CS计算机代考程序代写 python Additional scanning samples

Additional scanning samples

Table of Contents
192.168.128.108 2
192.168.128.68 3
192.168.128.128 6
192.168.128.61 7
192.168.128.98 (1st attempt ) 8
192.168.128.98 (2nd attempt ) 9
10.0.0.8 (1st attempt) 10
10.0.0.8 (2nd attempt) 11
10.0.0.* 12

192.168.128.108

$ sudo nmap -O -sV -p- 192.168.128.108 -T 4 1 ⨯
[sudo] password for kali:
Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-04 10:34 EST
Nmap scan report for 192.168.128.108
Host is up (0.0035s latency).
Not shown: 65531 closed ports
PORT STATE SERVICE VERSION
8008/tcp open http?
8009/tcp open ssl/castv2 Ninja Sphere Chromecast driver
8443/tcp open ssl/https-alt?
9000/tcp open ssl/cslistener?
Device type: VoIP phone|webcam|specialized|firewall|general purpose|media device
Running (JUST GUESSING): Grandstream embedded (92%), Garmin embedded (89%), 2N embedded (89%), FireBrick embedded (87%), Enlogic embedded (86%), lwIP 1.4.X (86%), NodeMCU embedded (85%), OpenBox embedded (85%)
OS CPE: cpe:/h:grandstream:gxp1105 cpe:/h:garmin:virb_elite cpe:/h:2n:helios cpe:/h:firebrick:fb2700 cpe:/a:lwip_project:lwip cpe:/a:lwip_project:lwip:1.4.0 cpe:/o:nodemcu:nodemcu cpe:/h:openbox:s10
Aggressive OS guesses: Grandstream GXP1105 VoIP phone (92%), Garmin Virb Elite action camera (89%), 2N Helios IP VoIP doorbell (89%), FireBrick FB2700 firewall (87%), Enlogic PDU (FreeRTOS/lwIP) (86%), lwIP 1.4.0 lightweight TCP/IP stack (85%), NodeMCU firmware (lwIP stack) (85%), OpenBox S10 set-top box (85%), Philips Hue Bridge (lwIP stack v1.4.0) (85%), Cognex DataMan 200 ID reader (lwIP TCP/IP stack) (85%)
No exact OS matches for host (test conditions non-ideal).

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 160.20 seconds

192.168.128.68
nmap -O -sV -p- 192.168.128.68 -T 5 130 ⨯
Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-04 10:30 EST
WARNING: Service 192.168.128.68:6997 had already soft-matched rtsp, but now soft-matched sip; ignoring second value
Nmap scan report for 192.168.128.68
Host is up (0.00079s latency).
Not shown: 65525 closed ports
PORT STATE SERVICE VERSION
4004/tcp open upnp CyberLink upnp 1.0
5555/tcp open freeciv?
6997/tcp open rtsp
7100/tcp open font-service?
13489/tcp open unknown
16990/tcp open unknown
18090/tcp open unknown
47489/tcp open unknown
52266/tcp open nagios-nsca Nagios NSCA
54454/tcp open rtsp
4 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port6997-TCP:V=7.91%I=7%D=3/4%Time=6040FD3F%P=x86_64-pc-linux-gnu%r(Get
SF:Request,D2,”HTTP/1\.0\x20404\x20Not\x20Found\r\nServer:\x20SuperNode\x2
SF:0HLS/0\.9\.94\r\nDate:\x20Thu,\x2004\x20Mar\x202021\x2015:31:11\x20GMT\
SF:r\nConnection:\x20close\r\nContent-Length:\x2020\r\nContent-Type:\x20te
SF:xt/plain\r\nAccess-Control-Allow-Origin:\x20\*\r\n\r\n404\x20-\x20Page\
SF:x20Not\x20Found”)%r(HTTPOptions,D2,”HTTP/1\.0\x20404\x20Not\x20Found\r\
SF:nServer:\x20SuperNode\x20HLS/0\.9\.94\r\nDate:\x20Thu,\x2004\x20Mar\x20
SF:2021\x2015:31:11\x20GMT\r\nConnection:\x20close\r\nContent-Length:\x202
SF:0\r\nContent-Type:\x20text/plain\r\nAccess-Control-Allow-Origin:\x20\*\
SF:r\n\r\n404\x20-\x20Page\x20Not\x20Found”)%r(RTSPRequest,C8,”RTSP/1\.0\x
SF:20400\x20Bad\x20Request\r\nServer:\x20SuperNode\x20HLS/0\.9\.94\r\nDate
SF::\x20Thu,\x2004\x20Mar\x202021\x2015:31:11\x20GMT\r\nConnection:\x20clo
SF:se\r\nContent-Length:\x200\r\nContent-Type:\x20text/plain\r\ncseq:\x201
SF:\r\nAccess-Control-Allow-Origin:\x20\*\r\n\r\n”)%r(FourOhFourRequest,D2
SF:,”HTTP/1\.0\x20404\x20Not\x20Found\r\nServer:\x20SuperNode\x20HLS/0\.9\
SF:.94\r\nDate:\x20Thu,\x2004\x20Mar\x202021\x2015:31:11\x20GMT\r\nConnect
SF:ion:\x20close\r\nContent-Length:\x2020\r\nContent-Type:\x20text/plain\r
SF:\nAccess-Control-Allow-Origin:\x20\*\r\n\r\n404\x20-\x20Page\x20Not\x20
SF:Found”)%r(SIPOptions,D1,”SIP/2\.0\x20404\x20Not\x20Found\r\nServer:\x20
SF:SuperNode\x20HLS/0\.9\.94\r\nDate:\x20Thu,\x2004\x20Mar\x202021\x2015:3
SF:1:11\x20GMT\r\nConnection:\x20close\r\nContent-Length:\x2020\r\nContent
SF:-Type:\x20text/plain\r\nAccess-Control-Allow-Origin:\x20\*\r\n\r\n404\x
SF:20-\x20Page\x20Not\x20Found”);
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port16990-TCP:V=7.91%I=7%D=3/4%Time=6040FD3F%P=x86_64-pc-linux-gnu%r(Ge
SF:tRequest,41,”HTTP/1\.0\x20404\x20Not\x20Found\r\nServer:\x20Nginx/1\.04
SF:\r\nContent-Length:\x200\r\n\r\n”)%r(HTTPOptions,41,”HTTP/1\.0\x20404\x
SF:20Not\x20Found\r\nServer:\x20Nginx/1\.04\r\nContent-Length:\x200\r\n\r\
SF:n”)%r(RTSPRequest,41,”HTTP/1\.0\x20404\x20Not\x20Found\r\nServer:\x20Ng
SF:inx/1\.04\r\nContent-Length:\x200\r\n\r\n”)%r(FourOhFourRequest,41,”HTT
SF:P/1\.0\x20404\x20Not\x20Found\r\nServer:\x20Nginx/1\.04\r\nContent-Leng
SF:th:\x200\r\n\r\n”)%r(SIPOptions,41,”HTTP/1\.0\x20404\x20Not\x20Found\r\
SF:nServer:\x20Nginx/1\.04\r\nContent-Length:\x200\r\n\r\n”);
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port47489-TCP:V=7.91%I=7%D=3/4%Time=6040FD49%P=x86_64-pc-linux-gnu%r(Ge
SF:tRequest,4B,”HTTP/1\.1\x20200\x20OK\r\nDate:\x20Thu,\x2004\x20Mar\x2020
SF:21\x2015:31:16\x20GMT\r\nContent-Length:\x200\r\n\r\n”)%r(FourOhFourReq
SF:uest,4B,”HTTP/1\.1\x20200\x20OK\r\nDate:\x20Thu,\x2004\x20Mar\x202021\x
SF:2015:32:24\x20GMT\r\nContent-Length:\x200\r\n\r\n”);
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port54454-TCP:V=7.91%I=7%D=3/4%Time=6040FD44%P=x86_64-pc-linux-gnu%r(RT
SF:SPRequest,D4,”RTSP/1\.0\x20200\x20OK\r\nAudio-Jack-Status:\x20connected
SF:;\x20type=analog\r\nPublic:\x20ANNOUNCE,\x20SETUP,\x20RECORD,\x20PLAY,\
SF:x20PAUSE,\x20FLUSH,\x20TEARDOWN,\x20OPTIONS,\x20GET_PARAMETER,\x20SET_P
SF:ARAMETER,\x20GET,\x20POST\r\nServer:\x20AirTunes/220\.68\r\nCSeq:\x20nu
SF:ll\r\n\r\n”);
Device type: VoIP phone|webcam|specialized|firewall|general purpose
Running (JUST GUESSING): Grandstream embedded (92%), Garmin embedded (89%), 2N embedded (89%), FireBrick embedded (87%), Cognex embedded (86%), lwIP 1.4.X (86%), Enlogic embedded (86%), NodeMCU embedded (85%)
OS CPE: cpe:/h:grandstream:gxp1105 cpe:/h:garmin:virb_elite cpe:/h:2n:helios cpe:/h:firebrick:fb2700 cpe:/a:lwip_project:lwip cpe:/a:lwip_project:lwip:1.4.0 cpe:/o:nodemcu:nodemcu
Aggressive OS guesses: Grandstream GXP1105 VoIP phone (92%), Garmin Virb Elite action camera (89%), 2N Helios IP VoIP doorbell (89%), FireBrick FB2700 firewall (87%), Cognex DataMan 200 ID reader (lwIP TCP/IP stack) (86%), Enlogic PDU (FreeRTOS/lwIP) (86%), lwIP 1.4.0 lightweight TCP/IP stack (85%), NodeMCU firmware (lwIP stack) (85%), Philips Hue Bridge (lwIP stack v1.4.0) (85%), Rigol DSG3060 signal generator (85%)
No exact OS matches for host (test conditions non-ideal).
Service Info: OS: Linux 3.10.33; CPE: cpe:/o:linux:linux_kernel:3.10.33

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 181.83 seconds

192.168.128.128

nmap -O -sV -p- 192.168.128.128 -T 4
Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-04 10:51 EST
WARNING: RST from 192.168.128.128 port 58490 — is this port really open?
WARNING: RST from 192.168.128.128 port 58490 — is this port really open?
WARNING: RST from 192.168.128.128 port 58490 — is this port really open?
WARNING: RST from 192.168.128.128 port 58490 — is this port really open?
WARNING: RST from 192.168.128.128 port 58490 — is this port really open?
WARNING: RST from 192.168.128.128 port 58490 — is this port really open?
WARNING: RST from 192.168.128.128 port 58490 — is this port really open?
WARNING: RST from 192.168.128.128 port 58490 — is this port really open?
WARNING: RST from 192.168.128.128 port 58490 — is this port really open?
WARNING: RST from 192.168.128.128 port 58490 — is this port really open?
WARNING: RST from 192.168.128.128 port 58490 — is this port really open?
WARNING: RST from 192.168.128.128 port 58490 — is this port really open?
Nmap scan report for 192.168.128.128
Host is up (0.0032s latency).
Not shown: 65533 closed ports
PORT STATE SERVICE VERSION
46251/tcp open tcpwrapped
58490/tcp open tcpwrapped
OS fingerprint not ideal because: Didn’t receive UDP response. Please try again with -sSU
No OS matches for host

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 170.51 seconds

192.168.128.61

sudo nmap -O -sV -p- 192.168.128.61 -T 4
Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-04 10:48 EST
Warning: 192.168.128.61 giving up on port because retransmission cap hit (6).
Nmap scan report for 192.168.128.61
Host is up (0.0048s latency).
Not shown: 63140 closed ports, 2394 filtered ports
PORT STATE SERVICE VERSION
62078/tcp open iphone-sync?
Aggressive OS guesses: Grandstream GXP1105 VoIP phone (93%), Garmin Virb Elite action camera (89%), 2N Helios IP VoIP doorbell (89%), FireBrick FB2700 firewall (87%), Philips Hue Bridge (lwIP stack v1.4.0) (86%), Espressif esp8266 firmware (lwIP stack) (85%), NodeMCU firmware (lwIP stack) (85%), Yamaha RX-V671 AV receiver (85%), Cognex DataMan 200 ID reader (lwIP TCP/IP stack) (85%), Enlogic PDU (FreeRTOS/lwIP) (85%)
No exact OS matches for host (test conditions non-ideal).

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 1369.48 seconds

192.168.128.69

nmap -O -sV -p- 192.168.128.69 -T 5
Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-04 11:30 EST
Warning: 192.168.128.69 giving up on port because retransmission cap hit (2).
Nmap scan report for 192.168.128.69
Host is up (0.0023s latency).
Not shown: 65424 filtered ports, 110 closed ports
PORT STATE SERVICE VERSION
8888/tcp open tcpwrapped
Aggressive OS guesses: Grandstream GXP1105 VoIP phone (93%), Garmin Virb Elite action camera (89%), 2N Helios IP VoIP doorbell (89%), FireBrick FB2700 firewall (87%), Philips Hue Bridge (lwIP stack v1.4.0) (86%), NodeMCU firmware (lwIP stack) (85%), Cognex DataMan 200 ID reader (lwIP TCP/IP stack) (85%), Enlogic PDU (FreeRTOS/lwIP) (85%)
No exact OS matches for host (test conditions non-ideal).

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 128.00 seconds

192.168.128.98 (1st attempt )

nmap -O -sV -p- 192.168.128.98 -T 5
Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-04 11:26 EST
Warning: 192.168.128.98 giving up on port because retransmission cap hit (2).
Nmap scan report for 192.168.128.98
Host is up (0.0011s latency).
All 65535 scanned ports on 192.168.128.98 are filtered (53959) or closed (11576)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Digital Loggers, Inc. power controller (firmware 1.2.7) (91%), Cisco 3550 switch (IOS 12.2) (89%), Micropython 1.8 (89%), Grandstream GXP2020 VoIP phone (89%), High-Flying HF-LPT100 embedded WLAN module (89%), Philips Hue Bridge (lwIP stack) (89%), HP iLO 2 remote management interface version 2.0 (89%), D-Link DCS-3220 or DCS-5300G webcam (88%), DEC Digital UNIX 5.X (88%), Dell PowerConnect 6200-series switch (86%)
No exact OS matches for host (test conditions non-ideal).

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 140.17 seconds

192.168.128.98 (2nd attempt )

nmap -O -sV -p- 192.168.128.98 -T 4
Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-04 10:59 EST
Warning: 192.168.128.98 giving up on port because retransmission cap hit (6).
Nmap scan report for 192.168.128.98
Host is up (0.00038s latency).
Not shown: 62186 closed ports, 3341 filtered ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.1 (protocol 2.0)
88/tcp open tcpwrapped
445/tcp open microsoft-ds?
631/tcp open tcpwrapped
3031/tcp open eppc?
3283/tcp open netassistant?
5900/tcp open vnc Apple remote desktop vnc
49166/tcp open unknown
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port3031-TCP:V=7.91%I=7%D=3/4%Time=604108D8%P=x86_64-pc-linux-gnu%r(X11
SF:Probe,C,”PPCT\0\0\0\x01\0\0\0\0″);
Aggressive OS guesses: Grandstream GXP1105 VoIP phone (93%), Garmin Virb Elite action camera (89%), 2N Helios IP VoIP doorbell (89%), FireBrick FB2700 firewall (87%), Philips Hue Bridge (lwIP stack v1.4.0) (86%), NodeMCU firmware (lwIP stack) (85%), Cognex DataMan 200 ID reader (lwIP TCP/IP stack) (85%), Enlogic PDU (FreeRTOS/lwIP) (85%)
No exact OS matches for host (test conditions non-ideal).
Service Info: OS: Mac OS X; CPE: cpe:/o:apple:mac_os_x

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 1404.62 seconds
10.0.0.8 (1st attempt)

#nmap -O -sV -p- 10.0.0.8 -T 4
Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-04 10:56 EST
Nmap scan report for 10.0.0.8
Host is up (0.00052s latency).
Not shown: 65534 filtered ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.7 (protocol 2.0)
MAC Address: 08:00:27:99:B1:5F (Oracle VirtualBox virtual NIC)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2008|Vista (92%), FreeBSD 6.X (85%)
OS CPE: cpe:/o:microsoft:windows_server_2008::beta3 cpe:/o:microsoft:windows_server_2008 cpe:/o:microsoft:windows_vista::sp2 cpe:/o:freebsd:freebsd:6.2
Aggressive OS guesses: Microsoft Windows Server 2008 or 2008 Beta 3 (92%), Microsoft Windows Vista SP2 (91%), FreeBSD 6.2-RELEASE (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 1 hop

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 96.39 seconds

10.0.0.8 (2nd attempt)
┌──(root💀kali)-[/home/kali]
└─# nmap -O -sV -p- 10.0.0.8 -T 4
Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-04 11:10 EST
Nmap scan report for 10.0.0.8
Host is up (0.00041s latency).
Not shown: 65527 filtered ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.7 (protocol 2.0)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Microsoft Windows 7 – 10 microsoft-ds (workgroup: WORKGROUP)
2869/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
3389/tcp open ssl/ms-wbt-server?
5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
10243/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
MAC Address: 08:00:27:99:B1:5F (Oracle VirtualBox virtual NIC)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose|phone
Running (JUST GUESSING): Microsoft Windows Vista|7|8|2008|Phone|8.1 (93%)
OS CPE: cpe:/o:microsoft:windows_vista::sp2 cpe:/o:microsoft:windows_7::-:professional cpe:/o:microsoft:windows_8 cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows_server_2008:r2:sp1 cpe:/o:microsoft:windows cpe:/o:microsoft:windows_8.1
Aggressive OS guesses: Microsoft Windows Vista SP2 (93%), Microsoft Windows 7 Professional or Windows 8 (86%), Microsoft Windows 7 SP1 or Windows Server 2008 SP2 or 2008 R2 SP1 (86%), Microsoft Windows Vista SP0 or SP1, Windows Server 2008 SP1, or Windows 7 (86%), Microsoft Windows Phone 7.5 or 8.0 (85%), Microsoft Windows Server 2008 R2 (85%), Microsoft Windows Server 2008 R2 SP1 or Windows 8 (85%), Microsoft Windows Server 2008 R2 or Windows 8.1 (85%), Microsoft Windows Vista SP2, Windows 7 SP1, or Windows Server 2008 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 1 hop
Service Info: Host: IE8WIN7; OS: Windows; CPE: cpe:/o:microsoft:windows

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 128.90 seconds-
10.0.0.*

nmap -O -sV -sS 10.0.0.*
Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-04 10:20 EST
Nmap scan report for 10.0.0.1
Host is up (0.0020s latency).
Not shown: 999 closed ports
PORT STATE SERVICE VERSION
53/tcp open tcpwrapped
MAC Address: 52:54:00:12:35:00 (QEMU virtual NIC)
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.91%E=4%D=3/4%OT=53%CT=1%CU=34416%PV=Y%DS=1%DC=D%G=Y%M=525400%TM
OS:=6040FADA%P=x86_64-pc-linux-gnu)SEQ(SP=16%GCD=1%ISR=45%TI=I%CI=I%II=RI%S
OS:S=O%TS=U)OPS(O1=M5B4%O2=M5B4%O3=M5B4%O4=M5B4%O5=M5B4%O6=M5B4)WIN(W1=8000
OS:%W2=8000%W3=8000%W4=8000%W5=8000%W6=8000)ECN(R=Y%DF=N%T=FF%W=8000%O=M5B4
OS:%CC=N%Q=)T1(R=Y%DF=N%T=FF%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=Y%DF=N%T=FF%
OS:W=8000%S=O%A=S+%F=AS%O=M5B4%RD=0%Q=)T4(R=Y%DF=N%T=FF%W=8000%S=A%A=S%F=AR
OS:%O=%RD=0%Q=)T5(R=Y%DF=N%T=FF%W=8000%S=A%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=N
OS:%T=FF%W=8000%S=A%A=S%F=AR%O=%RD=0%Q=)T7(R=Y%DF=N%T=FF%W=8000%S=A%A=S+%F=
OS:AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=FF%IPL=38%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%R
OS:UD=G)IE(R=Y%DFI=S%T=FF%CD=S)

Network Distance: 1 hop