1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
| ✅[20:23][CPU:5][MEM:60][TUN0:192.168.45.193][/home/n0z0]
🐉 > timestamp=$(date +%Y%m%d-%H%M%S)
output_file="$HOME/work/scans/${timestamp}_${ip}.xml"
grc nmap -p- -sCV -sV -T4 -A -Pn "$ip" -oX "$output_file"
echo -e "\e[32mScan result saved to: $output_file\e[0m"
Starting Nmap 7.95 ( https://nmap.org ) at 2025-12-31 20:38 JST
Warning: 192.168.245.42 giving up on port because retransmission cap hit (6).
Nmap scan report for 192.168.245.42
Host is up (0.090s latency).
Not shown: 65516 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 3.8.1p1 Debian 8.sarge.6 (protocol 2.0)
| ssh-hostkey:
| 1024 30:3e:a4:13:5f:9a:32:c0:8e:46:eb:26:b3:5e:ee:6d (DSA)
|_ 1024 af:a2:49:3e:d8:f2:26:12:4a:a0:b5:ee:62:76:b0:18 (RSA)
25/tcp open smtp Sendmail 8.13.4/8.13.4/Debian-3sarge3
| smtp-commands: localhost.localdomain Hello [192.168.45.193], pleased to meet you, ENHANCEDSTATUSCODES, PIPELINING, EXPN, VERB, 8BITMIME, SIZE, DSN, ETRN, DELIVERBY, HELP
|_ 2.0.0 This is sendmail version 8.13.4 2.0.0 Topics: 2.0.0 HELO EHLO MAIL RCPT DATA 2.0.0 RSET NOOP QUIT HELP VRFY 2.0.0 EXPN VERB ETRN DSN AUTH 2.0.0 STARTTLS 2.0.0 For more info use "HELP <topic>". 2.0.0 To report bugs in the implementation send email to 2.0.0 sendmail-bugs@sendmail.org. 2.0.0 For local information send email to Postmaster at your site. 2.0.0 End of HELP info
80/tcp open http Apache httpd 1.3.33 ((Debian GNU/Linux))
| http-methods:
|_ Potentially risky methods: TRACE
|_http-title: Ph33r
|_http-server-header: Apache/1.3.33 (Debian GNU/Linux)
139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
199/tcp open smux Linux SNMP multiplexer
445/tcp open netbios-ssn Samba smbd 3.0.14a-Debian (workgroup: WORKGROUP)
2616/tcp filtered appswitch-emp
8404/tcp filtered svcloud
27606/tcp filtered unknown
31337/tcp open Elite?
| fingerprint-strings:
| FourOhFourRequest, GetRequest:
| -i: line 1: GET: command not found
| line 2:
| command not found
| GenericLines:
| -i: line 1:
| command not found
| line 2:
| command not found
| HTTPOptions, RTSPRequest:
| -i: line 1: OPTIONS: command not found
| line 2:
| command not found
| Help:
| -i: line 1: HELP
| command not found
| Kerberos:
| -i: line 1: qj
| command not found
| LDAPSearchReq:
| -i: line 1: 0
| command not found
| line 2:
| command not found
| LPDString:
| -i: line 1:
| default: command not found
| TLSSessionReq:
| -i: line 1:
| random1random2random3random4
| such file or directory
| TerminalServerCookie:
| -i: line 1:
|_ Cookie:: command not found
33021/tcp filtered unknown
33685/tcp filtered unknown
35955/tcp filtered unknown
37872/tcp filtered unknown
46373/tcp filtered unknown
52756/tcp filtered unknown
58907/tcp filtered unknown
59107/tcp filtered unknown
60000/tcp open ssh OpenSSH 3.8.1p1 Debian 8.sarge.6 (protocol 2.0)
| ssh-hostkey:
| 1024 30:3e:a4:13:5f:9a:32:c0:8e:46:eb:26:b3:5e:ee:6d (DSA)
|_ 1024 af:a2:49:3e:d8:f2:26:12:4a:a0:b5:ee:62:76:b0:18 (RSA)
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port31337-TCP:V=7.95%I=7%D=12/31%Time=69550CE7%P=x86_64-pc-linux-gnu%r(
SF:GetRequest,44,"-i:\x20line\x201:\x20GET:\x20command\x20not\x20found\n-i
SF::\x20line\x202:\x20\r:\x20command\x20not\x20found\n")%r(GenericLines,42
SF:,"-i:\x20line\x201:\x20\r:\x20command\x20not\x20found\n-i:\x20line\x202
SF::\x20\r:\x20command\x20not\x20found\n")%r(HTTPOptions,48,"-i:\x20line\x
SF:201:\x20OPTIONS:\x20command\x20not\x20found\n-i:\x20line\x202:\x20\r:\x
SF:20command\x20not\x20found\n")%r(RTSPRequest,48,"-i:\x20line\x201:\x20OP
SF:TIONS:\x20command\x20not\x20found\n-i:\x20line\x202:\x20\r:\x20command\
SF:x20not\x20found\n")%r(Help,25,"-i:\x20line\x201:\x20HELP\r:\x20command\
SF:x20not\x20found\n")%r(TerminalServerCookie,2B,"-i:\x20line\x201:\x20\x0
SF:3\*%\xe0Cookie::\x20command\x20not\x20found\n")%r(TLSSessionReq,51,"-i:
SF:\x20line\x201:\x20\x16\x03i\x01e\x03\x03U\x1c\xa7\xe4random1random2rand
SF:om3random4\x0c/:\x20No\x20such\x20file\x20or\x20directory\n")%r(Kerbero
SF:s,30,"-i:\x20line\x201:\x20qj\x81n0\x81k\xa1\x03\x02\x01\x05\xa2\x03\x0
SF:2\x01:\x20command\x20not\x20found\n")%r(FourOhFourRequest,44,"-i:\x20li
SF:ne\x201:\x20GET:\x20command\x20not\x20found\n-i:\x20line\x202:\x20\r:\x
SF:20command\x20not\x20found\n")%r(LPDString,28,"-i:\x20line\x201:\x20\x01
SF:default:\x20command\x20not\x20found\n")%r(LDAPSearchReq,4B,"-i:\x20line
SF:\x201:\x200\x84-\x02\x01\x07c\x84\$\x04:\x20command\x20not\x20found\n-i
SF::\x20line\x202:\x20\x01:\x20command\x20not\x20found\n");
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.95%E=4%D=12/31%OT=22%CT=1%CU=36841%PV=Y%DS=4%DC=T%G=Y%TM=69550D
OS:9F%P=x86_64-pc-linux-gnu)SEQ(SP=C4%GCD=1%ISR=C9%TI=Z%CI=Z%II=I%TS=A)SEQ(
OS:SP=C7%GCD=1%ISR=CB%TI=Z%CI=Z%II=I%TS=A)SEQ(SP=C8%GCD=1%ISR=CC%TI=Z%CI=Z%
OS:II=I%TS=A)SEQ(SP=CC%GCD=1%ISR=CB%TI=Z%CI=Z%II=I%TS=A)SEQ(SP=CC%GCD=1%ISR
OS:=CC%TI=Z%CI=Z%II=I%TS=A)OPS(O1=M578ST11NW0%O2=M578ST11NW0%O3=M578NNT11NW
OS:0%O4=M578ST11NW0%O5=M578ST11NW0%O6=M578ST11)WIN(W1=16A0%W2=16A0%W3=16A0%
OS:W4=16A0%W5=16A0%W6=16A0)ECN(R=Y%DF=Y%T=40%W=16D0%O=M578NNSNW0%CC=N%Q=)T1
OS:(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%
OS:S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(
OS:R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=N)U1(R=Y%DF=N%T=40%IPL=164
OS:%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S)
Network Distance: 4 hops
Service Info: Host: localhost.localdomain; OSs: Linux, Unix; CPE: cpe:/o:linux:linux_kernel
Host script results:
|_smb2-time: Protocol negotiation failed (SMB2)
| smb-os-discovery:
| OS: Unix (Samba 3.0.14a-Debian)
| NetBIOS computer name:
| Workgroup: WORKGROUP\x00
|_ System time: 2025-12-31T11:48:15-05:00
| smb-security-mode:
| account_used: guest
| authentication_level: share (dangerous)
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
|_clock-skew: mean: 7h29m58s, deviation: 3h32m07s, median: 4h59m58s
|_nbstat: NetBIOS name: 0XBABE, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
TRACEROUTE (using port 21/tcp)
HOP RTT ADDRESS
1 93.11 ms 192.168.45.1
2 93.06 ms 192.168.45.254
3 93.11 ms 192.168.251.1
4 93.17 ms 192.168.245.42
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 644.31 seconds
Scan result saved to: /home/n0z0/work/scans/20251231-203803_192.168.245.42.xml
|