1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95
| rustscan -a 10.10.11.69 --range 1-65535 -- -sV [!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers [!] Your file limit is very small, which negatively impacts RustScan's speed. Use the Docker image, or up the Ulimit with '--ulimit 5000'. Open 10.10.11.69:53 Open 10.10.11.69:88 Open 10.10.11.69:139 Open 10.10.11.69:389 Open 10.10.11.69:445 Open 10.10.11.69:464 Open 10.10.11.69:593 Open 10.10.11.69:636 Open 10.10.11.69:3268 Open 10.10.11.69:3269 Open 10.10.11.69:5985 Open 10.10.11.69:9389 Open 10.10.11.69:49667 Open 10.10.11.69:49678 Open 10.10.11.69:49681 Open 10.10.11.69:49695 Open 10.10.11.69:49701 Open 10.10.11.69:49677 Open 10.10.11.69:49738 [~] Starting Nmap [>] The Nmap command to be run is nmap -sV -vvv -p 53,88,139,389,445,464,593,636,3268,3269,5985,9389,49667,49678,49681,49695,49701,49677,49738 10.10.11.69
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-05-24 22:15 -06 NSE: Loaded 46 scripts for scanning. Initiating Ping Scan at 22:15 Scanning 10.10.11.69 [4 ports] Completed Ping Scan at 22:15, 0.24s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 22:15 Completed Parallel DNS resolution of 1 host. at 22:15, 0.03s elapsed DNS resolution of 1 IPs took 0.03s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0] Initiating SYN Stealth Scan at 22:15 Scanning 10.10.11.69 [19 ports] Discovered open port 139/tcp on 10.10.11.69 Discovered open port 53/tcp on 10.10.11.69 Discovered open port 445/tcp on 10.10.11.69 Discovered open port 88/tcp on 10.10.11.69 Discovered open port 49678/tcp on 10.10.11.69 Discovered open port 389/tcp on 10.10.11.69 Discovered open port 636/tcp on 10.10.11.69 Discovered open port 49701/tcp on 10.10.11.69 Discovered open port 49738/tcp on 10.10.11.69 Discovered open port 3268/tcp on 10.10.11.69 Discovered open port 49677/tcp on 10.10.11.69 Discovered open port 3269/tcp on 10.10.11.69 Discovered open port 49695/tcp on 10.10.11.69 Discovered open port 593/tcp on 10.10.11.69 Discovered open port 5985/tcp on 10.10.11.69 Discovered open port 9389/tcp on 10.10.11.69 Discovered open port 464/tcp on 10.10.11.69 Discovered open port 49681/tcp on 10.10.11.69 Discovered open port 49667/tcp on 10.10.11.69 Completed SYN Stealth Scan at 22:15, 0.55s elapsed (19 total ports) Initiating Service scan at 22:15 Scanning 19 services on 10.10.11.69 Completed Service scan at 22:16, 58.08s elapsed (19 services on 1 host) NSE: Script scanning 10.10.11.69. NSE: Starting runlevel 1 (of 2) scan. Initiating NSE at 22:16 Completed NSE at 22:16, 1.27s elapsed NSE: Starting runlevel 2 (of 2) scan. Initiating NSE at 22:16 Completed NSE at 22:16, 0.87s elapsed Nmap scan report for 10.10.11.69 Host is up, received echo-reply ttl 127 (0.25s latency). Scanned at 2025-05-24 22:15:47 -06 for 61s
PORT STATE SERVICE REASON VERSION 53/tcp open domain syn-ack ttl 127 Simple DNS Plus 88/tcp open kerberos-sec syn-ack ttl 127 Microsoft Windows Kerberos (server time: 2025-05-25 10:54:53Z) 139/tcp open netbios-ssn syn-ack ttl 127 Microsoft Windows netbios-ssn 389/tcp open ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: fluffy.htb0., Site: Default-First-Site-Name) 445/tcp open microsoft-ds? syn-ack ttl 127 464/tcp open kpasswd5? syn-ack ttl 127 593/tcp open ncacn_http syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0 636/tcp open ssl/ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: fluffy.htb0., Site: Default-First-Site-Name) 3268/tcp open ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: fluffy.htb0., Site: Default-First-Site-Name) 3269/tcp open ssl/ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: fluffy.htb0., Site: Default-First-Site-Name) 5985/tcp open http syn-ack ttl 127 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) 9389/tcp open mc-nmf syn-ack ttl 127 .NET Message Framing 49667/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 49677/tcp open ncacn_http syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0 49678/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 49681/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 49695/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 49701/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 49738/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows
Read data files from: /usr/bin/../share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 62.86 seconds Raw packets sent: 23 (988B) | Rcvd: 20 (864B)
|