diff options
Diffstat (limited to 'Overpass2Hacked/nmap/first')
| -rwxr-xr-x | Overpass2Hacked/nmap/first | 20 |
1 files changed, 20 insertions, 0 deletions
diff --git a/Overpass2Hacked/nmap/first b/Overpass2Hacked/nmap/first new file mode 100755 index 0000000..48f87c3 --- /dev/null +++ b/Overpass2Hacked/nmap/first @@ -0,0 +1,20 @@ +# Nmap 7.80 scan initiated Fri Feb 25 07:48:08 2022 as: nmap -sC -sV -oN nmap/first 10.10.13.215 +Nmap scan report for 10.10.13.215 +Host is up (0.19s latency). +Not shown: 997 closed ports +PORT STATE SERVICE VERSION +22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) +| ssh-hostkey: +| 2048 e4:3a:be:ed:ff:a7:02:d2:6a:d6:d0:bb:7f:38:5e:cb (RSA) +| 256 fc:6f:22:c2:13:4f:9c:62:4f:90:c9:3a:7e:77:d6:d4 (ECDSA) +|_ 256 15:fd:40:0a:65:59:a9:b5:0e:57:1b:23:0a:96:63:05 (ED25519) +80/tcp open http Apache httpd 2.4.29 ((Ubuntu)) +|_http-server-header: Apache/2.4.29 (Ubuntu) +|_http-title: LOL Hacked +2222/tcp open ssh OpenSSH 8.2p1 Debian 4 (protocol 2.0) +| ssh-hostkey: +|_ 2048 a2:a6:d2:18:79:e3:b0:20:a2:4f:aa:b6:ac:2e:6b:f2 (RSA) +Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel + +Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . +# Nmap done at Fri Feb 25 07:49:16 2022 -- 1 IP address (1 host up) scanned in 68.23 seconds |
