diff --git a/nmap/scan b/nmap/scan new file mode 100644 index 0000000..2135f89 --- /dev/null +++ b/nmap/scan @@ -0,0 +1,75 @@ +#Scan carte en pont : 192.168.0.45 + +Starting Nmap 7.80 ( https://nmap.org ) at 2022-02-10 14:52 CET +Nmap scan report for 192.168.0.45 +Host is up (0.00027s latency). +Not shown: 989 filtered ports +PORT STATE SERVICE VERSION +#DNS port 53 tcp +53/tcp open domain? +88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2022-02-10 13:52:59Z) +#Mappeur MSRCP port 135 tcp +135/tcp open msrpc Microsoft Windows RPC +#Netbios port 139 tcp +139/tcp open netbios-ssn Microsoft Windows netbios-ssn +#LDAP port 389 en tcp +389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: onfdc.lan, Site: Default-First-Site-Name) +#SMB port 445 tcp +445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds (workgroup: ONFDC0) +#Test intrusion LDAP port 464 tcp +464/tcp open kpasswd5? +#Testing MSRCP port 593 tcp +593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 +#tcpwrapped port 636 tcp +636/tcp open tcpwrapped +#LDAP port 3268 tcp +3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: onfdc.lan, Site: Default-First-Site-Name) +#tcpwrapped port 3269 tcp +3269/tcp open tcpwrapped +1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : +SF-Port53-TCP:V=7.80%I=7%D=2/10%Time=620518C2%P=x86_64-pc-linux-gnu%r(DNSV +SF:ersionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\ +SF:x04bind\0\0\x10\0\x03"); +MAC Address: 08:00:27:29:E0:6E (Oracle VirtualBox virtual NIC) #Adresse MAC +Service Info: Host: ONFDC; OS: Windows; CPE: cpe:/o:microsoft:windows #Systeme info + +Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . +Nmap done: 1 IP address (1 host up) scanned in 147.14 seconds #Durée scan 147.14 sec + +#Scan carte interne : 192.168.2.1 + +Starting Nmap 7.80 ( https://nmap.org ) at 2022-02-10 15:05 CET +Nmap scan report for 192.168.2.3 +Host is up (0.0000090s latency). +Not shown: 999 closed ports +PORT STATE SERVICE VERSION +22/tcp open ssh OpenSSH 8.4p1 Debian 5 (protocol 2.0) +Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel + +Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . +Nmap done: 1 IP address (1 host up) scanned in 13.48 seconds +Starting Nmap 7.80 ( https://nmap.org ) at 2022-02-10 15:05 CET +Nmap scan report for 192.168.2.1 +Host is up (0.00044s latency). +Not shown: 989 filtered ports +PORT STATE SERVICE VERSION +53/tcp open domain? +88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2022-02-10 14:06:14Z) +135/tcp open msrpc Microsoft Windows RPC +139/tcp open netbios-ssn Microsoft Windows netbios-ssn +389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: onfdc.lan, Site: Default-First-Site-Name) +445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds (workgroup: ONFDC0) +464/tcp open kpasswd5? +593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 +636/tcp open tcpwrapped +3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: onfdc.lan, Site: Default-First-Site-Name) +3269/tcp open tcpwrapped +1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : +SF-Port53-TCP:V=7.80%I=7%D=2/10%Time=62051BDC%P=x86_64-pc-linux-gnu%r(DNSV +SF:ersionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\ +SF:x04bind\0\0\x10\0\x03"); +MAC Address: 08:00:27:D2:86:46 (Oracle VirtualBox virtual NIC) +Service Info: Host: ONFDC; OS: Windows; CPE: cpe:/o:microsoft:windows + +Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . +Nmap done: 1 IP address (1 host up) scanned in 159.90 seconds