nmap_output 2015-1028-0209

Published on December 2016 | Categories: Documents | Downloads: 48 | Comments: 0 | Views: 213
of 1
Download PDF   Embed   Report

Comments

Content

SRX security
=================
protect
set
CONFIGURATION
system
interfaces
system
host-name
root-authentication
services
ntp
zones
root-authentication
server
fe-0/0/3
security-zone
ssh
web-management
TESTBED-NMAP-SRX6
127.0.0.1
unit 0 family
encrypted-password
UNTRUST
httpinetinterfaces
https
system-generated-certificate
address"**masked**"
192.168.37.123/24
fe-0/0/3.0 host-inbound-traf
fic security
set
system-services
zones security-zone
traceroute TRUST interfaces fe-0/0/3.0 host-inbound-traffi
c system-services ping
================================================================================
NMAP CONFIGURATION
===========================================
===============================
Starting Nmap 6.49BETA5 ( https://nmap.org ) at 2015-10-29 12:31 India Standard
Time
NSE: Loaded 122 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 12:31
Completed NSE at 12:31, 0.00s elapsed
Initiating NSE at 12:31
Completed NSE at 12:31, 0.00s elapsed
Initiating ARP Ping Scan at 12:31
Scanning 192.168.37.123 [1 port]
Completed ARP Ping Scan at 12:31, 0.12s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 12:31
Completed Parallel DNS resolution of 1 host. at 12:32, 13.00s elapsed
Initiating SYN Stealth Scan at 12:32
Scanning 192.168.37.123 [1000 ports]
Completed SYN Stealth Scan at 12:32, 17.13s elapsed (1000 total ports)
Initiating Service scan at 12:32
Initiating OS detection (try #1) against 192.168.37.123
NSE: Script scanning 192.168.37.123.
Initiating NSE at 12:32
Completed NSE at 12:32, 0.00s elapsed
Initiating NSE at 12:32
Completed NSE at 12:32, 0.00s elapsed
Nmap scan report for 192.168.37.123
Host is up (0.0018s latency).
Not shown: 999 filtered ports
PORT
STATE SERVICE VERSION
33899/tcp closed unknown
MAC Address: 84:B5:9C:A5:C6:C3 (Juniper networks)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop
TRACEROUTE
HOP RTT
ADDRESS
1 1.79 ms 192.168.37.123
NSE: Script Post-scanning.
Initiating NSE at 12:32
Completed NSE at 12:32, 0.00s elapsed
Initiating NSE at 12:32
Completed NSE at 12:32, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at https
://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 34.38 seconds
Raw packets sent: 2015 (90.162KB) | Rcvd: 5 (434B)

Sponsor Documents

Recommended

No recommend documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close