80 - Web Services

PORT   STATE SERVICE REASON         VERSION
80/tcp open  http    syn-ack ttl 63 nginx 1.16.1
|_http-server-header: nginx/1.16.1
| http-enum: 
|   /blog/: Blog
|_  /contact/: Potentially interesting folder
|_http-jsonp-detection: Couldn't find any JSONP endpoints.
| http-feed: 
| Spidering limited to: maxpagecount=40; withinhost=192.168.135.62
|   Found the following feeds: 
|     Atom: /blog/feeds/atom/
|     Atom: http://192.168.135.62:80/blog/feeds/atom/
|_    RSS (version 2.0): /blog/feeds/rss/
|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
|_http-title: Home | Mezzanine
|_http-passwd: ERROR: Script execution failed (use -d to debug)
|_http-referer-checker: Couldn't find any cross-domain scripts.
|_http-chrono: Request times for /; avg: 622.73ms; min: 506.14ms; max: 721.63ms
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
| http-vhosts: 
|_128 names had status 200
|_http-devframework: Django detected. Found Django admin login page on /admin/
| http-sitemap-generator: 
|   Directory structure:
|     /
|       Other: 1
|     /about/team/
|       Other: 1
|     /blog/feeds/atom/
|       Other: 1
|   Longest directory structure:
|     Depth: 3
|     Dir: /blog/feeds/atom/
|   Total files found (by extension):
|_    Other: 3
| http-csrf: 
| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.135.62
|   Found the following possible CSRF vulnerabilities: 
|     
|     Path: http://192.168.135.62:80/
|     Form id: 
|     Form action: /search/
|     
|     Path: http://192.168.135.62:80/about/team/
|     Form id: 
|_    Form action: /search/
|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
|_http-errors: Couldn't find any error pages.
| http-methods: 
|_  Supported Methods: GET HEAD OPTIONS
|_http-fetch: Please enter the complete path of the directory to save data in.
|_http-malware-host: Host appears to be clean
| http-headers: 
|   Server: nginx/1.16.1
|   Date: Tue, 09 Aug 2022 04:35:39 GMT
|   Content-Type: text/html; charset=utf-8
|   Content-Length: 6927
|   Connection: close
|   X-Frame-Options: SAMEORIGIN
|   Vary: Cookie
|   
|_  (Request type: HEAD)
|_http-litespeed-sourcecode-download: Request with null byte did not work. This web server might not be vulnerable
|_http-vuln-cve2013-7091: ERROR: Script execution failed (use -d to debug)
| http-useragent-tester: 
|   Status for browser useragent: 200
|   Allowed User Agents: 
|     Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)
|     libwww
|     lwp-trivial
|     libcurl-agent/1.0
|     PHP/
|     Python-urllib/2.5
|     GT::WWW
|     Snoopy
|     MFC_Tear_Sample
|     HTTP::Lite
|     PHPCrawl
|     URI::Fetch
|     Zend_Http_Client
|     http client
|     PECL::HTTP
|     Wget/1.13.4 (linux-gnu)
|_    WWW-Mechanize/1.34
|_http-mobileversion-checker: No mobile version detected.
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-php-version: Logo query returned unknown hash e2d05cb54f0c980109f3fdab35c8404b
|_Credits query returned unknown hash e2d05cb54f0c980109f3fdab35c8404b
|_http-favicon: Unknown favicon MD5: 11FB4799192313DD5474A343D9CC0A17
| http-comments-displayer: 
| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.135.62
|     
|     Path: http://192.168.135.62:80/about/team/
|     Line number: 34
|     Comment: 
|         <!--[if lt IE 9]>
|         <script src="/static/js/html5shiv.js"></script>
|         <script src="/static/js/respond.min.js"></script>
|_        <![endif]-->
|_http-frontpage-login: ERROR: Script execution failed (use -d to debug)
|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
| http-security-headers: 
|   X_Frame_Options: 
|     Header: X-Frame-Options: SAMEORIGIN
|_    Description: The browser must not display this content in any frame from a page of different origin than the content itself.
|_http-config-backup: ERROR: Script execution failed (use -d to debug)
|_http-date: Tue, 09 Aug 2022 04:35:47 GMT; -3s from local time.

Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Tue Aug  9 00:39:08 2022 -- 1 IP address (1 host up) scanned in 221.85 seconds

Last updated