TCP
# Nmap 7.92 scan initiated Mon Aug 22 11:07:44 2022 as: nmap -vv --reason -Pn -T4 -sV -sC --version-all -A --osscan-guess -p- -oN /home/kali/HTB/SolidState/results/10.10.10.51/scans/_full_tcp_nmap.txt -oX /home/kali/HTB/SolidState/results/10.10.10.51/scans/xml/_full_tcp_nmap.xml 10.10.10.51
adjust_timeouts2: packet supposedly had rtt of -176576 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -176576 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -254518 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -254518 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -188150 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -188150 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -183464 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -183464 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -204399 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -204399 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -681452 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -681452 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -180166 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -180166 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -171455 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -171455 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -233149 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -233149 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -255784 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -255784 microseconds. Ignoring time.
Nmap scan report for 10.10.10.51
Host is up, received user-set (0.047s latency).
Scanned at 2022-08-22 11:07:45 EDT for 695s
Not shown: 65529 closed tcp ports (reset)
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack ttl 63 OpenSSH 7.4p1 Debian 10+deb9u1 (protocol 2.0)
| ssh-hostkey:
| 2048 77:00:84:f5:78:b9:c7:d3:54:cf:71:2e:0d:52:6d:8b (RSA)
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCp5WdwlckuF4slNUO29xOk/Yl/cnXT/p6qwezI0ye+4iRSyor8lhyAEku/yz8KJXtA+ALhL7HwYbD3hDUxDkFw90V1Omdedbk7SxUVBPK2CiDpvXq1+r5fVw26WpTCdawGKkaOMYoSWvliBsbwMLJEUwVbZ/GZ1SUEswpYkyZeiSC1qk72L6CiZ9/5za4MTZw8Cq0akT7G+mX7Qgc+5eOEGcqZt3cBtWzKjHyOZJAEUtwXAHly29KtrPUddXEIF0qJUxKXArEDvsp7OkuQ0fktXXkZuyN/GRFeu3im7uQVuDgiXFKbEfmoQAsvLrR8YiKFUG6QBdI9awwmTkLFbS1Z
| 256 78:b8:3a:f6:60:19:06:91:f5:53:92:1d:3f:48:ed:53 (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBISyhm1hXZNQl3cslogs5LKqgWEozfjs3S3aPy4k3riFb6UYu6Q1QsxIEOGBSPAWEkevVz1msTrRRyvHPiUQ+eE=
| 256 e4:45:e9:ed:07:4d:73:69:43:5a:12:70:9d:c4:af:76 (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMKbFbK3MJqjMh9oEw/2OVe0isA7e3ruHz5fhUP4cVgY
25/tcp open smtp syn-ack ttl 63 JAMES smtpd 2.3.2
|_smtp-commands: solidstate Hello nmap.scanme.org (10.10.14.12 [10.10.14.12])
80/tcp open http syn-ack ttl 63 Apache httpd 2.4.25 ((Debian))
|_http-title: Home - Solid State Security
| http-methods:
|_ Supported Methods: POST OPTIONS HEAD GET
|_http-server-header: Apache/2.4.25 (Debian)
110/tcp open pop3 syn-ack ttl 63 JAMES pop3d 2.3.2
119/tcp open nntp syn-ack ttl 63 JAMES nntpd (posting ok)
4555/tcp open rsip? syn-ack ttl 63
| fingerprint-strings:
| GenericLines:
| JAMES Remote Administration Tool 2.3.2
| Please enter your login and password
| Login id:
| Password:
| Login failed for
| Login id:
| Verifier:
| JAMES Remote Administration Tool 2.3.2
| Please enter your login and password
| Login id:
|_ Password:
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port4555-TCP:V=7.92%I=9%D=8/22%Time=63039C05%P=x86_64-pc-linux-gnu%r(Ge
SF:nericLines,7C,"JAMES\x20Remote\x20Administration\x20Tool\x202\.3\.2\nPl
SF:ease\x20enter\x20your\x20login\x20and\x20password\nLogin\x20id:\nPasswo
SF:rd:\nLogin\x20failed\x20for\x20\nLogin\x20id:\n")%r(Verifier,60,"JAMES\
SF:x20Remote\x20Administration\x20Tool\x202\.3\.2\nPlease\x20enter\x20your
SF:\x20login\x20and\x20password\nLogin\x20id:\nPassword:\n");
Aggressive OS guesses: Linux 3.12 (95%), Linux 3.13 (95%), Linux 3.16 (95%), Linux 3.18 (95%), Linux 3.2 - 4.9 (95%), Linux 4.4 (95%), Linux 4.8 (95%), Linux 4.9 (95%), Linux 3.8 - 3.11 (95%), Linux 4.2 (95%)
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.92%E=4%D=8/22%OT=22%CT=1%CU=31386%PV=Y%DS=2%DC=T%G=Y%TM=63039E7
OS:8%P=x86_64-pc-linux-gnu)SEQ(SP=101%GCD=2%ISR=107%TI=Z%CI=I%TS=8)OPS(O1=M
OS:539ST11NW7%O2=M539ST11NW7%O3=M539NNT11NW7%O4=M539ST11NW7%O5=M539ST11NW7%
OS:O6=M539ST11)WIN(W1=7120%W2=7120%W3=7120%W4=7120%W5=7120%W6=7120)ECN(R=Y%
OS:DF=Y%T=40%W=7210%O=M539NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=
OS:0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF
OS:=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=
OS:%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=40%
OS:IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S)
Uptime guess: 0.010 days (since Mon Aug 22 11:04:14 2022)
Network Distance: 2 hops
TCP Sequence Prediction: Difficulty=257 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Host: solidstate; OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE (using port 21/tcp)
HOP RTT ADDRESS
1 46.38 ms 10.10.14.1
2 46.51 ms 10.10.10.51
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Mon Aug 22 11:19:20 2022 -- 1 IP address (1 host up) scanned in 696.35 seconds
Last updated