From f914e816092f02a4bbed779ad91a6641e7cc2122 Mon Sep 17 00:00:00 2001 From: Raghuram Subramani Date: Sun, 4 Sep 2022 05:04:04 -0400 Subject: add rooms --- support/rustscan | 148 +++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 148 insertions(+) create mode 100644 support/rustscan (limited to 'support/rustscan') diff --git a/support/rustscan b/support/rustscan new file mode 100644 index 0000000..6c4e66d --- /dev/null +++ b/support/rustscan @@ -0,0 +1,148 @@ +.----. .-. .-. .----..---.  .----. .---.   .--.  .-. .-. +| {}  }| { } |{ {__ {_   _}{ {__  /  ___} / {} \ |  `| | +| .-. \| {_} |.-._} } | |  .-._} }\     }/  /\  \| |\  | +`-' `-'`-----'`----'  `-'  `----'  `---' `-'  `-'`-' `-' +The Modern Day Port Scanner. +________________________________________ +: https://discord.gg/GFrQsGy           : +: https://github.com/RustScan/RustScan : + -------------------------------------- +Real hackers hack time ⌛ + +[~] The config file is expected to be at "/home/compromyse/.rustscan.toml" +[~] Automatically increasing ulimit value to 5000. +Open 10.10.11.174:53 +Open 10.10.11.174:88 +Open 10.10.11.174:135 +Open 10.10.11.174:139 +Open 10.10.11.174:389 +Open 10.10.11.174:464 +Open 10.10.11.174:593 +Open 10.10.11.174:636 +Open 10.10.11.174:445 +Open 10.10.11.174:9389 +Open 10.10.11.174:49668 +Open 10.10.11.174:49664 +Open 10.10.11.174:49674 +Open 10.10.11.174:49679 +Open 10.10.11.174:49702 +[~] Starting Script(s) +[>] Script to be run Some("nmap -vvv -p {{port}} {{ip}}") + +[~] Starting Nmap 7.80 ( https://nmap.org ) at 2022-08-19 14:57 IST +NSE: Loaded 151 scripts for scanning. +NSE: Script Pre-scanning. +NSE: Starting runlevel 1 (of 3) scan. +Initiating NSE at 14:57 +Completed NSE at 14:57, 0.00s elapsed +NSE: Starting runlevel 2 (of 3) scan. +Initiating NSE at 14:57 +Completed NSE at 14:57, 0.00s elapsed +NSE: Starting runlevel 3 (of 3) scan. +Initiating NSE at 14:57 +Completed NSE at 14:57, 0.00s elapsed +Initiating Parallel DNS resolution of 1 host. at 14:57 +Completed Parallel DNS resolution of 1 host. at 14:57, 0.02s elapsed +DNS resolution of 1 IPs took 0.02s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0] +Initiating Connect Scan at 14:57 +Scanning 10.10.11.174 [15 ports] +Discovered open port 53/tcp on 10.10.11.174 +Discovered open port 445/tcp on 10.10.11.174 +Discovered open port 135/tcp on 10.10.11.174 +Discovered open port 139/tcp on 10.10.11.174 +Discovered open port 9389/tcp on 10.10.11.174 +Discovered open port 49668/tcp on 10.10.11.174 +Discovered open port 593/tcp on 10.10.11.174 +Discovered open port 49674/tcp on 10.10.11.174 +Discovered open port 464/tcp on 10.10.11.174 +Discovered open port 636/tcp on 10.10.11.174 +Discovered open port 49702/tcp on 10.10.11.174 +Discovered open port 88/tcp on 10.10.11.174 +Discovered open port 49664/tcp on 10.10.11.174 +Discovered open port 389/tcp on 10.10.11.174 +Discovered open port 49679/tcp on 10.10.11.174 +Completed Connect Scan at 14:57, 0.65s elapsed (15 total ports) +Initiating Service scan at 14:57 +Scanning 15 services on 10.10.11.174 +Completed Service scan at 15:00, 151.27s elapsed (15 services on 1 host) +NSE: Script scanning 10.10.11.174. +NSE: Starting runlevel 1 (of 3) scan. +Initiating NSE at 15:00 +Stats: 0:02:39 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan +NSE: Active NSE Script Threads: 7 (7 waiting) +NSE Timing: About 99.65% done; ETC: 15:00 (0:00:00 remaining) +Stats: 0:02:40 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan +NSE: Active NSE Script Threads: 7 (7 waiting) +NSE Timing: About 99.65% done; ETC: 15:00 (0:00:00 remaining) +Stats: 0:02:40 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan +NSE: Active NSE Script Threads: 7 (7 waiting) +NSE Timing: About 99.65% done; ETC: 15:00 (0:00:00 remaining) +NSE Timing: About 99.95% done; ETC: 15:01 (0:00:00 remaining) +Completed NSE at 15:01, 40.06s elapsed +NSE: Starting runlevel 2 (of 3) scan. +Initiating NSE at 15:01 +NSE Timing: About 98.33% done; ETC: 15:01 (0:00:01 remaining) +Completed NSE at 15:02, 60.71s elapsed +NSE: Starting runlevel 3 (of 3) scan. +Initiating NSE at 15:02 +Completed NSE at 15:02, 0.00s elapsed +Nmap scan report for 10.10.11.174 +Host is up, received user-set (0.33s latency). +Scanned at 2022-08-19 14:57:59 IST for 252s + +PORT STATE SERVICE REASON VERSION +53/tcp open domain? syn-ack +| fingerprint-strings: +| DNSVersionBindReqTCP: +| version +|_ bind +88/tcp open kerberos-sec syn-ack Microsoft Windows Kerberos (server time: 2022-08-19 09:28:07Z) +135/tcp open msrpc syn-ack Microsoft Windows RPC +139/tcp open netbios-ssn syn-ack Microsoft Windows netbios-ssn +389/tcp open ldap syn-ack Microsoft Windows Active Directory LDAP (Domain: support.htb0., Site: Default-First-Site-Name) +445/tcp open microsoft-ds? syn-ack +464/tcp open kpasswd5? syn-ack +593/tcp open ncacn_http syn-ack Microsoft Windows RPC over HTTP 1.0 +636/tcp open tcpwrapped syn-ack +9389/tcp open mc-nmf syn-ack .NET Message Framing +49664/tcp open msrpc syn-ack Microsoft Windows RPC +49668/tcp open msrpc syn-ack Microsoft Windows RPC +49674/tcp open ncacn_http syn-ack Microsoft Windows RPC over HTTP 1.0 +49679/tcp open msrpc syn-ack Microsoft Windows RPC +49702/tcp open msrpc syn-ack Microsoft Windows RPC +1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : +SF-Port53-TCP:V=7.80%I=7%D=8/19%Time=62FF57AB%P=x86_64-pc-linux-gnu%r(DNSV +SF:ersionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\ +SF:x04bind\0\0\x10\0\x03"); +Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows + +Host script results: +|_clock-skew: 0s +| p2p-conficker: +| Checking for Conficker.C or higher... +| Check 1 (port 27353/tcp): CLEAN (Timeout) +| Check 2 (port 19493/tcp): CLEAN (Timeout) +| Check 3 (port 45724/udp): CLEAN (Timeout) +| Check 4 (port 4948/udp): CLEAN (Timeout) +|_ 0/4 checks are positive: Host is CLEAN or ports are blocked +| smb2-security-mode: +| 2.02: +|_ Message signing enabled and required +| smb2-time: +| date: 2022-08-19T09:30:33 +|_ start_date: N/A + +NSE: Script Post-scanning. +NSE: Starting runlevel 1 (of 3) scan. +Initiating NSE at 15:02 +Completed NSE at 15:02, 0.00s elapsed +NSE: Starting runlevel 2 (of 3) scan. +Initiating NSE at 15:02 +Completed NSE at 15:02, 0.00s elapsed +NSE: Starting runlevel 3 (of 3) scan. +Initiating NSE at 15:02 +Completed NSE at 15:02, 0.00s elapsed +Read data files from: /usr/bin/../share/nmap +Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . +Nmap done: 1 IP address (1 host up) scanned in 253.00 seconds + -- cgit v1.2.3