Starting Nmap 7.80 ( https://nmap.org ) at 2022-05-10 17:02 ora legale Europa occidentale NSE: Loaded 151 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 17:02 Completed NSE at 17:02, 0.00s elapsed Initiating NSE at 17:02 Completed NSE at 17:02, 0.00s elapsed Initiating NSE at 17:02 Completed NSE at 17:02, 0.00s elapsed Initiating ARP Ping Scan at 17:02 Scanning 192.168.11.83 [1 port] Completed ARP Ping Scan at 17:02, 0.23s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:02 Completed Parallel DNS resolution of 1 host. at 17:02, 5.51s elapsed Initiating SYN Stealth Scan at 17:02 Scanning 192.168.11.83 [65535 ports] Discovered open port 445/tcp on 192.168.11.83 Discovered open port 443/tcp on 192.168.11.83 Discovered open port 111/tcp on 192.168.11.83 Discovered open port 80/tcp on 192.168.11.83 Discovered open port 8080/tcp on 192.168.11.83 Discovered open port 139/tcp on 192.168.11.83 Discovered open port 8081/tcp on 192.168.11.83 Discovered open port 41576/tcp on 192.168.11.83 Discovered open port 2049/tcp on 192.168.11.83 Discovered open port 30001/tcp on 192.168.11.83 SYN Stealth Scan Timing: About 20.65% done; ETC: 17:05 (0:01:59 remaining) Discovered open port 30000/tcp on 192.168.11.83 SYN Stealth Scan Timing: About 42.28% done; ETC: 17:04 (0:01:23 remaining) SYN Stealth Scan Timing: About 57.63% done; ETC: 17:05 (0:01:07 remaining) Discovered open port 49152/tcp on 192.168.11.83 Discovered open port 30002/tcp on 192.168.11.83 Completed SYN Stealth Scan at 17:04, 143.82s elapsed (65535 total ports) Initiating Service scan at 17:04 Scanning 13 services on 192.168.11.83 Completed Service scan at 17:06, 106.75s elapsed (13 services on 1 host) Initiating OS detection (try #1) against 192.168.11.83 NSE: Script scanning 192.168.11.83. Initiating NSE at 17:06 Completed NSE at 17:07, 14.46s elapsed Initiating NSE at 17:07 Completed NSE at 17:07, 1.16s elapsed Initiating NSE at 17:07 Completed NSE at 17:07, 0.00s elapsed Nmap scan report for 192.168.11.83 Host is up (0.017s latency). Not shown: 65522 closed ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd | http-methods: |_ Supported Methods: POST OPTIONS HEAD GET |_http-server-header: Apache |_http-title: 403 Forbidden 111/tcp open rpcbind 2-4 (RPC #100000) | rpcinfo: | program version port/proto service | 100000 2,3,4 111/tcp rpcbind | 100000 2,3,4 111/udp rpcbind | 100000 3,4 111/tcp6 rpcbind | 100000 3,4 111/udp6 rpcbind | 100003 2,3 2049/tcp nfs | 100003 2,3 2049/tcp6 nfs | 100003 2,3 2049/udp nfs | 100003 2,3 2049/udp6 nfs | 100005 1,2,3 30000/tcp mountd | 100005 1,2,3 30000/tcp6 mountd | 100005 1,2,3 30000/udp mountd | 100005 1,2,3 30000/udp6 mountd | 100011 1,2 30002/tcp rquotad | 100011 1,2 30002/tcp6 rquotad | 100011 1,2 30002/udp rquotad | 100011 1,2 30002/udp6 rquotad | 100021 1,3,4 40470/tcp6 nlockmgr | 100021 1,3,4 41576/tcp nlockmgr | 100021 1,3,4 49344/udp6 nlockmgr | 100021 1,3,4 58417/udp nlockmgr | 100024 1 30001/tcp status | 100024 1 30001/tcp6 status | 100024 1 30001/udp status | 100024 1 30001/udp6 status | 100227 2,3 2049/tcp nfs_acl | 100227 2,3 2049/tcp6 nfs_acl | 100227 2,3 2049/udp nfs_acl |_ 100227 2,3 2049/udp6 nfs_acl 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) 443/tcp open ssl/https | fingerprint-strings: | GetRequest: | HTTP/1.1 200 OK | Date: Tue, 10 May 2022 15:05:04 GMT | Server: | X-Frame-Options: SAMEORIGIN | Content-Security-Policy: script-src 'self' 'unsafe-inline' 'unsafe-eval' ; object-src 'self' ; worker-src 'self' blob: | Content-type: text/html; charset=UTF-8 | Last-modified: Thu, 24 Mar 2022 00:42:37 GMT | Accept-Ranges: bytes | Content-length: 580 | Vary: Accept-Encoding | X-XSS-Protection: 1; mode=block | Strict-Transport-Security: max-age=0 | X-Content-Type-Options: nosniff | Connection: close | | | |