 closed ports
PORT STATE SERVICE
23/tcp open telnet
MAC Address: 00:17:61:20:01:44 (Private)
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.9 - 2.6.33
Network Distance: 1 hop

Nmap scan report for 192.168.2.21


Host is up (-0.100s latency).
All 1000 scanned ports on 192.168.2.21 are filtered
MAC Address: C0:C1:C0:59:55:2C (Cisco-Linksys)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop

Nmap scan report for a_1_pc_1.redutez.edu.mx (192.168.2.23)


Host is up (-0.100s latency).
All 1000 scanned ports on a_1_pc_1.redutez.edu.mx (192.168.2.23) are filtered
MAC Address: 58:6D:8F:9C:E8:8D (Cisco-Linksys)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop

Nmap scan report for 192.168.2.26


Host is up (-0.076s latency).
All 1000 scanned ports on 192.168.2.26 are filtered
MAC Address: 74:EA:3A:D1:2F:A7 (Tp-link Technologies Co.)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop
Nmap scan report for pc_21_a.redutez.edu.mx (192.168.2.51)
Host is up (0.00035s latency).
All 1000 scanned ports on pc_21_a.redutez.edu.mx (192.168.2.51) are filtered
MAC Address: 84:C9:B2:A1:29:F9 (D-Link International)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop

Nmap scan report for pc_24_a.redutez.edu.mx (192.168.2.54)


Host is up (0.00084s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
22/tcp open ssh
53/tcp open domain
80/tcp open http
MAC Address: 00:15:6D:F9:5C:98 (Ubiquiti Networks)
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.9 - 2.6.19
Network Distance: 1 hop

Nmap scan report for 192.168.2.89


Host is up (0.00020s latency).
Not shown: 999 filtered ports
PORT STATE SERVICE
2968/tcp open enpp
MAC Address: 00:18:71:70:70:4F (Hewlett-Packard Company)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1
closed port
Device type: general purpose
Running: Microsoft Windows 2000|XP
OS CPE: cpe:/o:microsoft:windows_2000::sp4 cpe:/o:microsoft:windows_xp::sp2
cpe:/o:microsoft:windows_xp::sp3
OS details: Microsoft Windows 2000 SP4, Microsoft Windows XP SP2 or SP3, Microsoft
Windows XP SP3
Network Distance: 1 hop

Nmap scan report for pc_1_c.redutez.edu.mx (192.168.2.109)


Host is up (0.0011s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
22/tcp open ssh
23/tcp open telnet
80/tcp open http
MAC Address: 00:1A:C1:CD:F7:00 (3Com)
Device type: switch
Running: 3Com embedded
OS CPE: cpe:/h:3com:superstack_3_switch_4400
OS details: 3Com SuperStack 3 Switch 4400
Network Distance: 1 hop

Nmap scan report for pc_6_c.redutez.edu.mx (192.168.2.114)


Host is up (0.00037s latency).
All 1000 scanned ports on pc_6_c.redutez.edu.mx (192.168.2.114) are closed
MAC Address: 18:67:B0:4B:FD:87 (Samsung Electronics Co.)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop

Nmap scan report for 192.168.2.138


Host is up (-0.100s latency).
All 1000 scanned ports on 192.168.2.138 are filtered
MAC Address: 64:51:06:5F:22:7B (Hewlett Packard)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop

Nmap scan report for pc_11_d.redutez.edu.mx (192.168.2.145)


Host is up (-0.100s latency).
All 1000 scanned ports on pc_11_d.redutez.edu.mx (192.168.2.145) are filtered
MAC Address: 64:51:06:5F:22:83 (Hewlett Packard)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop

Nmap scan report for pc_14_d.redutez.edu.mx (192.168.2.148)


Host is up (0.00044s latency).
Not shown: 998 closed ports
PORT STATE SERVICE
80/tcp open http
3306/tcp open mysql
MAC Address: A8:20:66:41:94:D1 (Apple)
Device type: general purpose|media device|phone
Running: Apple Mac OS X 10.7.X|10.9.X|10.8.X, Apple iOS 4.X|5.X|6.X
OS CPE: cpe:/o:apple:mac_os_x:10.7 cpe:/o:apple:mac_os_x:10.9
cpe:/o:apple:mac_os_x:10.8 cpe:/o:apple:iphone_os:4 cpe:/a:apple:apple_tv:4
cpe:/o:apple:iphone_os:5 cpe:/o:apple:iphone_os:6
OS details: Apple Mac OS X 10.7.0 (Lion) - 10.10 (Yosemite) or iOS 4.1 - 8.1.2 (Darwin
10.0.0 - 14.0.0)
Network Distance: 1 hop

Nmap scan report for 192.168.2.150


Host is up (0.00081s latency).
All 1000 scanned ports on 192.168.2.150 are closed
MAC Address: 00:0C:29:1A:01:6A (VMware)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop

Nmap scan report for a_id_pc_8.redutez.edu.mx (192.168.2.168)


Host is up (0.0015s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
23/tcp open telnet
80/tcp open http
5060/tcp open sip
MAC Address: 00:A8:59:C9:8F:0C (Unknown)
Device type: general purpose
Running: Wind River VxWorks
OS CPE: cpe:/o:windriver:vxworks
OS details: VxWorks
Network Distance: 1 hop

Nmap scan report for a_id_pc_9.redutez.edu.mx (192.168.2.169)


Host is up (0.0017s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
23/tcp open telnet
80/tcp open http
5060/tcp open sip
MAC Address: 00:A8:59:C9:8F:0A (Unknown)
Device type: general purpose
Running: Wind River VxWorks
OS CPE: cpe:/o:windriver:vxworks
OS details: VxWorks
Network Distance: 1 hop

Nmap scan report for a_id_pc_11.redutez.edu.mx (192.168.2.171)


Host is up (0.00079s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
23/tcp open telnet
80/tcp open http
5060/tcp open sip
MAC Address: 00:A8:59:C9:8E:3E (Unknown)
Device type: general purpose
Running: Wind River VxWorks
OS CPE: cpe:/o:windriver:vxworks
OS details: VxWorks
Network Distance: 1 hop
Nmap scan report for 192.168.2.172
Host is up (0.0010s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
23/tcp open telnet
80/tcp open http
5060/tcp open sip
MAC Address: 00:A8:59:C9:90:C4 (Unknown)
Device type: general purpose
Running: Wind River VxWorks
OS CPE: cpe:/o:windriver:vxworks
OS details: VxWorks
Network Distance: 1 hop

Nmap scan report for 192.168.2.130


Host is up (0.000031s latency).
All 1000 scanned ports on 192.168.2.130 are closed
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1
closed port
Device type: storage-misc|general purpose
Running: Buffalo embedded, Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Buffalo Cloudstor NAS device, Linux 2.6.14 - 2.6.34, Linux 2.6.17 (Mandriva),
Linux 2.6.23, Linux 2.6.24, Linux 2.6.32
Network Distance: 0 hops

OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .


Nmap done: 256 IP addresses (24 hosts up) scanned in 297.83 seconds

You might also like