[Ask] Mau bertanya ttng nmap
#1
Exclamation 
Nmap scan report for 10.10.14.79
Host is up (0.00041s latency).
Not shown: 995 filtered ports
PORT      STATE SERVICE
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
445/tcp   open  microsoft-ds
7741/tcp  open  scriptview
49156/tcp open  unknown
MAC Address: 98:83:89:12:06:5C (Samsung Electronics)

Nmap scan report for 10.10.14.82
Host is up (0.00044s latency).
Not shown: 992 filtered ports
PORT     STATE SERVICE
80/tcp   open  http
135/tcp  open  msrpc
139/tcp  open  netbios-ssn
445/tcp  open  microsoft-ds
1801/tcp open  msmq
2103/tcp open  zephyr-clt
2105/tcp open  eklogin
2107/tcp open  msmq-mgmt
MAC Address: 00:24:54:61:BA:0F (Samsung Electronics)

Nmap scan report for 10.10.14.92
Host is up (0.00031s latency).
Not shown: 992 filtered ports
PORT     STATE SERVICE
80/tcp   open  http
135/tcp  open  msrpc
139/tcp  open  netbios-ssn
445/tcp  open  microsoft-ds
1801/tcp open  msmq
2103/tcp open  zephyr-clt
2105/tcp open  eklogin
2107/tcp open  msmq-mgmt
MAC Address: 20:89:84:F4:64:1A (Compal Information (kunshan))

Nmap scan report for 10.10.14.96
Host is up (0.00024s latency).
All 1000 scanned ports on 10.10.14.96 are closed
MAC Address: 08:62:66Big GrinC:B4:3E (Asustek Computer)

Nmap scan report for 10.10.14.16
Host is up (0.000014s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE
111/tcp open  rpcbind
139/tcp open  netbios-ssn
445/tcp open  microsoft-ds

maaf ane baru belajar nmap
dari port2 di atas ada yang bisa di exploitasi ?
kalo ada yang bisa di exploitasi tolong di jelasin

#2
wah saya sih masih baru, tp yang saya baca kemarin, bukannya 445 open, itu bisa dibuat korban wannacry?

#3
port 445, itu coba pakek https://github.com/ElevenPaths/Eternalbl...Metasploit

#4
ada saran untuk web referensi gak bro?

#5
(08-03-2017, 10:12 PM)HadeesKyu Wrote: ada saran untuk web referensi gak bro?

Maksudnya referensi webnya bro ?






Users browsing this thread: 1 Guest(s)