root@kali:~# nmap -sS -T4 -A -p- -v 192.168.43.182 Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-03 20:44 CST NSE: Loaded 148 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 20:44 Completed NSE at 20:44, 0.00s elapsed Initiating NSE at 20:44 Completed NSE at 20:44, 0.00s elapsed Initiating ARP Ping Scan at 20:44 Scanning 192.168.43.182 [1 port] Completed ARP Ping Scan at 20:44, 0.00s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 20:44 Completed Parallel DNS resolution of 1 host. at 20:44, 0.80s elapsed Initiating SYN Stealth Scan at 20:44 Scanning 192.168.43.182 [65535 ports] Discovered open port 80/tcp on 192.168.43.182 Discovered open port 111/tcp on 192.168.43.182 Discovered open port 22/tcp on 192.168.43.182 Discovered open port 40635/tcp on 192.168.43.182 Completed SYN Stealth Scan at 20:44, 7.25s elapsed (65535 total ports) Initiating Service scan at 20:44 Scanning 4 services on 192.168.43.182 Completed Service scan at 20:44, 11.02s elapsed (4 services on 1 host) Initiating OS detection (try #1) against 192.168.43.182 NSE: Script scanning 192.168.43.182. Initiating NSE at 20:44 Completed NSE at 20:44, 0.36s elapsed Initiating NSE at 20:44 Completed NSE at 20:44, 0.01s elapsed Nmap scan report for 192.168.43.182 Host is up (0.00046s latency). Not shown: 65531 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u3 (protocol 2.0) | ssh-hostkey: | 1024 3d:6f:40:88:76:6a:1d:a1:fd:91:0f:dc:86:b7:81:13 (DSA) | 2048 eb:29:c0:cb:eb:9a:0b:52:e7:9c:c4:a6:67:dc:33:e1 (RSA) | 256 d4:02:99:b0:e7:7d:40:18:64:df:3b:28:5b:9e:f9:07 (ECDSA) |_ 256 e9:c4:0c:6d:4b:15:4a:58:4f:69:cd:df:13:76:32:4e (ED25519) 80/tcp open http Apache httpd 2.4.10 ((Debian)) | http-methods: |_ Supported Methods: OPTIONS GET HEAD POST | http-robots.txt: 2 disallowed entries |_/wordpress-blog /files |_http-server-header: Apache/2.4.10 (Debian) |_http-title: Secretsec Company 111/tcp open rpcbind 2-4 (RPC #100000) | rpcinfo: | program version port/proto service | 100000 2,3,4 111/tcp rpcbind | 100000 2,3,4 111/udp rpcbind | 100024 1 40635/tcp status |_ 100024 1 58402/udp status 40635/tcp open status 1 (RPC #100024) MAC Address: 08:00:27:84:43:C4 (Oracle VirtualBox virtual NIC) Device type: general purpose Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 OS details: Linux 3.2 - 4.9 Uptime guess: 0.002 days (since Sun Feb 3 20:41:11 2019) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=258 (Good luck!) IP ID Sequence Generation: All zeros Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE HOP RTT ADDRESS 1 0.46 ms 192.168.43.182
NSE: Script Post-scanning. Initiating NSE at 20:44 Completed NSE at 20:44, 0.00s elapsed Initiating NSE at 20:44 Completed NSE at 20:44, 0.00s elapsed Read data files from: /usr/bin/../share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 22.28 seconds Raw packets sent: 65558 (2.885MB) | Rcvd: 65550 (2.623MB)
martin@debian:~$ cat /etc/crontab # /etc/crontab: system-wide crontab # Unlike any other crontab you don't have to run the `crontab' #command to install the new version when you edit this file # and files in /etc/cron.d. These files also have username fields, # that none of the other crontabs do.