sudo nmap -sT -sV -O 192.168.0.207 -p- [sudo] password for kali: Starting Nmap 7.93 ( https://nmap.org ) Nmap scan report for www.ackmoon.com (192.168.0.207) Host is up (0.0048s latency). Not shown: 65517 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 21/tcp open ftp Microsoft ftpd 80/tcp open http Microsoft IIS httpd 8.5 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds 999/tcp open http Microsoft IIS httpd 8.5 3306/tcp open mysql MySQL (unauthorized) 5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) 6588/tcp open http Microsoft IIS httpd 8.5 10136/tcp open unknown 47001/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) 49152/tcp open msrpc Microsoft Windows RPC 49153/tcp open msrpc Microsoft Windows RPC 49154/tcp open msrpc Microsoft Windows RPC 49155/tcp open msrpc Microsoft Windows RPC 49157/tcp open msrpc Microsoft Windows RPC 49158/tcp open msrpc Microsoft Windows RPC 49159/tcp open msrpc Microsoft Windows RPC MAC Address: 00:0C:29:10:B5:76 (VMware) Device type: general purpose Running: Microsoft Windows 7|2012|8.1 OS CPE: cpe:/o:microsoft:windows_7:::ultimate cpe:/o:microsoft:windows_2012 cpe:/o:microsoft:windows_8.1 OS details: Microsoft Windows 7, Windows Server 2012, or Windows 8.1 Update 1 Network Distance: 1 hop Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 201.32 seconds
Nmap scan report for 10.10.11.135 Host is up (1.1s latency). Not shown: 985 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.39 ((Win64) OpenSSL/1.1.1b mod_fcgid/2.3.9a mod_log_rotate/1.02) |_http-title: \xE6\xBC\x94\xE7\xA4\xBA\xEF\xBC\x9AJWT\xE5\xAE\x9E\xE6\x88\x98\xEF\xBC\x9A\xE4\xBD\xBF\xE7\x94\xA8axios+PHP\xE5\xAE\x9E\xE7\x8E\xB0\xE7\x99\xBB\xE5\xBD\x95\xE8\xAE\xA4\xE8\xAF\x81 |_http-server-header: Apache/2.4.39 (Win64) OpenSSL/1.1.1b mod_fcgid/2.3.9a mod_log_rotate/1.02 | http-methods: |_ Potentially risky methods: TRACE 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds 3306/tcp open mysql MySQL (unauthorized) 3389/tcp open ssl/ms-wbt-server? | rdp-ntlm-info: | Target_Name: ACK123 | NetBIOS_Domain_Name: ACK123 | NetBIOS_Computer_Name: 12SERVER-WEB2 | DNS_Domain_Name: ack123.com | DNS_Computer_Name: 12server-web2.ack123.com | DNS_Tree_Name: ack123.com | Product_Version: 6.3.9600 |_ System_Time: 2024-01-20T06:00:26+00:00 |_ssl-date: 2024-01-20T06:00:46+00:00; 0s from scanner time. | ssl-cert: Subject: commonName=12server-web2.ack123.com | Not valid before: 2024-01-18T07:54:23 |_Not valid after: 2024-07-19T07:54:23 4444/tcp open krb524? 49152/tcp open msrpc Microsoft Windows RPC 49153/tcp open msrpc Microsoft Windows RPC 49154/tcp open msrpc Microsoft Windows RPC 49155/tcp open msrpc Microsoft Windows RPC 49156/tcp open msrpc Microsoft Windows RPC 49157/tcp open msrpc Microsoft Windows RPC 49158/tcp open msrpc Microsoft Windows RPC 49159/tcp open msrpc Microsoft Windows RPC Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows
Host script results: | smb2-security-mode: | 302: |_ Message signing enabled but not required | smb-security-mode: | authentication_level: user | challenge_response: supported |_ message_signing: disabled (dangerous, but default) | smb2-time: | date: 2024-01-20T06:00:30 |_ start_date: 2024-01-19T07:54:16
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 1378.94 seconds