My first time using nmap
by - Thursday, January 1, 1970 at 12:00 AM
C:\Users\PC>nmap -T4 -A -v 192.168.1.1Starting Nmap 7.93 ( https://nmap.org ) at 2022-10-22 14:13 SE Asia Standard TimeNSOCK ERROR [0.3680s] ssl_init_helper(): OpenSSL legacy provider failed to load.NSE: Loaded 155 scripts for scanning.NSE: Script Pre-scanning.Initiating NSE at 14:13Completed NSE at 14:13, 0.00s elapsedInitiating NSE at 14:13Completed NSE at 14:13, 0.00s elapsedInitiating NSE at 14:13Completed NSE at 14:13, 0.00s elapsedInitiating Ping Scan at 14:13Scanning 192.168.1.1 [4 ports]Completed Ping Scan at 14:13, 0.03s elapsed (1 total hosts)Initiating Parallel DNS resolution of 1 host. at 14:13Completed Parallel DNS resolution of 1 host. at 14:13, 0.00s elapsedInitiating SYN Stealth Scan at 14:13Scanning csp3.zte.com.cn (192.168.1.1) [1000 ports]Discovered open port 80/tcp on 192.168.1.1Discovered open port 53/tcp on 192.168.1.1Discovered open port 443/tcp on 192.168.1.1Completed SYN Stealth Scan at 14:13, 2.06s elapsed (1000 total ports)Initiating Service scan at 14:13Scanning 3 services on csp3.zte.com.cn (192.168.1.1)Completed Service scan at 14:13, 14.99s elapsed (3 services on 1 host)Initiating OS detection (try #1) against csp3.zte.com.cn (192.168.1.1)Initiating Traceroute at 14:13Completed Traceroute at 14:13, 0.03s elapsedInitiating Parallel DNS resolution of 1 host. at 14:13Completed Parallel DNS resolution of 1 host. at 14:13, 0.00s elapsedNSE: Script scanning 192.168.1.1.Initiating NSE at 14:13Completed NSE at 14:14, 8.64s elapsedInitiating NSE at 14:14Completed NSE at 14:14, 0.72s elapsedInitiating NSE at 14:14Completed NSE at 14:14, 0.00s elapsedNmap scan report for csp3.zte.com.cn (192.168.1.1)Host is up (0.0029s latency).Not shown: 996 closed tcp ports (reset)PORT STATE SERVICE VERSION23/tcp filtered telnet53/tcp open domain Unbound80/tcp open http| fingerprint-strings:| GetRequest:| HTTP/1.0 200 OK| Server:| Accept-Ranges: bytes| Connection: close| Content-Type: text/html; charset=utf-8| X-Content-Type-Options: nosniff| X-XSS-Protection: 1; mode=block| Content-Security-Policy: default-src 'self' 'unsafe-inline' 'unsafe-eval' data:| Cache-Control: no-cache,no-store| Pragma: no-cache| Content-Length: 9080| Set-Cookie: _TESTCOOKIESUPPORT=1; PATH=/; HttpOnly| X-Frame-Options: DENY| | | | | | F670| | |

400 Bad Request

| Your request has bad syntax or is inherently impossible to satisfy.| |_ | http-methods:|_ Supported Methods: GET HEAD POST|_http-title: F670|_http-server-header: 443/tcp open ssl/https| fingerprint-strings:| FourOhFourRequest:| HTTP/1.0 404 Not Found| Server:| Accept-Ranges: bytes| Connection: close| Content-Type: text/html; charset=utf-8| X-Content-Type-Options: nosniff| X-XSS-Protection: 1; mode=block| Content-Security-Policy: default-src 'self' 'unsafe-inline' 'unsafe-eval' data:| Cache-Control: no-cache,no-store| Pragma: no-cache| | 404 Not Found| |

404 Not Found

| requested URL was not found on this server.| | | GetRequest:| HTTP/1.0 200 OK| Server:| Accept-Ranges: bytes| Connection: close| Content-Type: text/html; charset=utf-8| X-Content-Type-Options: nosniff| X-XSS-Protection: 1; mode=block| Content-Security-Policy: default-src 'self' 'unsafe-inline' 'unsafe-eval' data:| Cache-Control: no-cache,no-store| Pragma: no-cache| Content-Length: 9080| Set-Cookie: _TESTCOOKIESUPPORT=1; PATH=/; HttpOnly; Secure| X-Frame-Options: DENY| | | | | | F670| |_ \SF:nF670\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20SF:\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x2SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20SF:400\x20Bad\x20Request\x20\x20\x20\x20\x20\x20\xSF:20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20SF:\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\xSF:20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20SF:\x20\x20

400\x20Bad\x20Request

Your\x20request\x20has\x20bad\xSF:20syntax\x20or\x20is\x20inherently\x20impossible\x20to\x20satisfy\.");==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============SF-Port443-TCP:V=7.93%T=SSL%I=7%D=10/22%Time=63539829%P=i686-pc-windows-wiSF:ndows%r(GetRequest,2516,"HTTP/1\.0\x20200\x20OKServer:\x20AccepSF:t-Ranges:\x20bytesConnection:\x20closeContent-Type:\x20text/htmSF:l;\x20charset=utf-8X-Content-Type-Options:\x20nosniffX-XSS-ProtSF:ection:\x201;\x20mode=blockContent-Security-Policy:\x20default-src\SF:x20'self'\x20'unsafe-inline'\x20'unsafe-eval'\x20data:Cache-ControlSF::\x20no-cache,no-storePragma:\x20no-cacheContent-Length:\x20908SF:0Set-Cookie:\x20_TESTCOOKIESUPPORT=1;\x20PATH=/;\x20HttpOnly;\x20SeSF:cureX-Frame-Options:\x20DENYF670\x20\x20\x20\x20\x20\x20\x20\x20\xSF:20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20SF:\x20\x20404\x20Not\x20Found\x20\x20\x20\xSF:20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20SF:\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\xSF:20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20SF:\x20\x20\x20\x20\x20

404\x20Not\x20Found

The\x20requested\x20USF:RL\x20was\x20not\x20found\x20on\x20this\x20server\.SF:");Device type: general purposeRunning: Linux 2.6.X|3.XOS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3OS details: Linux 2.6.32 - 3.13Uptime guess: 25.155 days (since Tue Sep 27 10:30:06 2022)Network Distance: 2 hopsTCP Sequence Prediction: Difficulty=260 (Good luck!)IP ID Sequence Generation: All zerosTRACEROUTE (using port 199/tcp)HOP RTT ADDRESS1 6.00 ms 192.168.80.1 (192.168.80.1)2 6.00 ms csp3.zte.com.cn (192.168.1.1)NSE: Script Post-scanning.Initiating NSE at 14:14Completed NSE at 14:14, 0.01s elapsedInitiating NSE at 14:14Completed NSE at 14:14, 0.00s elapsedInitiating NSE at 14:14Completed NSE at 14:14, 0.00s elapsedRead data files from: C:\Program Files (x86)\NmapOS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in 30.79 seconds Raw packets sent: 1040 (46.594KB) | Rcvd: 1028 (41.878KB)
Reply


 Users viewing this thread: My first time using nmap: No users currently viewing.