nmap -T4 -A -v 192.168.56.105 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-05-28 11:11 EDT NSE: Loaded 156 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 11:11 Completed NSE at 11:11, 0.00s elapsed Initiating NSE at 11:11 Completed NSE at 11:11, 0.00s elapsed Initiating NSE at 11:11 Completed NSE at 11:11, 0.00s elapsed Initiating ARP Ping Scan at 11:11 Scanning 192.168.56.105 [1 port] Completed ARP Ping Scan at 11:11, 0.07s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 11:11 Completed Parallel DNS resolution of 1 host. at 11:11, 0.03s elapsed Initiating SYN Stealth Scan at 11:11 Scanning 192.168.56.105 [1000 ports] Discovered open port 22/tcp on 192.168.56.105 Discovered open port 80/tcp on 192.168.56.105 Completed SYN Stealth Scan at 11:11, 0.10s elapsed (1000 total ports) Initiating Service scan at 11:11 Scanning 2 services on 192.168.56.105 Completed Service scan at 11:11, 6.08s elapsed (2 services on 1 host) Initiating OS detection (try #1) against 192.168.56.105 NSE: Script scanning 192.168.56.105. Initiating NSE at 11:11 Completed NSE at 11:11, 0.27s elapsed Initiating NSE at 11:11 Completed NSE at 11:11, 0.01s elapsed Initiating NSE at 11:11 Completed NSE at 11:11, 0.00s elapsed Nmap scan report for 192.168.56.105 Host is up (0.00076s latency). Not shown: 998 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.9 (protocol 2.0) | ssh-hostkey: | 256 42:a7:04:bb:da:b5:8e:71:7a:89:ff:a4:60:cd:4d:29 (ECDSA) |_ 256 37:32:71:ca:3f:11:41:b4:d7:90:1e:c9:7f:e8:bc:20 (ED25519) 80/tcp open http Apache httpd 2.4.62 ((Unix)) |_http-title: THE FINALS |_http-server-header: Apache/2.4.62 (Unix) | http-methods: | Supported Methods: GET POST OPTIONS HEAD TRACE |_ Potentially risky methods: TRACE MAC Address: 08:00:27:BD:74:14 (Oracle VirtualBox virtual NIC) Device type: general purpose Running: Linux 4.X|5.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 OS details: Linux 4.15 - 5.8 Uptime guess: 22.031 days (since Tue May 6 10:27:15 2025) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=265 (Good luck!) IP ID Sequence Generation: All zeros
TRACEROUTE HOP RTT ADDRESS 1 0.76 ms 192.168.56.105
NSE: Script Post-scanning. Initiating NSE at 11:11 Completed NSE at 11:11, 0.00s elapsed Initiating NSE at 11:11 Completed NSE at 11:11, 0.00s elapsed Initiating NSE at 11:11 Completed NSE at 11:11, 0.00s elapsed Read data files from: /usr/share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 8.36 seconds Raw packets sent: 1023 (45.806KB) | Rcvd: 1015 (41.286KB)
Database changed MariaDB [typecho_db]> use secret; Reading table information for completion of table and column names You can turn off this feature to get a quicker startup with -A
Database changed MariaDB [secret]> show tables; +------------------+ | Tables_in_secret | +------------------+ | user | +------------------+ 1 row in set (0.000 sec)
MariaDB [secret]> select * from user; +----+----------+-------------------------+ | id | username | password | +----+----------+-------------------------+ | 1 | root | BvIpFDyB4kNbkyqJGwMzLcK | +----+----------+-------------------------+ 1 row in set (0.000 sec)