┌──(shenzen㉿shenzen)-[~]
└─$ nmap -sn 192.168.56.0/24
Cette commande permet de découvrir la plupart des adresses IP, à partir de ça, on peut lancer un nmap pour découvrir les services disponible dans la machine
Nmap scan report for vagrant-2008R2 (192.168.56.102)
Host is up, received syn-ack (0.0016s latency).
Scanned at 2023-01-05 10:51:22 CET for 127s
Not shown: 978 closed tcp ports (conn-refused)
PORT STATE SERVICE REASON VERSION
21/tcp open ftp syn-ack Microsoft ftpd
| ftp-syst:
|_ SYST: Windows_NT
22/tcp open ssh syn-ack OpenSSH 7.1 (protocol 2.0)
| ssh-hostkey:
| 2048 d37d5f3c62185bacdfa8d040ab9609eb (RSA)
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDnhgQDdn0pYv19PO3Qq04ayfbGlx9ikDLkidLXdLVTVAQsFf+jHbVydHTv1+3yNP8dZNtUrt2MShLXoBxYzXSkiO3zVFtz3BHtD/TvwaPRi7o4uDiOkYhoFeiAiTWchf95Ja2yx2+ZXTVNAfk9eMceWeX663xlxTosS6LHy9kD+KWvevPIQZRtDFu0BL9ez3nOp3uVIyvZumorX9v6E7vr7yH2H0wmQ5qP5Q+5f/5FmksRmgzbWQcH0kVhTaLMw3EyQZVIUS3aGadRUnY2rpIw7mTHS9OCtd3wtkImVUhgCmwFbZJI1lvD1mJAwrknXL5wzczOec2cuC3FwpwO9bQt
| 521 d4d60f3a153a788f0d22cb41d6205725 (ECDSA)
|_ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEqNoisJ25d7/R0GXKWFcuMaK/Eh7h0/Dr2o/pd3htn1inSh0kwWfA8zmiUK+PvLgiwTjTI71d6HEIgE3Iohme40gFuxz+2e894/WLOIGw3kNjTCREKAK3Bm7gl2Oe5KfXcI6y8XWyycQbY9BGzrTjGDG3SKVCNBeGhg8Dz5XBUtuxZUA==
80/tcp open http syn-ack Microsoft IIS httpd 7.5
|_http-title: Site doesn't have a title (text/html).
|_http-server-header: Microsoft-IIS/7.5
| http-methods:
| Supported Methods: OPTIONS TRACE GET HEAD POST
|_ Potentially risky methods: TRACE
135/tcp open msrpc syn-ack Microsoft Windows RPC
139/tcp open netbios-ssn syn-ack Microsoft Windows netbios-ssn
445/tcp open microsoft-ds syn-ack Windows Server 2008 R2 Standard 7601 Service Pack 1 microsoft-ds
3306/tcp open mysql syn-ack MySQL 5.5.20-log
| mysql-info:
| Protocol: 10
| Version: 5.5.20-log
| Thread ID: 8
| Capabilities flags: 63487
| Some Capabilities: DontAllowDatabaseTableColumn, Support41Auth, FoundRows, ConnectWithDatabase, SupportsCompression, Speaks41ProtocolOld, InteractiveClient, SupportsTransactions, IgnoreSigpipes, Speaks41ProtocolNew, ODBCClient, IgnoreSpaceBeforeParenthesis, SupportsLoadDataLocal, LongPassword, LongColumnFlag, SupportsAuthPlugins, SupportsMultipleStatments, SupportsMultipleResults
| Status: Autocommit
| Salt: NGZpDCa@[+a*L!\\.nc%+
|_ Auth Plugin Name: mysql_native_password
3389/tcp open ssl/ms-wbt-server? syn-ack
| ssl-cert: Subject: commonName=vagrant-2008R2
| Issuer: commonName=vagrant-2008R2
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha1WithRSAEncryption
| Not valid before: 2023-01-04T09:34:14
| Not valid after: 2023-07-06T09:34:14
| MD5: fe6153af68e4edc4273ab2c281351a9e
| SHA-1: 6a29211cf4c7b695f00b2d3d30967447c4294f62
| -----BEGIN CERTIFICATE-----
| MIIC4DCCAcigAwIBAgIQdEcXUQCA6KpLwzCt1/zRbDANBgkqhkiG9w0BAQUFADAZ
| MRcwFQYDVQQDEw52YWdyYW50LTIwMDhSMjAeFw0yMzAxMDQwOTM0MTRaFw0yMzA3
| MDYwOTM0MTRaMBkxFzAVBgNVBAMTDnZhZ3JhbnQtMjAwOFIyMIIBIjANBgkqhkiG
| 9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuFvlO9xEiqqjDquUKxMrrsuRDgAXF7tGaaMZ
| 2IxqtvCd31KV21x2FfZ5Nl6GWrZ3yxO8HD8YlS61x5uYqO3f1h9NtjMwbqLWSIeM
| N4F1bT/Ohz8t9+TsRUwJ6Tfj9YkurZ3E8fkWBcd0zgZggwmagKDJ9LCEWywDIftR
| 2SKxyWsJmqlX1+RggE0ZQXQ7BFixlm6/8RMW2Q1O6KUV0mZWy6RBnmLoeOvSokkH
| C2UvBsr2fwZ0fTpGRjqBBJBmxLVxHG2pduwBDb5ay/ffmNLGSap9su8GjyTRKrkR
| uoBgqP3GfwykjcjKiK+21KAn+5oLsb54E8DmPy+hJchX0FjsxQIDAQABoyQwIjAT
| BgNVHSUEDDAKBggrBgEFBQcDATALBgNVHQ8EBAMCBDAwDQYJKoZIhvcNAQEFBQAD
| ggEBAFS/UU9e+0H5EA6QN4iNe9Rnb9j8B4qztHbXoj5oyVXMDLs0dxGO/rvPxiOS
| 3goP0U4Sues71MMa5W3z0WZ0bm8fHYWVnScOGepFUOIG/ZXvcv8EvSffvLpsX0+v
| 78JJWg2gl9fO22DEMtCLvo/tSzv8/kKZKOyRgSD7ALVuVpF/ZAAg9YVTty/eLy+z
| qiwdVXzPWKVjH53RmXtAlH42HU/wmboDPhPv6XNzX6swYW/BH7PhPfI2Dwi4V6iH
| h6hF0S6aZkmVpWJEO94vd+JuEFTyxB/k2ujaR4Kh4eU9vizcwInHixHUI6R0TCCo
| GTho3nnWLtwpfv8S5UjVF46Cy60=
|_-----END CERTIFICATE-----
| rdp-ntlm-info:
| Target_Name: VAGRANT-2008R2
| NetBIOS_Domain_Name: VAGRANT-2008R2
| NetBIOS_Computer_Name: VAGRANT-2008R2
| DNS_Domain_Name: vagrant-2008R2
| DNS_Computer_Name: vagrant-2008R2
| Product_Version: 6.1.7601
|_ System_Time: 2023-01-05T09:53:08+00:00
|_ssl-date: 2023-01-05T09:53:28+00:00; 0s from scanner time.
4848/tcp open ssl/http syn-ack Oracle GlassFish 4.0 (Servlet 3.1; JSP 2.3; Java 1.8)
|_http-title: Login
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-favicon: Unknown favicon MD5: 86CBC68E21D5E9D0A61191516A1F2281
|_http-server-header: GlassFish Server Open Source Edition 4.0
|_ssl-date: 2023-01-05T09:53:28+00:00; 0s from scanner time.
| ssl-cert: Subject: commonName=localhost/organizationName=Oracle Corporation/stateOrProvinceName=California/countryName=US/localityName=Santa Clara/organizationalUnitName=GlassFish
| Issuer: commonName=localhost/organizationName=Oracle Corporation/stateOrProvinceName=California/countryName=US/localityName=Santa Clara/organizationalUnitName=GlassFish
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2013-05-15T05:33:38
| Not valid after: 2023-05-13T05:33:38
| MD5: 790dfccf99322bbe7736404a14e12d91
| SHA-1: 4a5758f59279e82f2a913c83ca658d6964575a72
| -----BEGIN CERTIFICATE-----
| MIIDmTCCAoGgAwIBAgIEBKmXLzANBgkqhkiG9w0BAQsFADB9MQswCQYDVQQGEwJV
| UzETMBEGA1UECBMKQ2FsaWZvcm5pYTEUMBIGA1UEBxMLU2FudGEgQ2xhcmExGzAZ
| BgNVBAoTEk9yYWNsZSBDb3Jwb3JhdGlvbjESMBAGA1UECxMJR2xhc3NGaXNoMRIw
| EAYDVQQDEwlsb2NhbGhvc3QwHhcNMTMwNTE1MDUzMzM4WhcNMjMwNTEzMDUzMzM4
| WjB9MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEUMBIGA1UEBxML
| U2FudGEgQ2xhcmExGzAZBgNVBAoTEk9yYWNsZSBDb3Jwb3JhdGlvbjESMBAGA1UE
| CxMJR2xhc3NGaXNoMRIwEAYDVQQDEwlsb2NhbGhvc3QwggEiMA0GCSqGSIb3DQEB
| AQUAA4IBDwAwggEKAoIBAQDS0uc7ZnLAkSc2RGR8fR3OXzgQR7XJiBBkJi8RR1GX
| gePHIrAEz582eVtF9MHIwOaw4pMagVfAoh4Sws/OEfMLw9ZuTGvM3ygE8BM85b1O
| clKs1Fp+B9QaMoLssp1TgMX/BXtescdKwmKytWeAVkwGFXVqgf/0e4Gxjc8q12Sl
| G6LysTSIc2d9PbDmNmp6VSSebhjky1CqJ8IRGIibEGEbbyu9+NWu7xUE6que6HT6
| jOQ+1h+usmHoDFL+5cazNPpiqRB2wRFOXuHA4NwYN/UqcCmVURvIyovqrg5zb0r2
| 6xX6VO+yM1Nj++EKtAYkXXSEolflO6ikRFkmWOkkXK6hAgMBAAGjITAfMB0GA1Ud
| DgQWBBRMBYK9jAK4BQAEFAr7Kar3SGzLhjANBgkqhkiG9w0BAQsFAAOCAQEAEzjp
| mBaRpqKlmWTxSf3BKw3dicdBaB3+O88f7EeEcw5b4e2us+lny5RkPms4AdKppef7
| GhKxOzb+CLKj/NsBS8bEQ96olkppEVCFzYZknJgnoxfyzeFTYibP4lSm3aWGElky
| DMyFMUMgO6O6k3jAgtzVGpVsPfxJH5m8HSjaulBeEpSlEaysGOPaWJzWMlmZK02s
| xWh65ebMPpsQx63prp7AYnvQrZsEY5LYVPdLgqtLhffvNS1KVqJwNv3kSNWNzx/H
| KTCRtJtgGc/6THvz+C6QS2vg78aziDHiYLZYjVpO17CXa5oLchJd+L51SuZTjWZu
| qtKcWJ/UJe3j9BhODA==
|_-----END CERTIFICATE-----
7676/tcp open java-message-service syn-ack Java Message Service 301
8080/tcp open http syn-ack Sun GlassFish Open Source Edition 4.0
| http-methods:
| Supported Methods: GET HEAD POST PUT DELETE TRACE OPTIONS
|_ Potentially risky methods: PUT DELETE TRACE
|_http-open-proxy: Proxy might be redirecting requests
|_http-title: Site doesn't have a title (text/html).
|_http-server-header: GlassFish Server Open Source Edition 4.0
8181/tcp open ssl/intermapper? syn-ack
|_ssl-date: 2023-01-05T09:53:28+00:00; 0s from scanner time.
| fingerprint-strings:
| GetRequest:
| HTTP/1.1 200 OK
| Date: Thu, 05 Jan 2023 09:51:45 GMT
| Content-Type: text/html
| Connection: close
| Content-Length: 4626
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
| <html lang="en">
| <!--
| ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
| Copyright (c) 2010, 2013 Oracle and/or its affiliates. All rights reserved.
| subject to License Terms
| <head>
| <style type="text/css">
| body{margin-top:0}
| body,td,p,div,span,a,ul,ul li, ol, ol li, ol li b, dl,h1,h2,h3,h4,h5,h6,li {font-family:geneva,helvetica,arial,"lucida sans",sans-serif; font-size:10pt}
| {font-size:18pt}
| {font-size:14pt}
| {font-size:12pt}
| code,kbd,tt,pre {font-family:monaco,courier,"courier new"; font-size:10pt;}
| {padding-bottom: 8px}
| p.copy, p.copy a {font-family:geneva,helvetica,arial,"lucida sans",sans-serif; font-size:8pt}
| p.copy {text-align: center}
| table.grey1,tr.grey1,td.g
| HTTPOptions:
| HTTP/1.1 405 Method Not Allowed
| Allow: GET
| Date: Thu, 05 Jan 2023 09:51:45 GMT
| Connection: close
| Content-Length: 0
| RTSPRequest:
| HTTP/1.1 505 HTTP Version Not Supported
| Date: Thu, 05 Jan 2023 09:51:45 GMT
| Connection: close
|_ Content-Length: 0
| ssl-cert: Subject: commonName=localhost/organizationName=Oracle Corporation/stateOrProvinceName=California/countryName=US/localityName=Santa Clara/organizationalUnitName=GlassFish
| Issuer: commonName=localhost/organizationName=Oracle Corporation/stateOrProvinceName=California/countryName=US/localityName=Santa Clara/organizationalUnitName=GlassFish
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2013-05-15T05:33:38
| Not valid after: 2023-05-13T05:33:38
| MD5: 790dfccf99322bbe7736404a14e12d91
| SHA-1: 4a5758f59279e82f2a913c83ca658d6964575a72
| -----BEGIN CERTIFICATE-----
| MIIDmTCCAoGgAwIBAgIEBKmXLzANBgkqhkiG9w0BAQsFADB9MQswCQYDVQQGEwJV
| UzETMBEGA1UECBMKQ2FsaWZvcm5pYTEUMBIGA1UEBxMLU2FudGEgQ2xhcmExGzAZ
| BgNVBAoTEk9yYWNsZSBDb3Jwb3JhdGlvbjESMBAGA1UECxMJR2xhc3NGaXNoMRIw
| EAYDVQQDEwlsb2NhbGhvc3QwHhcNMTMwNTE1MDUzMzM4WhcNMjMwNTEzMDUzMzM4
| WjB9MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEUMBIGA1UEBxML
| U2FudGEgQ2xhcmExGzAZBgNVBAoTEk9yYWNsZSBDb3Jwb3JhdGlvbjESMBAGA1UE
| CxMJR2xhc3NGaXNoMRIwEAYDVQQDEwlsb2NhbGhvc3QwggEiMA0GCSqGSIb3DQEB
| AQUAA4IBDwAwggEKAoIBAQDS0uc7ZnLAkSc2RGR8fR3OXzgQR7XJiBBkJi8RR1GX
| gePHIrAEz582eVtF9MHIwOaw4pMagVfAoh4Sws/OEfMLw9ZuTGvM3ygE8BM85b1O
| clKs1Fp+B9QaMoLssp1TgMX/BXtescdKwmKytWeAVkwGFXVqgf/0e4Gxjc8q12Sl
| G6LysTSIc2d9PbDmNmp6VSSebhjky1CqJ8IRGIibEGEbbyu9+NWu7xUE6que6HT6
| jOQ+1h+usmHoDFL+5cazNPpiqRB2wRFOXuHA4NwYN/UqcCmVURvIyovqrg5zb0r2
| 6xX6VO+yM1Nj++EKtAYkXXSEolflO6ikRFkmWOkkXK6hAgMBAAGjITAfMB0GA1Ud
| DgQWBBRMBYK9jAK4BQAEFAr7Kar3SGzLhjANBgkqhkiG9w0BAQsFAAOCAQEAEzjp
| mBaRpqKlmWTxSf3BKw3dicdBaB3+O88f7EeEcw5b4e2us+lny5RkPms4AdKppef7
| GhKxOzb+CLKj/NsBS8bEQ96olkppEVCFzYZknJgnoxfyzeFTYibP4lSm3aWGElky
| DMyFMUMgO6O6k3jAgtzVGpVsPfxJH5m8HSjaulBeEpSlEaysGOPaWJzWMlmZK02s
| xWh65ebMPpsQx63prp7AYnvQrZsEY5LYVPdLgqtLhffvNS1KVqJwNv3kSNWNzx/H
| KTCRtJtgGc/6THvz+C6QS2vg78aziDHiYLZYjVpO17CXa5oLchJd+L51SuZTjWZu
| qtKcWJ/UJe3j9BhODA==
|_-----END CERTIFICATE-----
8383/tcp open http syn-ack Apache httpd
| http-methods:
|_ Supported Methods: GET HEAD POST
|_http-title: 400 Bad Request
|_http-server-header: Apache
9200/tcp open wap-wsp? syn-ack
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.0 400 Bad Request
| Content-Type: text/plain; charset=UTF-8
| Content-Length: 80
| handler found for uri [/nice%20ports%2C/Tri%6Eity.txt%2ebak] and method [GET]
| GetRequest:
| HTTP/1.0 200 OK
| Content-Type: application/json; charset=UTF-8
| Content-Length: 305
| "status" : 200,
| "name" : "Horus",
| "version" : {
| "number" : "1.1.1",
| "build_hash" : "f1585f096d3f3985e73456debdc1a0745f512bbc",
| "build_timestamp" : "2014-04-16T14:27:12Z",
| "build_snapshot" : false,
| "lucene_version" : "4.7"
| "tagline" : "You Know, for Search"
| HTTPOptions:
| HTTP/1.0 200 OK
| Content-Type: text/plain; charset=UTF-8
| Content-Length: 0
| RTSPRequest, SIPOptions:
| HTTP/1.1 200 OK
| Content-Type: text/plain; charset=UTF-8
|_ Content-Length: 0
49152/tcp open msrpc syn-ack Microsoft Windows RPC
49153/tcp open msrpc syn-ack Microsoft Windows RPC
49154/tcp open msrpc syn-ack Microsoft Windows RPC
49155/tcp open msrpc syn-ack Microsoft Windows RPC
49156/tcp open msrpc syn-ack Microsoft Windows RPC
49157/tcp open msrpc syn-ack Microsoft Windows RPC
49158/tcp open java-rmi syn-ack Java RMI
49159/tcp open tcpwrapped syn-ack
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at <https://nmap.org/cgi-bin/submit.cgi?new-service> :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port8181-TCP:V=7.93%T=SSL%I=7%D=1/5%Time=63B69DB1%P=x86_64-pc-linux-gnu
SF:%r(GetRequest,128C,"HTTP/1\\.1\\x20200\\x20OK\\r\\nDate:\\x20Thu,\\x2005\\x20Ja
SF:n\\x202023\\x2009:51:45\\x20GMT\\r\\nContent-Type:\\x20text/html\\r\\nConnectio
SF:n:\\x20close\\r\\nContent-Length:\\x204626\\r\\n\\r\\n<!DOCTYPE\\x20HTML\\x20PUBL
SF:IC\\x20\\"-//W3C//DTD\\x20HTML\\x204\\.01\\x20Transitional//EN\\">\\n<html\\x20l
SF:ang=\\"en\\">\\n<!--\\nDO\\x20NOT\\x20ALTER\\x20OR\\x20REMOVE\\x20COPYRIGHT\\x20N
SF:OTICES\\x20OR\\x20THIS\\x20HEADER\\.\\n\\nCopyright\\x20\\(c\\)\\x202010,\\x202013
SF:\\x20Oracle\\x20and/or\\x20its\\x20affiliates\\.\\x20All\\x20rights\\x20reserve
SF:d\\.\\n\\nUse\\x20is\\x20subject\\x20to\\x20License\\x20Terms\\n-->\\n<head>\\n<st
SF:yle\\x20type=\\"text/css\\">\\n\\tbody{margin-top:0}\\n\\tbody,td,p,div,span,a
SF:,ul,ul\\x20li,\\x20ol,\\x20ol\\x20li,\\x20ol\\x20li\\x20b,\\x20dl,h1,h2,h3,h4,h
SF:5,h6,li\\x20{font-family:geneva,helvetica,arial,\\"lucida\\x20sans\\",sans-
SF:serif;\\x20font-size:10pt}\\n\\th1\\x20{font-size:18pt}\\n\\th2\\x20{font-size
SF::14pt}\\n\\th3\\x20{font-size:12pt}\\n\\tcode,kbd,tt,pre\\x20{font-family:mon
SF:aco,courier,\\"courier\\x20new\\";\\x20font-size:10pt;}\\n\\tli\\x20{padding-b
SF:ottom:\\x208px}\\n\\tp\\.copy,\\x20p\\.copy\\x20a\\x20{font-family:geneva,helve
SF:tica,arial,\\"lucida\\x20sans\\",sans-serif;\\x20font-size:8pt}\\n\\tp\\.copy\\
SF:x20{text-align:\\x20center}\\n\\ttable\\.grey1,tr\\.grey1,td\\.g")%r(HTTPOpti
SF:ons,7A,"HTTP/1\\.1\\x20405\\x20Method\\x20Not\\x20Allowed\\r\\nAllow:\\x20GET\\r
SF:\\nDate:\\x20Thu,\\x2005\\x20Jan\\x202023\\x2009:51:45\\x20GMT\\r\\nConnection:\\
SF:x20close\\r\\nContent-Length:\\x200\\r\\n\\r\\n")%r(RTSPRequest,76,"HTTP/1\\.1\\
SF:x20505\\x20HTTP\\x20Version\\x20Not\\x20Supported\\r\\nDate:\\x20Thu,\\x2005\\x2
SF:0Jan\\x202023\\x2009:51:45\\x20GMT\\r\\nConnection:\\x20close\\r\\nContent-Leng
SF:th:\\x200\\r\\n\\r\\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port9200-TCP:V=7.93%I=7%D=1/5%Time=63B69DA6%P=x86_64-pc-linux-gnu%r(Get
SF:Request,188,"HTTP/1\\.0\\x20200\\x20OK\\r\\nContent-Type:\\x20application/jso
SF:n;\\x20charset=UTF-8\\r\\nContent-Length:\\x20305\\r\\n\\r\\n{\\r\\n\\x20\\x20\\"sta
SF:tus\\"\\x20:\\x20200,\\r\\n\\x20\\x20\\"name\\"\\x20:\\x20\\"Horus\\",\\r\\n\\x20\\x20\\"
SF:version\\"\\x20:\\x20{\\r\\n\\x20\\x20\\x20\\x20\\"number\\"\\x20:\\x20\\"1\\.1\\.1\\",\\
SF:r\\n\\x20\\x20\\x20\\x20\\"build_hash\\"\\x20:\\x20\\"f1585f096d3f3985e73456debdc
SF:1a0745f512bbc\\",\\r\\n\\x20\\x20\\x20\\x20\\"build_timestamp\\"\\x20:\\x20\\"2014-
SF:04-16T14:27:12Z\\",\\r\\n\\x20\\x20\\x20\\x20\\"build_snapshot\\"\\x20:\\x20false,
SF:\\r\\n\\x20\\x20\\x20\\x20\\"lucene_version\\"\\x20:\\x20\\"4\\.7\\"\\r\\n\\x20\\x20},\\r
SF:\\n\\x20\\x20\\"tagline\\"\\x20:\\x20\\"You\\x20Know,\\x20for\\x20Search\\"\\r\\n}\\n"
SF:)%r(HTTPOptions,4F,"HTTP/1\\.0\\x20200\\x20OK\\r\\nContent-Type:\\x20text/pla
SF:in;\\x20charset=UTF-8\\r\\nContent-Length:\\x200\\r\\n\\r\\n")%r(RTSPRequest,4F
SF:,"HTTP/1\\.1\\x20200\\x20OK\\r\\nContent-Type:\\x20text/plain;\\x20charset=UTF
SF:-8\\r\\nContent-Length:\\x200\\r\\n\\r\\n")%r(FourOhFourRequest,A9,"HTTP/1\\.0\\
SF:x20400\\x20Bad\\x20Request\\r\\nContent-Type:\\x20text/plain;\\x20charset=UTF
SF:-8\\r\\nContent-Length:\\x2080\\r\\n\\r\\nNo\\x20handler\\x20found\\x20for\\x20uri
SF:\\x20\\[/nice%20ports%2C/Tri%6Eity\\.txt%2ebak\\]\\x20and\\x20method\\x20\\[GET
SF:\\]")%r(SIPOptions,4F,"HTTP/1\\.1\\x20200\\x20OK\\r\\nContent-Type:\\x20text/p
SF:lain;\\x20charset=UTF-8\\r\\nContent-Length:\\x200\\r\\n\\r\\n");
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows
Host script results:
|_clock-skew: mean: 1h08m34s, deviation: 3h01m26s, median: 0s
| smb-os-discovery:
| OS: Windows Server 2008 R2 Standard 7601 Service Pack 1 (Windows Server 2008 R2 Standard 6.1)
| OS CPE: cpe:/o:microsoft:windows_server_2008::sp1
| Computer name: vagrant-2008R2
| NetBIOS computer name: VAGRANT-2008R2\\x00
| Workgroup: WORKGROUP\\x00
|_ System time: 2023-01-05T01:53:09-08:00
| nbstat: NetBIOS name: VAGRANT-2008R2, NetBIOS user: <unknown>, NetBIOS MAC: 080027084396 (Oracle VirtualBox virtual NIC)
| Names:
| VAGRANT-2008R2<00> Flags: <unique><active>
| WORKGROUP<00> Flags: <group><active>
| VAGRANT-2008R2<20> Flags: <unique><active>
| Statistics:
| 0800270843960000000000000000000000
| 0000000000000000000000000000000000
|_ 0000000000000000000000000000
| smb2-time:
| date: 2023-01-05T09:53:07
|_ start_date: 2023-01-05T09:34:09
| p2p-conficker:
| Checking for Conficker.C or higher...
| Check 1 (port 60451/tcp): CLEAN (Couldn't connect)
| Check 2 (port 50063/tcp): CLEAN (Couldn't connect)
| Check 3 (port 34474/udp): CLEAN (Failed to receive data)
| Check 4 (port 48130/udp): CLEAN (Timeout)
|_ 0/4 checks are positive: Host is CLEAN or ports are blocked
| smb-security-mode:
| account_used: <blank>
| authentication_level: user
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
| smb2-security-mode:
| 210:
|_ Message signing enabled but not required
Vulnérabilité faille FTP Windows 2008
Accès SSH au serveur Windows 2008
Vulnérabilités site web de la machine Windows avec GlassFish