aboutsummaryrefslogtreecommitdiff
path: root/responder/rustscan
diff options
context:
space:
mode:
Diffstat (limited to 'responder/rustscan')
-rw-r--r--responder/rustscan80
1 files changed, 80 insertions, 0 deletions
diff --git a/responder/rustscan b/responder/rustscan
new file mode 100644
index 0000000..63ce5fc
--- /dev/null
+++ b/responder/rustscan
@@ -0,0 +1,80 @@
+.----. .-. .-. .----..---.  .----. .---.   .--.  .-. .-.
+| {}  }| { } |{ {__ {_   _}{ {__  /  ___} / {} \ |  `| |
+| .-. \| {_} |.-._} } | |  .-._} }\     }/  /\  \| |\  |
+`-' `-'`-----'`----'  `-'  `----'  `---' `-'  `-'`-' `-'
+The Modern Day Port Scanner.
+________________________________________
+: https://discord.gg/GFrQsGy           :
+: https://github.com/RustScan/RustScan :
+ --------------------------------------
+😵 https://admin.tryhackme.com
+
+[~] The config file is expected to be at "/home/compromyse/.rustscan.toml"
+[~] Automatically increasing ulimit value to 5000.
+Open 10.129.50.64:80
+Open 10.129.50.64:5985
+[~] Starting Script(s)
+[>] Script to be run Some("nmap -vvv -p {{port}} {{ip}}")
+
+[~] Starting Nmap 7.80 ( https://nmap.org ) at 2022-08-17 22:01 IST
+NSE: Loaded 151 scripts for scanning.
+NSE: Script Pre-scanning.
+NSE: Starting runlevel 1 (of 3) scan.
+Initiating NSE at 22:01
+Completed NSE at 22:01, 0.00s elapsed
+NSE: Starting runlevel 2 (of 3) scan.
+Initiating NSE at 22:01
+Completed NSE at 22:01, 0.00s elapsed
+NSE: Starting runlevel 3 (of 3) scan.
+Initiating NSE at 22:01
+Completed NSE at 22:01, 0.00s elapsed
+Initiating Ping Scan at 22:01
+Scanning 10.129.50.64 [2 ports]
+Completed Ping Scan at 22:01, 0.49s elapsed (1 total hosts)
+Initiating Connect Scan at 22:01
+Scanning unika.htb (10.129.50.64) [2 ports]
+Discovered open port 80/tcp on 10.129.50.64
+Discovered open port 5985/tcp on 10.129.50.64
+Completed Connect Scan at 22:01, 0.51s elapsed (2 total ports)
+Initiating Service scan at 22:01
+Scanning 2 services on unika.htb (10.129.50.64)
+Completed Service scan at 22:02, 6.62s elapsed (2 services on 1 host)
+NSE: Script scanning 10.129.50.64.
+NSE: Starting runlevel 1 (of 3) scan.
+Initiating NSE at 22:02
+Completed NSE at 22:02, 29.38s elapsed
+NSE: Starting runlevel 2 (of 3) scan.
+Initiating NSE at 22:02
+Completed NSE at 22:02, 2.14s elapsed
+NSE: Starting runlevel 3 (of 3) scan.
+Initiating NSE at 22:02
+Completed NSE at 22:02, 0.00s elapsed
+Nmap scan report for unika.htb (10.129.50.64)
+Host is up, received syn-ack (0.50s latency).
+Scanned at 2022-08-17 22:01:55 IST for 39s
+
+PORT STATE SERVICE REASON VERSION
+80/tcp open http syn-ack Apache httpd 2.4.52 ((Win64) OpenSSL/1.1.1m PHP/8.1.1)
+| http-methods:
+|_ Supported Methods: GET HEAD POST
+|_http-server-header: Apache/2.4.52 (Win64) OpenSSL/1.1.1m PHP/8.1.1
+|_http-title: Unika
+5985/tcp open http syn-ack Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
+|_http-server-header: Microsoft-HTTPAPI/2.0
+|_http-title: Not Found
+Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
+
+NSE: Script Post-scanning.
+NSE: Starting runlevel 1 (of 3) scan.
+Initiating NSE at 22:02
+Completed NSE at 22:02, 0.00s elapsed
+NSE: Starting runlevel 2 (of 3) scan.
+Initiating NSE at 22:02
+Completed NSE at 22:02, 0.00s elapsed
+NSE: Starting runlevel 3 (of 3) scan.
+Initiating NSE at 22:02
+Completed NSE at 22:02, 0.00s elapsed
+Read data files from: /usr/bin/../share/nmap
+Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
+Nmap done: 1 IP address (1 host up) scanned in 39.43 seconds
+