nmap -T4 -A -v 192.168.56.108 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-05-28 23:25 EDT NSE: Loaded 156 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 23:25 Completed NSE at 23:25, 0.00s elapsed Initiating NSE at 23:25 Completed NSE at 23:25, 0.00s elapsed Initiating NSE at 23:25 Completed NSE at 23:25, 0.00s elapsed Initiating ARP Ping Scan at 23:25 Scanning 192.168.56.108 [1 port] Completed ARP Ping Scan at 23:25, 0.05s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 23:25 Completed Parallel DNS resolution of 1 host. at 23:25, 0.02s elapsed Initiating SYN Stealth Scan at 23:25 Scanning 192.168.56.108 [1000 ports] Discovered open port 80/tcp on 192.168.56.108 Discovered open port 22/tcp on 192.168.56.108 Discovered open port 5001/tcp on 192.168.56.108 Completed SYN Stealth Scan at 23:25, 0.06s elapsed (1000 total ports) Initiating Service scan at 23:25 Scanning 3 services on 192.168.56.108 Completed Service scan at 23:26, 91.31s elapsed (3 services on 1 host) Initiating OS detection (try #1) against 192.168.56.108 NSE: Script scanning 192.168.56.108. Initiating NSE at 23:26 Completed NSE at 23:26, 0.83s elapsed Initiating NSE at 23:26 Completed NSE at 23:26, 1.02s elapsed Initiating NSE at 23:26 Completed NSE at 23:26, 0.00s elapsed Nmap scan report for 192.168.56.108 Host is up (0.0012s latency). Not shown: 997 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11u3 (protocol 2.0) | ssh-hostkey: | 3072 f6:a3:b6:78:c4:62:af:44:bb:1a:a0:0c:08:6b:98:f7 (RSA) | 256 bb:e8:a2:31:d4:05:a9:c9:31:ff:62:f6:32:84:21:9d (ECDSA) |_ 256 3b:ae:34:64:4f:a5:75:b9:4a:b9:81:f9:89:76:99:eb (ED25519) 80/tcp open http Apache httpd 2.4.62 ((Debian)) | http-methods: |_ Supported Methods: OPTIONS HEAD GET POST |_http-title: \xE6\x88\x91\xE7\x9A\x84\xE9\xA1\xB5\xE9\x9D\xA2 |_http-server-header: Apache/2.4.62 (Debian) 5001/tcp open commplex-link? | fingerprint-strings: | GetRequest: | HTTP/1.1 405 METHOD NOT ALLOWED | Server: Werkzeug/3.1.3 Python/3.9.2 | Date: Thu, 29 May 2025 03:25:35 GMT | Content-Type: text/html; charset=utf-8 | Allow: POST, OPTIONS | Content-Length: 153 | Access-Control-Allow-Origin: * | Connection: close | <!doctype html> | <html lang=en> | <title>405 Method Not Allowed</title> | <h1>Method Not Allowed</h1> | <p>The method is not allowed for the requested URL.</p> | HTTPOptions: | HTTP/1.1 200 OK | Server: Werkzeug/3.1.3 Python/3.9.2 | Date: Thu, 29 May 2025 03:25:35 GMT | Content-Type: text/html; charset=utf-8 | Allow: POST, OPTIONS | Access-Control-Allow-Origin: * | Content-Length: 0 | Connection: close | Help: | <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" | "http://www.w3.org/TR/html4/strict.dtd"> | <html> | <head> | <meta http-equiv="Content-Type" content="text/html;charset=utf-8"> | <title>Error response</title> | </head> | <body> | <h1>Error response</h1> | <p>Error code: 400</p> | <p>Message: Bad request syntax ('HELP').</p> | <p>Error code explanation: HTTPStatus.BAD_REQUEST - Bad request syntax or unsupported method.</p> | </body> | </html> | RTSPRequest: | <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" | "http://www.w3.org/TR/html4/strict.dtd"> | <html> | <head> | <meta http-equiv="Content-Type" content="text/html;charset=utf-8"> | <title>Error response</title> | </head> | <body> | <h1>Error response</h1> | <p>Error code: 400</p> | <p>Message: Bad request version ('RTSP/1.0').</p> | <p>Error code explanation: HTTPStatus.BAD_REQUEST - Bad request syntax or unsupported method.</p> | </body> |_ </html> 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port5001-TCP:V=7.94SVN%I=7%D=5/28%Time=6837D3B0%P=x86_64-pc-linux-gnu%r SF:(GetRequest,18C,"HTTP/1\.1\x20405\x20METHOD\x20NOT\x20ALLOWED\r\nServer SF::\x20Werkzeug/3\.1\.3\x20Python/3\.9\.2\r\nDate:\x20Thu,\x2029\x20May\x SF:202025\x2003:25:35\x20GMT\r\nContent-Type:\x20text/html;\x20charset=utf SF:-8\r\nAllow:\x20POST,\x20OPTIONS\r\nContent-Length:\x20153\r\nAccess-Co SF:ntrol-Allow-Origin:\x20\*\r\nConnection:\x20close\r\n\r\n<!doctype\x20h SF:tml>\n<html\x20lang=en>\n<title>405\x20Method\x20Not\x20Allowed</title> SF:\n<h1>Method\x20Not\x20Allowed</h1>\n<p>The\x20method\x20is\x20not\x20a SF:llowed\x20for\x20the\x20requested\x20URL\.</p>\n")%r(HTTPOptions,E1,"HT SF:TP/1\.1\x20200\x20OK\r\nServer:\x20Werkzeug/3\.1\.3\x20Python/3\.9\.2\r SF:\nDate:\x20Thu,\x2029\x20May\x202025\x2003:25:35\x20GMT\r\nContent-Type SF::\x20text/html;\x20charset=utf-8\r\nAllow:\x20POST,\x20OPTIONS\r\nAcces SF:s-Control-Allow-Origin:\x20\*\r\nContent-Length:\x200\r\nConnection:\x2 SF:0close\r\n\r\n")%r(RTSPRequest,1F4,"<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-/ SF:/W3C//DTD\x20HTML\x204\.01//EN\"\n\x20\x20\x20\x20\x20\x20\x20\x20\"htt SF:p://www\.w3\.org/TR/html4/strict\.dtd\">\n<html>\n\x20\x20\x20\x20<head SF:>\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20http-equiv=\"Content-Type\" SF:\x20content=\"text/html;charset=utf-8\">\n\x20\x20\x20\x20\x20\x20\x20\ SF:x20<title>Error\x20response</title>\n\x20\x20\x20\x20</head>\n\x20\x20\ SF:x20\x20<body>\n\x20\x20\x20\x20\x20\x20\x20\x20<h1>Error\x20response</h SF:1>\n\x20\x20\x20\x20\x20\x20\x20\x20<p>Error\x20code:\x20400</p>\n\x20\ SF:x20\x20\x20\x20\x20\x20\x20<p>Message:\x20Bad\x20request\x20version\x20 SF:\('RTSP/1\.0'\)\.</p>\n\x20\x20\x20\x20\x20\x20\x20\x20<p>Error\x20code SF:\x20explanation:\x20HTTPStatus\.BAD_REQUEST\x20-\x20Bad\x20request\x20s SF:yntax\x20or\x20unsupported\x20method\.</p>\n\x20\x20\x20\x20</body>\n</ SF:html>\n")%r(Help,1EF,"<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//W3C//DTD\x20H SF:TML\x204\.01//EN\"\n\x20\x20\x20\x20\x20\x20\x20\x20\"http://www\.w3\.o SF:rg/TR/html4/strict\.dtd\">\n<html>\n\x20\x20\x20\x20<head>\n\x20\x20\x2 SF:0\x20\x20\x20\x20\x20<meta\x20http-equiv=\"Content-Type\"\x20content=\" SF:text/html;charset=utf-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<title>Erro SF:r\x20response</title>\n\x20\x20\x20\x20</head>\n\x20\x20\x20\x20<body>\ SF:n\x20\x20\x20\x20\x20\x20\x20\x20<h1>Error\x20response</h1>\n\x20\x20\x SF:20\x20\x20\x20\x20\x20<p>Error\x20code:\x20400</p>\n\x20\x20\x20\x20\x2 SF:0\x20\x20\x20<p>Message:\x20Bad\x20request\x20syntax\x20\('HELP'\)\.</p SF:>\n\x20\x20\x20\x20\x20\x20\x20\x20<p>Error\x20code\x20explanation:\x20 SF:HTTPStatus\.BAD_REQUEST\x20-\x20Bad\x20request\x20syntax\x20or\x20unsup SF:ported\x20method\.</p>\n\x20\x20\x20\x20</body>\n</html>\n"); MAC Address: 08:00:27:32:28:EA (Oracle VirtualBox virtual NIC) Device type: general purpose Running: Linux 4.X|5.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 OS details: Linux 4.15 - 5.8 Uptime guess: 1.066 days (since Tue May 27 21:52:29 2025) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=264 (Good luck!) IP ID Sequence Generation: All zeros Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE HOP RTT ADDRESS 1 1.20 ms 192.168.56.108
NSE: Script Post-scanning. Initiating NSE at 23:26 Completed NSE at 23:26, 0.00s elapsed Initiating NSE at 23:26 Completed NSE at 23:26, 0.00s elapsed Initiating NSE at 23:26 Completed NSE at 23:26, 0.00s elapsed Read data files from: /usr/share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 95.00 seconds Raw packets sent: 1023 (45.806KB) | Rcvd: 1015 (41.290KB)