Created
May 21, 2020 14:36
-
-
Save Lawlez/9062eb97fb31b03d9188d38c7196f97f to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Nmap scan report for 192.168.1.21 | |
Host is up (0.0025s latency). | |
Not shown: 990 closed ports | |
PORT STATE SERVICE VERSION | |
21/tcp open ftp | |
| fingerprint-strings: | |
| GenericLines: | |
| 220 FTP FTP server ready. | |
| command not understood. | |
| command not understood. | |
| Help: | |
| 220 FTP FTP server ready. | |
| 214- The following commands are recognized (* =>'s unimplemented). | |
| USER LPRT MODE MSOM* RNTO SITE RMD SIZE AUTH | |
| PASS EPRT RETR MSAM* ABOR SYST XRMD MDTM PBSZ | |
| ACCT* PASV STOR MRSQ* DELE STAT PWD MLST PROT | |
| SMNT* LPSV APPE MRCP* CWD HELP XPWD MLSD CCC | |
| REIN* EPSV MLFL* ALLO XCWD NOOP CDUP MFMT | |
| QUIT TYPE MAIL* REST LIST MKD XCUP FEAT | |
| PORT STRU MSND* RNFR NLST XMKD STOU OPTS | |
| Direct comments to ftp-bugs@FTP. | |
| NULL, SMBProgNeg: | |
| 220 FTP FTP server ready. | |
| SSLSessionReq: | |
| 220 FTP FTP server ready. | |
|_ command not understood. | |
22/tcp open ssh OpenSSH 7.4 (protocol 2.0) | |
| vulners: | |
| cpe:/a:openbsd:openssh:7.4: | |
| CVE-2018-15919 5.0 https://vulners.com/cve/CVE-2018-15919 | |
| CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906 | |
|_ CVE-2018-15473 5.0 https://vulners.com/cve/CVE-2018-15473 | |
| vulscan: scip VulDB - http://www.scip.ch/en/?vuldb: | |
| No findings | |
| | |
| MITRE CVE - http://cve.mitre.org: | |
| No findings | |
| | |
| OSVDB - http://www.osvdb.org: | |
| No findings | |
| | |
| SecurityFocus - http://www.securityfocus.com/bid/: | |
| No findings | |
| | |
| SecurityTracker - http://www.securitytracker.com: | |
| No findings | |
| | |
| IBM X-Force - http://xforce.iss.net: | |
| No findings | |
| | |
| Exploit-DB - http://www.exploit-db.com: | |
| No findings | |
| | |
| OpenVAS (Nessus) - http://www.openvas.org: | |
| No findings | |
|_ | |
80/tcp open http nginx | |
|_http-server-header: nginx | |
| vulscan: scip VulDB - http://www.scip.ch/en/?vuldb: | |
| No findings | |
| | |
| MITRE CVE - http://cve.mitre.org: | |
| No findings | |
| | |
| OSVDB - http://www.osvdb.org: | |
| No findings | |
| | |
| SecurityFocus - http://www.securityfocus.com/bid/: | |
| No findings | |
| | |
| SecurityTracker - http://www.securitytracker.com: | |
| No findings | |
| | |
| IBM X-Force - http://xforce.iss.net: | |
| No findings | |
| | |
| Exploit-DB - http://www.exploit-db.com: | |
| No findings | |
| | |
| OpenVAS (Nessus) - http://www.openvas.org: | |
| No findings | |
|_ | |
139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) | |
| vulscan: scip VulDB - http://www.scip.ch/en/?vuldb: | |
| No findings | |
| | |
| MITRE CVE - http://cve.mitre.org: | |
| No findings | |
| | |
| OSVDB - http://www.osvdb.org: | |
| No findings | |
| | |
| SecurityFocus - http://www.securityfocus.com/bid/: | |
| No findings | |
| | |
| SecurityTracker - http://www.securitytracker.com: | |
| No findings | |
| | |
| IBM X-Force - http://xforce.iss.net: | |
| No findings | |
| | |
| Exploit-DB - http://www.exploit-db.com: | |
| No findings | |
| | |
| OpenVAS (Nessus) - http://www.openvas.org: | |
| No findings | |
|_ | |
443/tcp open ssl/http nginx | |
|_http-server-header: nginx | |
| vulscan: scip VulDB - http://www.scip.ch/en/?vuldb: | |
| No findings | |
| | |
| MITRE CVE - http://cve.mitre.org: | |
| No findings | |
| | |
| OSVDB - http://www.osvdb.org: | |
| No findings | |
| | |
| SecurityFocus - http://www.securityfocus.com/bid/: | |
| No findings | |
| | |
| SecurityTracker - http://www.securitytracker.com: | |
| No findings | |
| | |
| IBM X-Force - http://xforce.iss.net: | |
| No findings | |
| | |
| Exploit-DB - http://www.exploit-db.com: | |
| No findings | |
| | |
| OpenVAS (Nessus) - http://www.openvas.org: | |
| No findings | |
|_ | |
445/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) | |
| vulscan: scip VulDB - http://www.scip.ch/en/?vuldb: | |
| No findings | |
| | |
| MITRE CVE - http://cve.mitre.org: | |
| No findings | |
| | |
| OSVDB - http://www.osvdb.org: | |
| No findings | |
| | |
| SecurityFocus - http://www.securityfocus.com/bid/: | |
| No findings | |
| | |
| SecurityTracker - http://www.securitytracker.com: | |
| No findings | |
| | |
| IBM X-Force - http://xforce.iss.net: | |
| No findings | |
| | |
| Exploit-DB - http://www.exploit-db.com: | |
| No findings | |
| | |
| OpenVAS (Nessus) - http://www.openvas.org: | |
| No findings | |
|_ | |
548/tcp open afp Netatalk 3.1.8 (name: FTP; protocol 3.4) | |
| vulscan: scip VulDB - http://www.scip.ch/en/?vuldb: | |
| No findings | |
| | |
| MITRE CVE - http://cve.mitre.org: | |
| No findings | |
| | |
| OSVDB - http://www.osvdb.org: | |
| No findings | |
| | |
| SecurityFocus - http://www.securityfocus.com/bid/: | |
| No findings | |
| | |
| SecurityTracker - http://www.securitytracker.com: | |
| No findings | |
| | |
| IBM X-Force - http://xforce.iss.net: | |
| No findings | |
| | |
| Exploit-DB - http://www.exploit-db.com: | |
| No findings | |
| | |
| OpenVAS (Nessus) - http://www.openvas.org: | |
| No findings | |
|_ | |
3306/tcp open mysql MariaDB (unauthorized) | |
| vulscan: scip VulDB - http://www.scip.ch/en/?vuldb: | |
| No findings | |
| | |
| MITRE CVE - http://cve.mitre.org: | |
| No findings | |
| | |
| OSVDB - http://www.osvdb.org: | |
| No findings | |
| | |
| SecurityFocus - http://www.securityfocus.com/bid/: | |
| No findings | |
| | |
| SecurityTracker - http://www.securitytracker.com: | |
| No findings | |
| | |
| IBM X-Force - http://xforce.iss.net: | |
| No findings | |
| | |
| Exploit-DB - http://www.exploit-db.com: | |
| No findings | |
| | |
| OpenVAS (Nessus) - http://www.openvas.org: | |
| No findings | |
|_ | |
5000/tcp open http nginx | |
|_http-server-header: nginx | |
| vulscan: scip VulDB - http://www.scip.ch/en/?vuldb: | |
| No findings | |
| | |
| MITRE CVE - http://cve.mitre.org: | |
| No findings | |
| | |
| OSVDB - http://www.osvdb.org: | |
| No findings | |
| | |
| SecurityFocus - http://www.securityfocus.com/bid/: | |
| No findings | |
| | |
| SecurityTracker - http://www.securitytracker.com: | |
| No findings | |
| | |
| IBM X-Force - http://xforce.iss.net: | |
| No findings | |
| | |
| Exploit-DB - http://www.exploit-db.com: | |
| No findings | |
| | |
| OpenVAS (Nessus) - http://www.openvas.org: | |
| No findings | |
|_ | |
5001/tcp open ssl/http nginx | |
|_http-server-header: nginx | |
| vulscan: scip VulDB - http://www.scip.ch/en/?vuldb: | |
| No findings | |
| | |
| MITRE CVE - http://cve.mitre.org: | |
| No findings | |
| | |
| OSVDB - http://www.osvdb.org: | |
| No findings | |
| | |
| SecurityFocus - http://www.securityfocus.com/bid/: | |
| No findings | |
| | |
| SecurityTracker - http://www.securitytracker.com: | |
| No findings | |
| | |
| IBM X-Force - http://xforce.iss.net: | |
| No findings | |
| | |
| Exploit-DB - http://www.exploit-db.com: | |
| No findings | |
| | |
| OpenVAS (Nessus) - http://www.openvas.org: | |
| No findings | |
|_ | |
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : | |
SF-Port21-TCP:V=7.70%I=7%D=3/13%Time=5C88F9CC%P=x86_64-apple-darwin13.4.0% | |
SF:r(NULL,1B,"220\x20FTP\x20FTP\x20server\x20ready\.\r\n")%r(GenericLines, | |
SF:59,"220\x20FTP\x20FTP\x20server\x20ready\.\r\n500\x20:\x20command\x20no | |
SF:t\x20understood\.\r\n500\x20:\x20command\x20not\x20understood\.\r\n")%r | |
SF:(Help,272,"220\x20FTP\x20FTP\x20server\x20ready\.\r\n214-\x20The\x20fol | |
SF:lowing\x20commands\x20are\x20recognized\x20\(\*\x20=>'s\x20unimplemente | |
SF:d\)\.\r\n\x20\x20\x20USER\x20\x20\x20\x20LPRT\x20\x20\x20\x20MODE\x20\x | |
SF:20\x20\x20MSOM\*\x20\x20\x20RNTO\x20\x20\x20\x20SITE\x20\x20\x20\x20RMD | |
SF:\x20\x20\x20\x20\x20SIZE\x20\x20\x20\x20AUTH\x20\r\n\x20\x20\x20PASS\x2 | |
SF:0\x20\x20\x20EPRT\x20\x20\x20\x20RETR\x20\x20\x20\x20MSAM\*\x20\x20\x20 | |
SF:ABOR\x20\x20\x20\x20SYST\x20\x20\x20\x20XRMD\x20\x20\x20\x20MDTM\x20\x2 | |
SF:0\x20\x20PBSZ\x20\r\n\x20\x20\x20ACCT\*\x20\x20\x20PASV\x20\x20\x20\x20 | |
SF:STOR\x20\x20\x20\x20MRSQ\*\x20\x20\x20DELE\x20\x20\x20\x20STAT\x20\x20\ | |
SF:x20\x20PWD\x20\x20\x20\x20\x20MLST\x20\x20\x20\x20PROT\x20\r\n\x20\x20\ | |
SF:x20SMNT\*\x20\x20\x20LPSV\x20\x20\x20\x20APPE\x20\x20\x20\x20MRCP\*\x20 | |
SF:\x20\x20CWD\x20\x20\x20\x20\x20HELP\x20\x20\x20\x20XPWD\x20\x20\x20\x20 | |
SF:MLSD\x20\x20\x20\x20CCC\x20\r\n\x20\x20\x20REIN\*\x20\x20\x20EPSV\x20\x | |
SF:20\x20\x20MLFL\*\x20\x20\x20ALLO\x20\x20\x20\x20XCWD\x20\x20\x20\x20NOO | |
SF:P\x20\x20\x20\x20CDUP\x20\x20\x20\x20MFMT\x20\r\n\x20\x20\x20QUIT\x20\x | |
SF:20\x20\x20TYPE\x20\x20\x20\x20MAIL\*\x20\x20\x20REST\x20\x20\x20\x20LIS | |
SF:T\x20\x20\x20\x20MKD\x20\x20\x20\x20\x20XCUP\x20\x20\x20\x20FEAT\x20\r\ | |
SF:n\x20\x20\x20PORT\x20\x20\x20\x20STRU\x20\x20\x20\x20MSND\*\x20\x20\x20 | |
SF:RNFR\x20\x20\x20\x20NLST\x20\x20\x20\x20XMKD\x20\x20\x20\x20STOU\x20\x2 | |
SF:0\x20\x20OPTS\x20\r\n214\x20Direct\x20comments\x20to\x20ftp-bugs@FTP\.\ | |
SF:r\n")%r(SSLSessionReq,3C,"220\x20FTP\x20FTP\x20server\x20ready\.\r\n500 | |
SF:\x20\x16\x03:\x20command\x20not\x20understood\.\r\n")%r(SMBProgNeg,1B," | |
SF:220\x20FTP\x20FTP\x20server\x20ready\.\r\n"); | |
MAC Address: 00:11:32:2C:22:EF (Synology Incorporated) | |
Service Info: Host: FTP; OS: Unix |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment