⚡ root@kali ~/Desktop/test/test nmap -sP 192.168.56.0/24 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-21 08:02 EST Nmap scan report for192.168.56.1 Host is up (0.00031s latency). MAC Address: 0A:00:27:00:00:09 (Unknown) Nmap scan report for192.168.56.2 Host is up (0.00027s latency). MAC Address: 08:00:27:D5:61:82 (Oracle VirtualBox virtual NIC) Nmap scan report for192.168.56.35 Host is up (0.00040s latency). MAC Address: 08:00:27:E5:B6:EC (Oracle VirtualBox virtual NIC) Nmap scan report for192.168.56.36 Host is up (0.00061s latency). MAC Address: 08:00:27:36:C4:D6 (Oracle VirtualBox virtual NIC)
1 2 3 4 5 6 7 8 9 10 11
⚡ root@kali ~/Desktop/test/test nmap -sT -min-rate 10000 -p- 192.168.56.36 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-21 08:06 EST Nmap scan report for192.168.56.36 Host is up (0.00050s latency). Not shown: 65533 closed tcp ports (conn-refused) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http MAC Address: 08:00:27:36:C4:D6 (Oracle VirtualBox virtual NIC)
⚡ root@kali ~/Desktop/test/test nmap -sT -A -T4 -O -p 22,80192.168.56.36 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-21 08:07 EST Nmap scan report for192.168.56.36 Host is up (0.00054s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.2p1 Debian 2+deb12u3 (protocol 2.0) | ssh-hostkey: | 25665:bb:ae:ef:71:d4:b5:c5:8f:e7:ee:dc:0b:27:46:c2 (ECDSA) |_ 256 ea:c8:da:c8:92:71:d8:8e:08:47:c0:66:e0:57:46:49 (ED25519) 80/tcp open http Apache httpd 2.4.62 ((Debian)) |_http-title: Apache2 Debian Default Page: It works |_http-server-header: Apache/2.4.62 (Debian) MAC Address: 08:00:27:36:C4:D6 (Oracle VirtualBox virtual NIC) Warning: OSScan results may be unreliable because we could not find at least 1openand1 closed port Device type: general purpose Running: Linux 4.X|5.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 OS details: Linux 4.15 - 5.8 Network Distance: 1 hop Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE HOP RTT ADDRESS 10.54 ms 192.168.56.36
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in15.35 seconds
⚡ root@kali ~/Desktop/test/test nmap -script=vuln -p 80,22 192.168.56.36 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-21 08:09 EST Pre-scan script results: | broadcast-avahi-dos: | Discovered hosts: | 224.0.0.251 | After NULL UDP avahi packet DoS (CVE-2011-1002). |_ Hosts are all up (not vulnerable). Nmap scan report for 192.168.56.36 Host is up (0.00057s latency).
PORT STATE SERVICE 22/tcp open ssh 80/tcp open http |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. |_http-csrf: Couldn't find any CSRF vulnerabilities. |_http-dombased-xss: Couldn't find any DOM based XSS. MAC Address: 08:00:27:36:C4:D6 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 61.78 seconds