Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Context: Starting Nmap 7.80 ( https://nmap.org ) at 2023-01-27 23:12 MST NSE: Loaded 151 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 23:12 Completed

Context:

Starting Nmap 7.80 ( https://nmap.org ) at 2023-01-27 23:12 MST NSE: Loaded 151 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 23:12 Completed NSE at 23:12, 0.00s elapsed Initiating NSE at 23:12 Completed NSE at 23:12, 0.00s elapsed Initiating NSE at 23:12 Completed NSE at 23:12, 0.00s elapsed Initiating ARP Ping Scan at 23:12 Scanning 192.168.88.128 [1 port] Completed ARP Ping Scan at 23:12, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 23:12 Completed Parallel DNS resolution of 1 host. at 23:12, 13.01s elapsed Initiating SYN Stealth Scan at 23:12 Scanning 192.168.88.128 [65535 ports] Discovered open port 80/tcp on 192.168.88.128 Discovered open port 53/tcp on 192.168.88.128 Increasing send delay for 192.168.88.128 from 0 to 5 due to 11 out of 17 dropped probes since last increase. SYN Stealth Scan Timing: About 4.13% done; ETC: 23:25 (0:11:59 remaining) SYN Stealth Scan Timing: About 6.13% done; ETC: 23:29 (0:15:33 remaining) SYN Stealth Scan Timing: About 8.24% done; ETC: 23:31 (0:16:54 remaining) SYN Stealth Scan Timing: About 23.03% done; ETC: 23:33 (0:15:56 remaining) SYN Stealth Scan Timing: About 29.57% done; ETC: 23:33 (0:14:48 remaining) SYN Stealth Scan Timing: About 35.48% done; ETC: 23:34 (0:13:40 remaining) SYN Stealth Scan Timing: About 41.05% done; ETC: 23:34 (0:12:35 remaining) SYN Stealth Scan Timing: About 46.38% done; ETC: 23:34 (0:11:28 remaining) SYN Stealth Scan Timing: About 51.94% done; ETC: 23:34 (0:10:20 remaining) SYN Stealth Scan Timing: About 57.02% done; ETC: 23:34 (0:09:15 remaining) Discovered open port 60889/tcp on 192.168.88.128 SYN Stealth Scan Timing: About 62.14% done; ETC: 23:34 (0:08:10 remaining) Discovered open port 60888/tcp on 192.168.88.128 SYN Stealth Scan Timing: About 67.56% done; ETC: 23:34 (0:07:03 remaining) SYN Stealth Scan Timing: About 72.69% done; ETC: 23:34 (0:05:57 remaining) SYN Stealth Scan Timing: About 77.63% done; ETC: 23:34 (0:04:52 remaining) Discovered open port 60667/tcp on 192.168.88.128 SYN Stealth Scan Timing: About 82.81% done; ETC: 23:34 (0:03:44 remaining) SYN Stealth Scan Timing: About 88.21% done; ETC: 23:34 (0:02:34 remaining) SYN Stealth Scan Timing: About 93.28% done; ETC: 23:34 (0:01:28 remaining) Completed SYN Stealth Scan at 23:34, 1316.79s elapsed (65535 total ports) Initiating Service scan at 23:34 Scanning 5 services on 192.168.88.128 Completed Service scan at 23:35, 15.63s elapsed (5 services on 1 host) Initiating OS detection (try #1) against 192.168.88.128 Retrying OS detection (try #2) against 192.168.88.128 NSE: Script scanning 192.168.88.128. Initiating NSE at 23:35 Completed NSE at 23:35, 8.39s elapsed Initiating NSE at 23:35 Completed NSE at 23:35, 2.01s elapsed Initiating NSE at 23:35 Completed NSE at 23:35, 0.00s elapsed Nmap scan report for 192.168.88.128 Host is up (0.00099s latency). Not shown: 65530 filtered ports PORT STATE SERVICE VERSION 53/tcp open tcpwrapped 80/tcp open http nginx |_http-favicon: Unknown favicon MD5: 5567E9CE23E5549E0FCD7195F3882816 | http-methods: |_ Supported Methods: GET HEAD POST |_http-title: pfSense - Login 60667/tcp open ftp Microsoft ftpd | ftp-syst: |_ SYST: Windows_NT 60888/tcp open http Microsoft IIS httpd 10.0 | http-methods: | Supported Methods: OPTIONS TRACE GET HEAD POST |_ Potentially risky methods: TRACE |_http-title: IIS Windows 60889/tcp open ftp Microsoft ftpd | ftp-syst: |_ SYST: Windows_NT MAC Address: 00:0C:29:BA:4C:9A (VMware) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Uptime guess: 0.000 days (since Fri Jan 27 23:34:55 2023) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=260 (Good luck!) IP ID Sequence Generation: All zeros Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

TRACEROUTE HOP RTT ADDRESS 1 0.99 ms 192.168.88.128

NSE: Script Post-scanning. Initiating NSE at 23:35 Completed NSE at 23:35, 0.00s elapsed Initiating NSE at 23:35 Completed NSE at 23:35, 0.00s elapsed Initiating NSE at 23:35 Completed NSE at 23:35, 0.00s elapsed Read data files from: /usr/bin/../share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 1361.84 seconds Raw packets sent: 132167 (5.819MB) | Rcvd: 2772 (122.628KB)

Question:

Starting with the line that reads Not responding ports: list what services hping3 has for ports 18, 19 and 20.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

9. Describe the characteristics of power.

Answered: 1 week ago

Question

10. Describe the relationship between communication and power.

Answered: 1 week ago