nmap:intense_scan_all_tcp_ports
Differences
This shows you the differences between two versions of the page.
nmap:intense_scan_all_tcp_ports [2016/07/08 00:52] – created peter | nmap:intense_scan_all_tcp_ports [2019/12/01 10:58] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== nmap - Intense scan, all TCP ports ====== | ||
- | |||
- | Scans all TCP ports, then does OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (--traceroute). | ||
- | |||
- | <code bash> | ||
- | sudo nmap -p 1-65535 -T4 -A -v 192.168.1.69 | ||
- | </ | ||
- | |||
- | Result: | ||
- | |||
- | < | ||
- | Starting Nmap 6.40 ( http:// | ||
- | NSE: Loaded 110 scripts for scanning. | ||
- | NSE: Script Pre-scanning. | ||
- | Initiating Parallel DNS resolution of 1 host. at 01:51 | ||
- | Completed Parallel DNS resolution of 1 host. at 01:51, 0.00s elapsed | ||
- | Initiating SYN Stealth Scan at 01:51 | ||
- | Scanning peter-laptop-1 (192.168.1.69) [65535 ports] | ||
- | Discovered open port 445/tcp on 192.168.1.69 | ||
- | Discovered open port 80/tcp on 192.168.1.69 | ||
- | Discovered open port 139/tcp on 192.168.1.69 | ||
- | Discovered open port 17500/tcp on 192.168.1.69 | ||
- | Completed SYN Stealth Scan at 01:51, 6.54s elapsed (65535 total ports) | ||
- | Initiating Service scan at 01:51 | ||
- | Scanning 4 services on peter-laptop-1 (192.168.1.69) | ||
- | Completed Service scan at 01:52, 18.54s elapsed (4 services on 1 host) | ||
- | Initiating OS detection (try #1) against peter-laptop-1 (192.168.1.69) | ||
- | Retrying OS detection (try #2) against peter-laptop-1 (192.168.1.69) | ||
- | Retrying OS detection (try #3) against peter-laptop-1 (192.168.1.69) | ||
- | Retrying OS detection (try #4) against peter-laptop-1 (192.168.1.69) | ||
- | adjust_timeouts2: | ||
- | adjust_timeouts2: | ||
- | Retrying OS detection (try #5) against peter-laptop-1 (192.168.1.69) | ||
- | NSE: Script scanning 192.168.1.69. | ||
- | Initiating NSE at 01:52 | ||
- | Completed NSE at 01:52, 0.16s elapsed | ||
- | Nmap scan report for peter-laptop-1 (192.168.1.69) | ||
- | Host is up (0.000041s latency). | ||
- | Not shown: 65531 closed ports | ||
- | PORT STATE SERVICE | ||
- | 80/ | ||
- | |_http-methods: | ||
- | |_http-title: | ||
- | 139/ | ||
- | 445/ | ||
- | 17500/tcp open ssl/db-lsp? | ||
- | No exact OS matches for host (If you know what OS is running on it, see http:// | ||
- | TCP/IP fingerprint: | ||
- | OS: | ||
- | OS: | ||
- | OS: | ||
- | OS: | ||
- | OS: | ||
- | OS: | ||
- | OS: | ||
- | OS: | ||
- | OS: | ||
- | OS: | ||
- | |||
- | Uptime guess: 0.241 days (since Thu Jul 7 20:05:36 2016) | ||
- | Network Distance: 0 hops | ||
- | TCP Sequence Prediction: Difficulty=258 (Good luck!) | ||
- | IP ID Sequence Generation: All zeros | ||
- | Service Info: OS: Linux; CPE: cpe:/ | ||
- | |||
- | Host script results: | ||
- | | nbstat: | ||
- | | | ||
- | | Names | ||
- | | | ||
- | | | ||
- | | | ||
- | | | ||
- | | | ||
- | | | ||
- | |_ WORKGROUP< | ||
- | | smb-os-discovery: | ||
- | | OS: Windows 6.1 (Samba 4.3.9-Ubuntu) | ||
- | | | ||
- | | | ||
- | | | ||
- | | FQDN: peter-laptop-1 | ||
- | |_ System time: 2016-07-08T01: | ||
- | | smb-security-mode: | ||
- | | | ||
- | | | ||
- | | SMB Security: Challenge/ | ||
- | |_ Message signing disabled (dangerous, but default) | ||
- | |_smbv2-enabled: | ||
- | |||
- | NSE: Script Post-scanning. | ||
- | Read data files from: / | ||
- | OS and Service detection performed. Please report any incorrect results at http:// | ||
- | Nmap done: 1 IP address (1 host up) scanned in 41.37 seconds | ||
- | Raw packets sent: 65797 (2.906MB) | Rcvd: 131627 (5.546MB) | ||
- | </ | ||
nmap/intense_scan_all_tcp_ports.1467939160.txt.gz · Last modified: 2020/07/15 09:30 (external edit)