.----. .-. .-. .----..---.  .----. .---.   .--.  .-. .-. | {}  }| { } |{ {__ {_   _}{ {__  /  ___} / {} \ |  `| | | .-. \| {_} |.-._} } | |  .-._} }\     }/  /\  \| |\  | `-' `-'`-----'`----'  `-'  `----'  `---' `-'  `-'`-' `-' The Modern Day Port Scanner. ________________________________________ : https://discord.gg/GFrQsGy           : : https://github.com/RustScan/RustScan :  -------------------------------------- Real hackers hack time ⌛ [~] The config file is expected to be at "/home/compromyse/.rustscan.toml" [~] Automatically increasing ulimit value to 5000. Open 10.10.11.174:53 Open 10.10.11.174:88 Open 10.10.11.174:135 Open 10.10.11.174:139 Open 10.10.11.174:389 Open 10.10.11.174:464 Open 10.10.11.174:593 Open 10.10.11.174:636 Open 10.10.11.174:445 Open 10.10.11.174:9389 Open 10.10.11.174:49668 Open 10.10.11.174:49664 Open 10.10.11.174:49674 Open 10.10.11.174:49679 Open 10.10.11.174:49702 [~] Starting Script(s) [>] Script to be run Some("nmap -vvv -p {{port}} {{ip}}") [~] Starting Nmap 7.80 ( https://nmap.org ) at 2022-08-19 14:57 IST NSE: Loaded 151 scripts for scanning. NSE: Script Pre-scanning. NSE: Starting runlevel 1 (of 3) scan. Initiating NSE at 14:57 Completed NSE at 14:57, 0.00s elapsed NSE: Starting runlevel 2 (of 3) scan. Initiating NSE at 14:57 Completed NSE at 14:57, 0.00s elapsed NSE: Starting runlevel 3 (of 3) scan. Initiating NSE at 14:57 Completed NSE at 14:57, 0.00s elapsed Initiating Parallel DNS resolution of 1 host. at 14:57 Completed Parallel DNS resolution of 1 host. at 14:57, 0.02s elapsed DNS resolution of 1 IPs took 0.02s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0] Initiating Connect Scan at 14:57 Scanning 10.10.11.174 [15 ports] Discovered open port 53/tcp on 10.10.11.174 Discovered open port 445/tcp on 10.10.11.174 Discovered open port 135/tcp on 10.10.11.174 Discovered open port 139/tcp on 10.10.11.174 Discovered open port 9389/tcp on 10.10.11.174 Discovered open port 49668/tcp on 10.10.11.174 Discovered open port 593/tcp on 10.10.11.174 Discovered open port 49674/tcp on 10.10.11.174 Discovered open port 464/tcp on 10.10.11.174 Discovered open port 636/tcp on 10.10.11.174 Discovered open port 49702/tcp on 10.10.11.174 Discovered open port 88/tcp on 10.10.11.174 Discovered open port 49664/tcp on 10.10.11.174 Discovered open port 389/tcp on 10.10.11.174 Discovered open port 49679/tcp on 10.10.11.174 Completed Connect Scan at 14:57, 0.65s elapsed (15 total ports) Initiating Service scan at 14:57 Scanning 15 services on 10.10.11.174 Completed Service scan at 15:00, 151.27s elapsed (15 services on 1 host) NSE: Script scanning 10.10.11.174. NSE: Starting runlevel 1 (of 3) scan. Initiating NSE at 15:00 Stats: 0:02:39 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan NSE: Active NSE Script Threads: 7 (7 waiting) NSE Timing: About 99.65% done; ETC: 15:00 (0:00:00 remaining) Stats: 0:02:40 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan NSE: Active NSE Script Threads: 7 (7 waiting) NSE Timing: About 99.65% done; ETC: 15:00 (0:00:00 remaining) Stats: 0:02:40 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan NSE: Active NSE Script Threads: 7 (7 waiting) NSE Timing: About 99.65% done; ETC: 15:00 (0:00:00 remaining) NSE Timing: About 99.95% done; ETC: 15:01 (0:00:00 remaining) Completed NSE at 15:01, 40.06s elapsed NSE: Starting runlevel 2 (of 3) scan. Initiating NSE at 15:01 NSE Timing: About 98.33% done; ETC: 15:01 (0:00:01 remaining) Completed NSE at 15:02, 60.71s elapsed NSE: Starting runlevel 3 (of 3) scan. Initiating NSE at 15:02 Completed NSE at 15:02, 0.00s elapsed Nmap scan report for 10.10.11.174 Host is up, received user-set (0.33s latency). Scanned at 2022-08-19 14:57:59 IST for 252s PORT STATE SERVICE REASON VERSION 53/tcp open domain? syn-ack | fingerprint-strings: | DNSVersionBindReqTCP: | version |_ bind 88/tcp open kerberos-sec syn-ack Microsoft Windows Kerberos (server time: 2022-08-19 09:28:07Z) 135/tcp open msrpc syn-ack Microsoft Windows RPC 139/tcp open netbios-ssn syn-ack Microsoft Windows netbios-ssn 389/tcp open ldap syn-ack Microsoft Windows Active Directory LDAP (Domain: support.htb0., Site: Default-First-Site-Name) 445/tcp open microsoft-ds? syn-ack 464/tcp open kpasswd5? syn-ack 593/tcp open ncacn_http syn-ack Microsoft Windows RPC over HTTP 1.0 636/tcp open tcpwrapped syn-ack 9389/tcp open mc-nmf syn-ack .NET Message Framing 49664/tcp open msrpc syn-ack Microsoft Windows RPC 49668/tcp open msrpc syn-ack Microsoft Windows RPC 49674/tcp open ncacn_http syn-ack Microsoft Windows RPC over HTTP 1.0 49679/tcp open msrpc syn-ack Microsoft Windows RPC 49702/tcp open msrpc syn-ack Microsoft Windows RPC 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port53-TCP:V=7.80%I=7%D=8/19%Time=62FF57AB%P=x86_64-pc-linux-gnu%r(DNSV SF:ersionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\ SF:x04bind\0\0\x10\0\x03"); Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows Host script results: |_clock-skew: 0s | p2p-conficker: | Checking for Conficker.C or higher... | Check 1 (port 27353/tcp): CLEAN (Timeout) | Check 2 (port 19493/tcp): CLEAN (Timeout) | Check 3 (port 45724/udp): CLEAN (Timeout) | Check 4 (port 4948/udp): CLEAN (Timeout) |_ 0/4 checks are positive: Host is CLEAN or ports are blocked | smb2-security-mode: | 2.02: |_ Message signing enabled and required | smb2-time: | date: 2022-08-19T09:30:33 |_ start_date: N/A NSE: Script Post-scanning. NSE: Starting runlevel 1 (of 3) scan. Initiating NSE at 15:02 Completed NSE at 15:02, 0.00s elapsed NSE: Starting runlevel 2 (of 3) scan. Initiating NSE at 15:02 Completed NSE at 15:02, 0.00s elapsed NSE: Starting runlevel 3 (of 3) scan. Initiating NSE at 15:02 Completed NSE at 15:02, 0.00s elapsed Read data files from: /usr/bin/../share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 253.00 seconds