Indonesian Back|Track Team
Ask Mau bertanya ttng nmap - Printable Version

+- Indonesian Back|Track Team (https://www.indonesianbacktrack.or.id/forum)
+-- Forum: Attacker Zone (https://www.indonesianbacktrack.or.id/forum/forum-169.html)
+--- Forum: Exploitation (https://www.indonesianbacktrack.or.id/forum/forum-43.html)
+--- Thread: Ask Mau bertanya ttng nmap (/thread-6863.html)



Mau bertanya ttng nmap - fireworm - 07-20-2016

Nmap scan report for 10.10.14.79
Host is up (0.00041s latency).
Not shown: 995 filtered ports
PORT      STATE SERVICE
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
445/tcp   open  microsoft-ds
7741/tcp  open  scriptview
49156/tcp open  unknown
MAC Address: 98:83:89:12:06:5C (Samsung Electronics)

Nmap scan report for 10.10.14.82
Host is up (0.00044s latency).
Not shown: 992 filtered ports
PORT     STATE SERVICE
80/tcp   open  http
135/tcp  open  msrpc
139/tcp  open  netbios-ssn
445/tcp  open  microsoft-ds
1801/tcp open  msmq
2103/tcp open  zephyr-clt
2105/tcp open  eklogin
2107/tcp open  msmq-mgmt
MAC Address: 00:24:54:61:BA:0F (Samsung Electronics)

Nmap scan report for 10.10.14.92
Host is up (0.00031s latency).
Not shown: 992 filtered ports
PORT     STATE SERVICE
80/tcp   open  http
135/tcp  open  msrpc
139/tcp  open  netbios-ssn
445/tcp  open  microsoft-ds
1801/tcp open  msmq
2103/tcp open  zephyr-clt
2105/tcp open  eklogin
2107/tcp open  msmq-mgmt
MAC Address: 20:89:84:F4:64:1A (Compal Information (kunshan))

Nmap scan report for 10.10.14.96
Host is up (0.00024s latency).
All 1000 scanned ports on 10.10.14.96 are closed
MAC Address: 08:62:66Big GrinC:B4:3E (Asustek Computer)

Nmap scan report for 10.10.14.16
Host is up (0.000014s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE
111/tcp open  rpcbind
139/tcp open  netbios-ssn
445/tcp open  microsoft-ds

maaf ane baru belajar nmap
dari port2 di atas ada yang bisa di exploitasi ?
kalo ada yang bisa di exploitasi tolong di jelasin


RE: Mau bertanya ttng nmap - kruzzkid - 06-07-2017

wah saya sih masih baru, tp yang saya baca kemarin, bukannya 445 open, itu bisa dibuat korban wannacry?


RE: Mau bertanya ttng nmap - EriZain - 07-13-2017

port 445, itu coba pakek https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit


RE: Mau bertanya ttng nmap - HadeesKyu - 08-03-2017

ada saran untuk web referensi gak bro?


RE: Mau bertanya ttng nmap - deepz0ne - 08-09-2017

(08-03-2017, 10:12 PM)HadeesKyu Wrote: ada saran untuk web referensi gak bro?

Maksudnya referensi webnya bro ?