Skip to content

Instantly share code, notes, and snippets.

@Lawlez
Created May 21, 2020 14:36
Show Gist options
  • Save Lawlez/9062eb97fb31b03d9188d38c7196f97f to your computer and use it in GitHub Desktop.
Save Lawlez/9062eb97fb31b03d9188d38c7196f97f to your computer and use it in GitHub Desktop.
Nmap scan report for 192.168.1.21
Host is up (0.0025s latency).
Not shown: 990 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp
| fingerprint-strings:
| GenericLines:
| 220 FTP FTP server ready.
| command not understood.
| command not understood.
| Help:
| 220 FTP FTP server ready.
| 214- The following commands are recognized (* =>'s unimplemented).
| USER LPRT MODE MSOM* RNTO SITE RMD SIZE AUTH
| PASS EPRT RETR MSAM* ABOR SYST XRMD MDTM PBSZ
| ACCT* PASV STOR MRSQ* DELE STAT PWD MLST PROT
| SMNT* LPSV APPE MRCP* CWD HELP XPWD MLSD CCC
| REIN* EPSV MLFL* ALLO XCWD NOOP CDUP MFMT
| QUIT TYPE MAIL* REST LIST MKD XCUP FEAT
| PORT STRU MSND* RNFR NLST XMKD STOU OPTS
| Direct comments to ftp-bugs@FTP.
| NULL, SMBProgNeg:
| 220 FTP FTP server ready.
| SSLSessionReq:
| 220 FTP FTP server ready.
|_ command not understood.
22/tcp open ssh OpenSSH 7.4 (protocol 2.0)
| vulners:
| cpe:/a:openbsd:openssh:7.4:
| CVE-2018-15919 5.0 https://vulners.com/cve/CVE-2018-15919
| CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
|_ CVE-2018-15473 5.0 https://vulners.com/cve/CVE-2018-15473
| vulscan: scip VulDB - http://www.scip.ch/en/?vuldb:
| No findings
|
| MITRE CVE - http://cve.mitre.org:
| No findings
|
| OSVDB - http://www.osvdb.org:
| No findings
|
| SecurityFocus - http://www.securityfocus.com/bid/:
| No findings
|
| SecurityTracker - http://www.securitytracker.com:
| No findings
|
| IBM X-Force - http://xforce.iss.net:
| No findings
|
| Exploit-DB - http://www.exploit-db.com:
| No findings
|
| OpenVAS (Nessus) - http://www.openvas.org:
| No findings
|_
80/tcp open http nginx
|_http-server-header: nginx
| vulscan: scip VulDB - http://www.scip.ch/en/?vuldb:
| No findings
|
| MITRE CVE - http://cve.mitre.org:
| No findings
|
| OSVDB - http://www.osvdb.org:
| No findings
|
| SecurityFocus - http://www.securityfocus.com/bid/:
| No findings
|
| SecurityTracker - http://www.securitytracker.com:
| No findings
|
| IBM X-Force - http://xforce.iss.net:
| No findings
|
| Exploit-DB - http://www.exploit-db.com:
| No findings
|
| OpenVAS (Nessus) - http://www.openvas.org:
| No findings
|_
139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
| vulscan: scip VulDB - http://www.scip.ch/en/?vuldb:
| No findings
|
| MITRE CVE - http://cve.mitre.org:
| No findings
|
| OSVDB - http://www.osvdb.org:
| No findings
|
| SecurityFocus - http://www.securityfocus.com/bid/:
| No findings
|
| SecurityTracker - http://www.securitytracker.com:
| No findings
|
| IBM X-Force - http://xforce.iss.net:
| No findings
|
| Exploit-DB - http://www.exploit-db.com:
| No findings
|
| OpenVAS (Nessus) - http://www.openvas.org:
| No findings
|_
443/tcp open ssl/http nginx
|_http-server-header: nginx
| vulscan: scip VulDB - http://www.scip.ch/en/?vuldb:
| No findings
|
| MITRE CVE - http://cve.mitre.org:
| No findings
|
| OSVDB - http://www.osvdb.org:
| No findings
|
| SecurityFocus - http://www.securityfocus.com/bid/:
| No findings
|
| SecurityTracker - http://www.securitytracker.com:
| No findings
|
| IBM X-Force - http://xforce.iss.net:
| No findings
|
| Exploit-DB - http://www.exploit-db.com:
| No findings
|
| OpenVAS (Nessus) - http://www.openvas.org:
| No findings
|_
445/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
| vulscan: scip VulDB - http://www.scip.ch/en/?vuldb:
| No findings
|
| MITRE CVE - http://cve.mitre.org:
| No findings
|
| OSVDB - http://www.osvdb.org:
| No findings
|
| SecurityFocus - http://www.securityfocus.com/bid/:
| No findings
|
| SecurityTracker - http://www.securitytracker.com:
| No findings
|
| IBM X-Force - http://xforce.iss.net:
| No findings
|
| Exploit-DB - http://www.exploit-db.com:
| No findings
|
| OpenVAS (Nessus) - http://www.openvas.org:
| No findings
|_
548/tcp open afp Netatalk 3.1.8 (name: FTP; protocol 3.4)
| vulscan: scip VulDB - http://www.scip.ch/en/?vuldb:
| No findings
|
| MITRE CVE - http://cve.mitre.org:
| No findings
|
| OSVDB - http://www.osvdb.org:
| No findings
|
| SecurityFocus - http://www.securityfocus.com/bid/:
| No findings
|
| SecurityTracker - http://www.securitytracker.com:
| No findings
|
| IBM X-Force - http://xforce.iss.net:
| No findings
|
| Exploit-DB - http://www.exploit-db.com:
| No findings
|
| OpenVAS (Nessus) - http://www.openvas.org:
| No findings
|_
3306/tcp open mysql MariaDB (unauthorized)
| vulscan: scip VulDB - http://www.scip.ch/en/?vuldb:
| No findings
|
| MITRE CVE - http://cve.mitre.org:
| No findings
|
| OSVDB - http://www.osvdb.org:
| No findings
|
| SecurityFocus - http://www.securityfocus.com/bid/:
| No findings
|
| SecurityTracker - http://www.securitytracker.com:
| No findings
|
| IBM X-Force - http://xforce.iss.net:
| No findings
|
| Exploit-DB - http://www.exploit-db.com:
| No findings
|
| OpenVAS (Nessus) - http://www.openvas.org:
| No findings
|_
5000/tcp open http nginx
|_http-server-header: nginx
| vulscan: scip VulDB - http://www.scip.ch/en/?vuldb:
| No findings
|
| MITRE CVE - http://cve.mitre.org:
| No findings
|
| OSVDB - http://www.osvdb.org:
| No findings
|
| SecurityFocus - http://www.securityfocus.com/bid/:
| No findings
|
| SecurityTracker - http://www.securitytracker.com:
| No findings
|
| IBM X-Force - http://xforce.iss.net:
| No findings
|
| Exploit-DB - http://www.exploit-db.com:
| No findings
|
| OpenVAS (Nessus) - http://www.openvas.org:
| No findings
|_
5001/tcp open ssl/http nginx
|_http-server-header: nginx
| vulscan: scip VulDB - http://www.scip.ch/en/?vuldb:
| No findings
|
| MITRE CVE - http://cve.mitre.org:
| No findings
|
| OSVDB - http://www.osvdb.org:
| No findings
|
| SecurityFocus - http://www.securityfocus.com/bid/:
| No findings
|
| SecurityTracker - http://www.securitytracker.com:
| No findings
|
| IBM X-Force - http://xforce.iss.net:
| No findings
|
| Exploit-DB - http://www.exploit-db.com:
| No findings
|
| OpenVAS (Nessus) - http://www.openvas.org:
| No findings
|_
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port21-TCP:V=7.70%I=7%D=3/13%Time=5C88F9CC%P=x86_64-apple-darwin13.4.0%
SF:r(NULL,1B,"220\x20FTP\x20FTP\x20server\x20ready\.\r\n")%r(GenericLines,
SF:59,"220\x20FTP\x20FTP\x20server\x20ready\.\r\n500\x20:\x20command\x20no
SF:t\x20understood\.\r\n500\x20:\x20command\x20not\x20understood\.\r\n")%r
SF:(Help,272,"220\x20FTP\x20FTP\x20server\x20ready\.\r\n214-\x20The\x20fol
SF:lowing\x20commands\x20are\x20recognized\x20\(\*\x20=>'s\x20unimplemente
SF:d\)\.\r\n\x20\x20\x20USER\x20\x20\x20\x20LPRT\x20\x20\x20\x20MODE\x20\x
SF:20\x20\x20MSOM\*\x20\x20\x20RNTO\x20\x20\x20\x20SITE\x20\x20\x20\x20RMD
SF:\x20\x20\x20\x20\x20SIZE\x20\x20\x20\x20AUTH\x20\r\n\x20\x20\x20PASS\x2
SF:0\x20\x20\x20EPRT\x20\x20\x20\x20RETR\x20\x20\x20\x20MSAM\*\x20\x20\x20
SF:ABOR\x20\x20\x20\x20SYST\x20\x20\x20\x20XRMD\x20\x20\x20\x20MDTM\x20\x2
SF:0\x20\x20PBSZ\x20\r\n\x20\x20\x20ACCT\*\x20\x20\x20PASV\x20\x20\x20\x20
SF:STOR\x20\x20\x20\x20MRSQ\*\x20\x20\x20DELE\x20\x20\x20\x20STAT\x20\x20\
SF:x20\x20PWD\x20\x20\x20\x20\x20MLST\x20\x20\x20\x20PROT\x20\r\n\x20\x20\
SF:x20SMNT\*\x20\x20\x20LPSV\x20\x20\x20\x20APPE\x20\x20\x20\x20MRCP\*\x20
SF:\x20\x20CWD\x20\x20\x20\x20\x20HELP\x20\x20\x20\x20XPWD\x20\x20\x20\x20
SF:MLSD\x20\x20\x20\x20CCC\x20\r\n\x20\x20\x20REIN\*\x20\x20\x20EPSV\x20\x
SF:20\x20\x20MLFL\*\x20\x20\x20ALLO\x20\x20\x20\x20XCWD\x20\x20\x20\x20NOO
SF:P\x20\x20\x20\x20CDUP\x20\x20\x20\x20MFMT\x20\r\n\x20\x20\x20QUIT\x20\x
SF:20\x20\x20TYPE\x20\x20\x20\x20MAIL\*\x20\x20\x20REST\x20\x20\x20\x20LIS
SF:T\x20\x20\x20\x20MKD\x20\x20\x20\x20\x20XCUP\x20\x20\x20\x20FEAT\x20\r\
SF:n\x20\x20\x20PORT\x20\x20\x20\x20STRU\x20\x20\x20\x20MSND\*\x20\x20\x20
SF:RNFR\x20\x20\x20\x20NLST\x20\x20\x20\x20XMKD\x20\x20\x20\x20STOU\x20\x2
SF:0\x20\x20OPTS\x20\r\n214\x20Direct\x20comments\x20to\x20ftp-bugs@FTP\.\
SF:r\n")%r(SSLSessionReq,3C,"220\x20FTP\x20FTP\x20server\x20ready\.\r\n500
SF:\x20\x16\x03:\x20command\x20not\x20understood\.\r\n")%r(SMBProgNeg,1B,"
SF:220\x20FTP\x20FTP\x20server\x20ready\.\r\n");
MAC Address: 00:11:32:2C:22:EF (Synology Incorporated)
Service Info: Host: FTP; OS: Unix
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment