71 lines
5.2 KiB
Plaintext
71 lines
5.2 KiB
Plaintext
# Nmap 7.93 scan initiated Sun Feb 12 18:14:45 2023 as: nmap -vv --reason -Pn -T4 -sV -sC --version-all -A --osscan-guess -p- -oN /home/simon/htb/vessel/results/vessel.htb/scans/_full_tcp_nmap.txt -oX /home/simon/htb/vessel/results/vessel.htb/scans/xml/_full_tcp_nmap.xml vessel.htb
|
|
adjust_timeouts2: packet supposedly had rtt of -646965 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -646965 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -637564 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -637564 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -640767 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -640767 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -647981 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -647981 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -165444 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -165444 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -581090 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -581090 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -293226 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -293226 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -554224 microseconds. Ignoring time.
|
|
adjust_timeouts2: packet supposedly had rtt of -554224 microseconds. Ignoring time.
|
|
Nmap scan report for vessel.htb (10.10.11.178)
|
|
Host is up, received user-set (0.039s latency).
|
|
Scanned at 2023-02-12 18:14:46 CET for 58s
|
|
Not shown: 65533 closed tcp ports (reset)
|
|
PORT STATE SERVICE REASON VERSION
|
|
22/tcp open ssh syn-ack ttl 63 OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0)
|
|
| ssh-hostkey:
|
|
| 3072 38c297327b9ec565b44b4ea330a59aa5 (RSA)
|
|
| ssh-rsa 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
|
|
| 256 33b355f4a17ff84e48dac5296313833d (ECDSA)
|
|
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI228amP4DtyQ7hh3fSYHcLZlahh+YMF0aLTZ9N/0RaUtRLM9lBdVPHvN6h1SJ45wg1rXsdrNql7L/qqr0G3q2Q=
|
|
| 256 a1f1881c3a397274e6301f28b680254e (ED25519)
|
|
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJD+aZKxj3tW8fIaoig7O/RmU2zGCu48tA485peYqixq
|
|
80/tcp open http syn-ack ttl 63 Apache httpd 2.4.41 ((Ubuntu))
|
|
|_http-title: Vessel
|
|
|_http-trane-info: Problem with XML parsing of /evox/about
|
|
|_http-favicon: Unknown favicon MD5: 9A251AF46E55C650807793D0DB9C38B8
|
|
| http-methods:
|
|
|_ Supported Methods: GET HEAD POST OPTIONS
|
|
|_http-server-header: Apache/2.4.41 (Ubuntu)
|
|
Aggressive OS guesses: Linux 4.15 - 5.6 (95%), Linux 5.3 - 5.4 (95%), Linux 2.6.32 (95%), Linux 5.0 - 5.3 (95%), Linux 3.1 (94%), Linux 3.2 (94%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), ASUS RT-N56U WAP (Linux 3.4) (93%), Linux 3.16 (93%), Linux 5.0 - 5.4 (93%)
|
|
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
|
|
TCP/IP fingerprint:
|
|
OS:SCAN(V=7.93%E=4%D=2/12%OT=22%CT=1%CU=42592%PV=Y%DS=2%DC=T%G=Y%TM=63E91EC
|
|
OS:0%P=x86_64-pc-linux-gnu)SEQ(SP=102%GCD=1%ISR=10E%TI=Z%CI=Z%II=I%TS=A)SEQ
|
|
OS:(SP=102%GCD=1%ISR=10E%TI=Z%CI=Z%TS=A)SEQ(TS=9)OPS(O1=M54EST11NW7%O2=M54E
|
|
OS:ST11NW7%O3=M54ENNT11NW7%O4=M54EST11NW7%O5=M54EST11NW7%O6=M54EST11)WIN(W1
|
|
OS:=FE88%W2=FE88%W3=FE88%W4=FE88%W5=FE88%W6=FE88)ECN(R=Y%DF=Y%TG=40%W=FAF0%
|
|
OS:O=M54ENNSNW7%CC=Y%Q=)ECN(R=Y%DF=Y%T=40%W=FAF0%O=M54ENNSNW7%CC=Y%Q=)T1(R=
|
|
OS:Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=0%Q
|
|
OS:=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T4(R=Y%DF=Y
|
|
OS:%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T4(R=N)T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F
|
|
OS:=AR%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T5(R=N)T6(R
|
|
OS:=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=
|
|
OS:R%O=%RD=0%Q=)T7(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T7(R=Y%DF=Y%
|
|
OS:T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T7(R=N)U1(R=N)U1(R=Y%DF=N%T=40%IPL=164
|
|
OS:%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%TG=40%CD=S)IE(R=Y%D
|
|
OS:FI=N%T=40%CD=S)
|
|
|
|
Uptime guess: 48.037 days (since Mon Dec 26 17:23:10 2022)
|
|
Network Distance: 2 hops
|
|
TCP Sequence Prediction: Difficulty=258 (Good luck!)
|
|
IP ID Sequence Generation: All zeros
|
|
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
|
|
|
|
TRACEROUTE (using port 587/tcp)
|
|
HOP RTT ADDRESS
|
|
1 35.37 ms 10.10.16.1
|
|
2 35.59 ms vessel.htb (10.10.11.178)
|
|
|
|
Read data files from: /usr/bin/../share/nmap
|
|
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
|
|
# Nmap done at Sun Feb 12 18:15:44 2023 -- 1 IP address (1 host up) scanned in 59.61 seconds
|