aboutsummaryrefslogtreecommitdiff
path: root/support/rustscan
diff options
context:
space:
mode:
Diffstat (limited to 'support/rustscan')
-rw-r--r--support/rustscan148
1 files changed, 148 insertions, 0 deletions
diff --git a/support/rustscan b/support/rustscan
new file mode 100644
index 0000000..6c4e66d
--- /dev/null
+++ b/support/rustscan
@@ -0,0 +1,148 @@
+.----. .-. .-. .----..---.  .----. .---.   .--.  .-. .-.
+| {}  }| { } |{ {__ {_   _}{ {__  /  ___} / {} \ |  `| |
+| .-. \| {_} |.-._} } | |  .-._} }\     }/  /\  \| |\  |
+`-' `-'`-----'`----'  `-'  `----'  `---' `-'  `-'`-' `-'
+The Modern Day Port Scanner.
+________________________________________
+: https://discord.gg/GFrQsGy           :
+: https://github.com/RustScan/RustScan :
+ --------------------------------------
+Real hackers hack time ⌛
+
+[~] The config file is expected to be at "/home/compromyse/.rustscan.toml"
+[~] Automatically increasing ulimit value to 5000.
+Open 10.10.11.174:53
+Open 10.10.11.174:88
+Open 10.10.11.174:135
+Open 10.10.11.174:139
+Open 10.10.11.174:389
+Open 10.10.11.174:464
+Open 10.10.11.174:593
+Open 10.10.11.174:636
+Open 10.10.11.174:445
+Open 10.10.11.174:9389
+Open 10.10.11.174:49668
+Open 10.10.11.174:49664
+Open 10.10.11.174:49674
+Open 10.10.11.174:49679
+Open 10.10.11.174:49702
+[~] Starting Script(s)
+[>] Script to be run Some("nmap -vvv -p {{port}} {{ip}}")
+
+[~] Starting Nmap 7.80 ( https://nmap.org ) at 2022-08-19 14:57 IST
+NSE: Loaded 151 scripts for scanning.
+NSE: Script Pre-scanning.
+NSE: Starting runlevel 1 (of 3) scan.
+Initiating NSE at 14:57
+Completed NSE at 14:57, 0.00s elapsed
+NSE: Starting runlevel 2 (of 3) scan.
+Initiating NSE at 14:57
+Completed NSE at 14:57, 0.00s elapsed
+NSE: Starting runlevel 3 (of 3) scan.
+Initiating NSE at 14:57
+Completed NSE at 14:57, 0.00s elapsed
+Initiating Parallel DNS resolution of 1 host. at 14:57
+Completed Parallel DNS resolution of 1 host. at 14:57, 0.02s elapsed
+DNS resolution of 1 IPs took 0.02s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0]
+Initiating Connect Scan at 14:57
+Scanning 10.10.11.174 [15 ports]
+Discovered open port 53/tcp on 10.10.11.174
+Discovered open port 445/tcp on 10.10.11.174
+Discovered open port 135/tcp on 10.10.11.174
+Discovered open port 139/tcp on 10.10.11.174
+Discovered open port 9389/tcp on 10.10.11.174
+Discovered open port 49668/tcp on 10.10.11.174
+Discovered open port 593/tcp on 10.10.11.174
+Discovered open port 49674/tcp on 10.10.11.174
+Discovered open port 464/tcp on 10.10.11.174
+Discovered open port 636/tcp on 10.10.11.174
+Discovered open port 49702/tcp on 10.10.11.174
+Discovered open port 88/tcp on 10.10.11.174
+Discovered open port 49664/tcp on 10.10.11.174
+Discovered open port 389/tcp on 10.10.11.174
+Discovered open port 49679/tcp on 10.10.11.174
+Completed Connect Scan at 14:57, 0.65s elapsed (15 total ports)
+Initiating Service scan at 14:57
+Scanning 15 services on 10.10.11.174
+Completed Service scan at 15:00, 151.27s elapsed (15 services on 1 host)
+NSE: Script scanning 10.10.11.174.
+NSE: Starting runlevel 1 (of 3) scan.
+Initiating NSE at 15:00
+Stats: 0:02:39 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
+NSE: Active NSE Script Threads: 7 (7 waiting)
+NSE Timing: About 99.65% done; ETC: 15:00 (0:00:00 remaining)
+Stats: 0:02:40 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
+NSE: Active NSE Script Threads: 7 (7 waiting)
+NSE Timing: About 99.65% done; ETC: 15:00 (0:00:00 remaining)
+Stats: 0:02:40 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
+NSE: Active NSE Script Threads: 7 (7 waiting)
+NSE Timing: About 99.65% done; ETC: 15:00 (0:00:00 remaining)
+NSE Timing: About 99.95% done; ETC: 15:01 (0:00:00 remaining)
+Completed NSE at 15:01, 40.06s elapsed
+NSE: Starting runlevel 2 (of 3) scan.
+Initiating NSE at 15:01
+NSE Timing: About 98.33% done; ETC: 15:01 (0:00:01 remaining)
+Completed NSE at 15:02, 60.71s elapsed
+NSE: Starting runlevel 3 (of 3) scan.
+Initiating NSE at 15:02
+Completed NSE at 15:02, 0.00s elapsed
+Nmap scan report for 10.10.11.174
+Host is up, received user-set (0.33s latency).
+Scanned at 2022-08-19 14:57:59 IST for 252s
+
+PORT STATE SERVICE REASON VERSION
+53/tcp open domain? syn-ack
+| fingerprint-strings:
+| DNSVersionBindReqTCP:
+| version
+|_ bind
+88/tcp open kerberos-sec syn-ack Microsoft Windows Kerberos (server time: 2022-08-19 09:28:07Z)
+135/tcp open msrpc syn-ack Microsoft Windows RPC
+139/tcp open netbios-ssn syn-ack Microsoft Windows netbios-ssn
+389/tcp open ldap syn-ack Microsoft Windows Active Directory LDAP (Domain: support.htb0., Site: Default-First-Site-Name)
+445/tcp open microsoft-ds? syn-ack
+464/tcp open kpasswd5? syn-ack
+593/tcp open ncacn_http syn-ack Microsoft Windows RPC over HTTP 1.0
+636/tcp open tcpwrapped syn-ack
+9389/tcp open mc-nmf syn-ack .NET Message Framing
+49664/tcp open msrpc syn-ack Microsoft Windows RPC
+49668/tcp open msrpc syn-ack Microsoft Windows RPC
+49674/tcp open ncacn_http syn-ack Microsoft Windows RPC over HTTP 1.0
+49679/tcp open msrpc syn-ack Microsoft Windows RPC
+49702/tcp open msrpc syn-ack Microsoft Windows RPC
+1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
+SF-Port53-TCP:V=7.80%I=7%D=8/19%Time=62FF57AB%P=x86_64-pc-linux-gnu%r(DNSV
+SF:ersionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\
+SF:x04bind\0\0\x10\0\x03");
+Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows
+
+Host script results:
+|_clock-skew: 0s
+| p2p-conficker:
+| Checking for Conficker.C or higher...
+| Check 1 (port 27353/tcp): CLEAN (Timeout)
+| Check 2 (port 19493/tcp): CLEAN (Timeout)
+| Check 3 (port 45724/udp): CLEAN (Timeout)
+| Check 4 (port 4948/udp): CLEAN (Timeout)
+|_ 0/4 checks are positive: Host is CLEAN or ports are blocked
+| smb2-security-mode:
+| 2.02:
+|_ Message signing enabled and required
+| smb2-time:
+| date: 2022-08-19T09:30:33
+|_ start_date: N/A
+
+NSE: Script Post-scanning.
+NSE: Starting runlevel 1 (of 3) scan.
+Initiating NSE at 15:02
+Completed NSE at 15:02, 0.00s elapsed
+NSE: Starting runlevel 2 (of 3) scan.
+Initiating NSE at 15:02
+Completed NSE at 15:02, 0.00s elapsed
+NSE: Starting runlevel 3 (of 3) scan.
+Initiating NSE at 15:02
+Completed NSE at 15:02, 0.00s elapsed
+Read data files from: /usr/bin/../share/nmap
+Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
+Nmap done: 1 IP address (1 host up) scanned in 253.00 seconds
+