0% found this document useful (0 votes)
17 views1 page

Nmap

The Nmap scan of the host at IP address 192.168.229.42 revealed that it is up and has several open ports, including SSH, SMTP, HTTP, and Samba services. The services detected include OpenSSH, Sendmail, Apache HTTP server, and Samba, with specific versions noted. Additionally, the scan provided information on the host's operating system and security settings, indicating potential vulnerabilities.

Uploaded by

sshangxuangpt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views1 page

Nmap

The Nmap scan of the host at IP address 192.168.229.42 revealed that it is up and has several open ports, including SSH, SMTP, HTTP, and Samba services. The services detected include OpenSSH, Sendmail, Apache HTTP server, and Samba, with specific versions noted. Additionally, the scan provided information on the host's operating system and security settings, indicating potential vulnerabilities.

Uploaded by

sshangxuangpt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 1

# Nmap 7.

95 scan initiated Tue Jul 15 09:56:03 2025 as: /usr/lib/nmap/nmap -sC -sV
-oN ./nmap.txt 192.168.229.42
Nmap scan report for 192.168.229.42
Host is up (0.0092s latency).
Not shown: 994 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 3.8.1p1 Debian 8.sarge.6 (protocol 2.0)
| ssh-hostkey:
| 1024 30:3e:a4:13:5f:9a:32:c0:8e:46:eb:26:b3:5e:ee:6d (DSA)
|_ 1024 af:a2:49:3e:d8:f2:26:12:4a:a0:b5:ee:62:76:b0:18 (RSA)
25/tcp open smtp Sendmail 8.13.4/8.13.4/Debian-3sarge3
| smtp-commands: localhost.localdomain Hello [192.168.45.209], pleased to meet you,
ENHANCEDSTATUSCODES, PIPELINING, EXPN, VERB, 8BITMIME, SIZE, DSN, ETRN, DELIVERBY,
HELP
|_ 2.0.0 This is sendmail version 8.13.4 2.0.0 Topics: 2.0.0 HELO EHLO MAIL RCPT
DATA 2.0.0 RSET NOOP QUIT HELP VRFY 2.0.0 EXPN VERB ETRN DSN AUTH 2.0.0 STARTTLS
2.0.0 For more info use "HELP <topic>". 2.0.0 To report bugs in the implementation
send email to 2.0.0 sendmail-bugs@sendmail.org. 2.0.0 For local information send
email to Postmaster at your site. 2.0.0 End of HELP info
80/tcp open http Apache httpd 1.3.33 ((Debian GNU/Linux))
| http-methods:
|_ Potentially risky methods: TRACE
|_http-server-header: Apache/1.3.33 (Debian GNU/Linux)
|_http-title: Ph33r
139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
199/tcp open smux Linux SNMP multiplexer
445/tcp open netbios-ssn Samba smbd 3.0.14a-Debian (workgroup: WORKGROUP)
Service Info: Host: localhost.localdomain; OSs: Linux, Unix; CPE:
cpe:/o:linux:linux_kernel

Host script results:


| smb-os-discovery:
| OS: Unix (Samba 3.0.14a-Debian)
| NetBIOS computer name:
| Workgroup: WORKGROUP\x00
|_ System time: 2025-07-15T13:56:15-04:00
|_smb2-time: Protocol negotiation failed (SMB2)
| smb-security-mode:
| account_used: guest
| authentication_level: share (dangerous)
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
|_clock-skew: mean: 5h59m59s, deviation: 2h49m42s, median: 3h59m59s
|_nbstat: NetBIOS name: 0XBABE, NetBIOS user: <unknown>, NetBIOS MAC: <unknown>
(unknown)

Service detection performed. Please report any incorrect results at


https://nmap.org/submit/ .
# Nmap done at Tue Jul 15 09:56:16 2025 -- 1 IP address (1 host up) scanned in
12.70 seconds

You might also like