TCP



# Nmap 7.92 scan initiated Mon Aug 22 11:07:44 2022 as: nmap -vv --reason -Pn -T4 -sV -sC --version-all -A --osscan-guess -p- -oN /home/kali/HTB/SolidState/results/10.10.10.51/scans/_full_tcp_nmap.txt -oX /home/kali/HTB/SolidState/results/10.10.10.51/scans/xml/_full_tcp_nmap.xml 10.10.10.51

adjust_timeouts2: packet supposedly had rtt of -176576 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of -176576 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of -254518 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of -254518 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of -188150 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of -188150 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of -183464 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of -183464 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of -204399 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of -204399 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of -681452 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of -681452 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of -180166 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of -180166 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of -171455 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of -171455 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of -233149 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of -233149 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of -255784 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of -255784 microseconds.  Ignoring time.

Nmap scan report for 10.10.10.51

Host is up, received user-set (0.047s latency).

Scanned at 2022-08-22 11:07:45 EDT for 695s

Not shown: 65529 closed tcp ports (reset)

PORT     STATE SERVICE REASON         VERSION

22/tcp   open  ssh     syn-ack ttl 63 OpenSSH 7.4p1 Debian 10+deb9u1 (protocol 2.0)

| ssh-hostkey: 

|   2048 77:00:84:f5:78:b9:c7:d3:54:cf:71:2e:0d:52:6d:8b (RSA)

| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCp5WdwlckuF4slNUO29xOk/Yl/cnXT/p6qwezI0ye+4iRSyor8lhyAEku/yz8KJXtA+ALhL7HwYbD3hDUxDkFw90V1Omdedbk7SxUVBPK2CiDpvXq1+r5fVw26WpTCdawGKkaOMYoSWvliBsbwMLJEUwVbZ/GZ1SUEswpYkyZeiSC1qk72L6CiZ9/5za4MTZw8Cq0akT7G+mX7Qgc+5eOEGcqZt3cBtWzKjHyOZJAEUtwXAHly29KtrPUddXEIF0qJUxKXArEDvsp7OkuQ0fktXXkZuyN/GRFeu3im7uQVuDgiXFKbEfmoQAsvLrR8YiKFUG6QBdI9awwmTkLFbS1Z

|   256 78:b8:3a:f6:60:19:06:91:f5:53:92:1d:3f:48:ed:53 (ECDSA)

| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBISyhm1hXZNQl3cslogs5LKqgWEozfjs3S3aPy4k3riFb6UYu6Q1QsxIEOGBSPAWEkevVz1msTrRRyvHPiUQ+eE=

|   256 e4:45:e9:ed:07:4d:73:69:43:5a:12:70:9d:c4:af:76 (ED25519)

|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMKbFbK3MJqjMh9oEw/2OVe0isA7e3ruHz5fhUP4cVgY

25/tcp   open  smtp    syn-ack ttl 63 JAMES smtpd 2.3.2

|_smtp-commands: solidstate Hello nmap.scanme.org (10.10.14.12 [10.10.14.12])

80/tcp   open  http    syn-ack ttl 63 Apache httpd 2.4.25 ((Debian))

|_http-title: Home - Solid State Security

| http-methods: 

|_  Supported Methods: POST OPTIONS HEAD GET

|_http-server-header: Apache/2.4.25 (Debian)

110/tcp  open  pop3    syn-ack ttl 63 JAMES pop3d 2.3.2

119/tcp  open  nntp    syn-ack ttl 63 JAMES nntpd (posting ok)

4555/tcp open  rsip?   syn-ack ttl 63

| fingerprint-strings: 

|   GenericLines: 

|     JAMES Remote Administration Tool 2.3.2

|     Please enter your login and password

|     Login id:

|     Password:

|     Login failed for 

|     Login id:

|   Verifier: 

|     JAMES Remote Administration Tool 2.3.2

|     Please enter your login and password

|     Login id:

|_    Password:

1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :

SF-Port4555-TCP:V=7.92%I=9%D=8/22%Time=63039C05%P=x86_64-pc-linux-gnu%r(Ge

SF:nericLines,7C,"JAMES\x20Remote\x20Administration\x20Tool\x202\.3\.2\nPl

SF:ease\x20enter\x20your\x20login\x20and\x20password\nLogin\x20id:\nPasswo

SF:rd:\nLogin\x20failed\x20for\x20\nLogin\x20id:\n")%r(Verifier,60,"JAMES\

SF:x20Remote\x20Administration\x20Tool\x202\.3\.2\nPlease\x20enter\x20your

SF:\x20login\x20and\x20password\nLogin\x20id:\nPassword:\n");

Aggressive OS guesses: Linux 3.12 (95%), Linux 3.13 (95%), Linux 3.16 (95%), Linux 3.18 (95%), Linux 3.2 - 4.9 (95%), Linux 4.4 (95%), Linux 4.8 (95%), Linux 4.9 (95%), Linux 3.8 - 3.11 (95%), Linux 4.2 (95%)

No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).

TCP/IP fingerprint:

OS:SCAN(V=7.92%E=4%D=8/22%OT=22%CT=1%CU=31386%PV=Y%DS=2%DC=T%G=Y%TM=63039E7

OS:8%P=x86_64-pc-linux-gnu)SEQ(SP=101%GCD=2%ISR=107%TI=Z%CI=I%TS=8)OPS(O1=M

OS:539ST11NW7%O2=M539ST11NW7%O3=M539NNT11NW7%O4=M539ST11NW7%O5=M539ST11NW7%

OS:O6=M539ST11)WIN(W1=7120%W2=7120%W3=7120%W4=7120%W5=7120%W6=7120)ECN(R=Y%

OS:DF=Y%T=40%W=7210%O=M539NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=

OS:0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF

OS:=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=

OS:%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=40%

OS:IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S)



Uptime guess: 0.010 days (since Mon Aug 22 11:04:14 2022)

Network Distance: 2 hops

TCP Sequence Prediction: Difficulty=257 (Good luck!)

IP ID Sequence Generation: All zeros

Service Info: Host: solidstate; OS: Linux; CPE: cpe:/o:linux:linux_kernel



TRACEROUTE (using port 21/tcp)

HOP RTT      ADDRESS

1   46.38 ms 10.10.14.1

2   46.51 ms 10.10.10.51



Read data files from: /usr/bin/../share/nmap

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .

# Nmap done at Mon Aug 22 11:19:20 2022 -- 1 IP address (1 host up) scanned in 696.35 seconds

Last updated