Saturday, January 18, 2014

Scan Metasploitable Menggunakan Nmap di Slackware 14.1

mencoba scanning terhadap Metasploitable menggunakan NMap yg ada di Slackware 14.1:

bash-4.2# nmap -sV 192.168.56.3

Starting Nmap 6.40 ( http://nmap.org/ ) at 2014-01-17 18:54 CIT
Nmap scan report for 192.168.56.3
Host is up (0.00011s latency).
Not shown: 992 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp ProFTPD 1.3.1
22/tcp open ssh OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0)
23/tcp open telnet Linux telnetd
80/tcp open http Apache httpd 2.2.8 ((Ubuntu) PHP/5.2.4-2ubuntu5.10 with Suhosin-Patch)
3306/tcp open mysql MySQL 5.0.51a-3ubuntu5
5432/tcp open postgresql PostgreSQL DB 8.3.0 - 8.3.7
8009/tcp open ajp13 Apache Jserv (Protocol v1.3)
8180/tcp open http Apache Tomcat/Coyote JSP engine 1.1
MAC Address: 08:00:27:68:2D:AC (Cadmus Computer Systems)
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.92 seconds

No comments:

Post a Comment

please, write your comment about this article