# Nmap 7.95 scan initiated Thu Aug 28 15:36:18 2025 as: /usr/lib/nmap/nmap -f -sV -oN Documents/scan_version_LAB.txt 192.168.3.4-254 Nmap scan report for 192.168.3.5 Host is up (0.0045s latency). All 1000 scanned ports on 192.168.3.5 are in ignored states. Not shown: 1000 filtered tcp ports (no-response) MAC Address: B4:2E:99:4E:C6:13 (Giga-byte Technology) Nmap scan report for 192.168.3.10 Host is up (0.023s latency). All 1000 scanned ports on 192.168.3.10 are in ignored states. Not shown: 1000 filtered tcp ports (no-response) MAC Address: 00:0C:29:1C:77:26 (VMware) Nmap scan report for 192.168.3.63 Host is up (0.0025s latency). Not shown: 997 closed tcp ports (reset) PORT STATE SERVICE VERSION 80/tcp open http TP-LINK WAP http config 443/tcp open ssl/https? 49152/tcp open upnp Portable SDK for UPnP devices 1.3.1 (Linux 2.6.36; UPnP 1.0) MAC Address: 98:BA:5F:4A:65:20 (Unknown) Service Info: OS: Linux; Device: WAP; CPE: cpe:/o:linux:linux_kernel:2.6.36 Nmap scan report for 192.168.3.76 Host is up (0.0083s latency). Not shown: 996 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 22/tcp open ssh FortiSSH (protocol 2.0) 80/tcp open http 113/tcp closed ident 443/tcp open ssl/https 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.95%I=7%D=8/28%Time=68B07795%P=arm-unknown-linux-gnueabih SF:f%r(GetRequest,577,"HTTP/1\.1\x20200\x20OK\r\nContent-Encoding:\x20gzip SF:\r\nContent-Type:\x20text/html\r\nETag:\x20Gtrj5r9zk4fN7NwjftpNr9zGt1m1 SF:ptrw\r\nX-Frame-Options:\x20SAMEORIGIN\r\nContent-Security-Policy:\x20f SF:rame-ancestors\x20'self'\r\nX-XSS-Protection:\x201;\x20mode=block\r\nSt SF:rict-Transport-Security:\x20max-age=0\r\nDate:\x20Thu,\x2028\x20Aug\x20 SF:2025\x2015:36:52\x20GMT\r\nConnection:\x20close\r\n\r\n\x1f\x8b\x08\0\0 SF:\0\0\0\x02\x03\x8dVY\x8f\xdb6\x10~\xf7\xaf\xe0\*El\xa7\x96d\xeff\x93@\x SF:b6\xb6\)\xb6M\[\xa0@\x8b`\xf3\xd0\xa7\r%\x8d\xac\xe9R\xa4@R>j\xf8\xbfwt SF:\xd8\xd6\xfaH\xd6\x86\x0fqf>~s\x92\xb3\xab_\xfe\xba\x7f\xf8\xe7\xef_Yfs SF:q7\xab\xbe\x99\xe0r\x1e:\x20\x1dz\x06\x9e\xdc\xf5\x18\xbdf9X\xce\xe2\x8 SF:ck\x036tJ\x9b\xba\x1f\x9cVd\xd1\n\xb8\xfb\xa4\xb4\xc5\xdf\xb8\x85\x99\x SF:df,4\xc2\x88\x1b`\x99\x864t\|c\xb9\xc5\xd8w\xba\x90\x92\xe7\x10:\x0b\x8 SF:4eA\0\x0e\x8b\x95\xb4\x20i\x8b%&6\x0b\x13X`\x0cn\xfd0b\(\xd1\"\x17\xae\ SF:x89\xb9\x80p\xb2\x03\x12\(\x9f\x98\x06\x11:\xbc\(\x04\xb8V\x95q\xe6\"A9 SF:\xcc\xe0\x7f`Bg\xf2a\xbc\xa2\x8f\xd3RI\xf9\xa2\x12\xfb\xc7\xfa\^!\xe7\x SF:a7\xa8&#jqiY\x03i\xd7\x05Q\xc6\x9c\xcf\xc1_\xb5\xdb<\x87m\x7f=\xfa:E;\x SF:05\xa96\xdd\x11\xbd\xb9\^\xdd\\_\xc0sk\xe1y\x8e\xdfF\x9d\xbc\[M\xde\]B\ SF:xad\x85\xe7Qs\.1\x05c\x8fM\rZ\xf0\x96\x10\xed\xe5g,\xcd\xd3\xd9\xd8\x18 SF:\x9er\x8dn\x81RB\xe2Z\x1eyf1\xaf\xf2\.\x94\x0e\x9dW\xc9\xdb\x9b\xdb\xeb SF:\xf7\xdf\xcd\xc1w\xe3\xdd\)\xae\xdcTi\xc6\x98\x8a\x8f\xbc}@\x01\xf7\xd5 SF:f\x9dZ;\xda\xf5\xa2-\x19\xa48\xef\x18\xee\x08DZ-\r\xe8F\xee\xadrAP\r\x9 SF:6\x895\x16\xb6\x01f,-e\\!1\xa1\xe6\(\x1f5\$\xa8!\xb6\x03\xd0Z\xe9!\xdb\ SF:xb4j\x8c\xf5Kj\x1bc5\xc6\xb6\?\xdd\xaf\.\xb8f\xa5\x16,dK\x94\x89ZzB5\xc SF:c\xbc\x82\xdb\xacb\xcc~<\x11\x19\xe0:\xce\xce\x082n\xb2\x036\xa6\xec\x9 SF:4\x06\xab\\5JP\xb2\xb9\x96\x83\xaf\x9f\[\xc2\(\xe7\xcc\xaa\xc6\x0bVP\xb SF:5\x05\xec\x87Mm\xbd\xfd:<`n\x19\x08\xf2\xe3\"\^\xff\"\^\xbf\x8b\xb2\xff SF:w\xe2\x01U\x01\x05\xa3\xef\x93\xa1\*\xedOu<\xc3>\xf9\n2V\t\|\xf9\xfc\xc SF:7\xbd\xca\x0b%\)Y\x03\n\xdc\x1et\xdb\xeb=C\|\|L\x95\xf9\xb3\xda}\xc7\xe SF:8\xf1\x91\x80\x9fgi\xba3J\xc1\xc6\xd9\xa0O\xd3\x03\xfd\xc5\xb5\x9f\+\x1 SF:aKJ\xfb"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.95%T=SSL%I=7%D=8/28%Time=68B0779B%P=arm-unknown-linux-g SF:nueabihf%r(GetRequest,577,"HTTP/1\.1\x20200\x20OK\r\nContent-Encoding:\ SF:x20gzip\r\nContent-Type:\x20text/html\r\nETag:\x20Gtrj5r9zk4fN7NwjftpNr SF:9zGt1m1ptrw\r\nX-Frame-Options:\x20SAMEORIGIN\r\nContent-Security-Polic SF:y:\x20frame-ancestors\x20'self'\r\nX-XSS-Protection:\x201;\x20mode=bloc SF:k\r\nStrict-Transport-Security:\x20max-age=0\r\nDate:\x20Thu,\x2028\x20 SF:Aug\x202025\x2015:36:58\x20GMT\r\nConnection:\x20close\r\n\r\n\x1f\x8b\ SF:x08\0\0\0\0\0\x02\x03\x8dVY\x8f\xdb6\x10~\xf7\xaf\xe0\*El\xa7\x96d\xeff SF:\x93@\xb6\xb6\)\xb6M\[\xa0@\x8b`\xf3\xd0\xa7\r%\x8d\xac\xe9R\xa4@R>j\xf SF:8\xbfwt\xd8\xd6\xfaH\xd6\x86\x0fqf>~s\x92\xb3\xab_\xfe\xba\x7f\xf8\xe7\ SF:xef_Yfsq7\xab\xbe\x99\xe0r\x1e:\x20\x1dz\x06\x9e\xdc\xf5\x18\xbdf9X\xce SF:\xe2\x8ck\x036tJ\x9b\xba\x1f\x9cVd\xd1\n\xb8\xfb\xa4\xb4\xc5\xdf\xb8\x8 SF:5\x99\xdf,4\xc2\x88\x1b`\x99\x864t\|c\xb9\xc5\xd8w\xba\x90\x92\xe7\x10: SF:\x0b\x84eA\0\x0e\x8b\x95\xb4\x20i\x8b%&6\x0b\x13X`\x0cn\xfd0b\(\xd1\"\x SF:17\xae\x89\xb9\x80p\xb2\x03\x12\(\x9f\x98\x06\x11:\xbc\(\x04\xb8V\x95q\ SF:xe6\"A9\xcc\xe0\x7f`Bg\xf2a\xbc\xa2\x8f\xd3RI\xf9\xa2\x12\xfb\xc7\xfa\^ SF:!\xe7\xa7\xa8&#jqiY\x03i\xd7\x05Q\xc6\x9c\xcf\xc1_\xb5\xdb<\x87m\x7f=\x SF:fa:E;\x05\xa96\xdd\x11\xbd\xb9\^\xdd\\_\xc0sk\xe1y\x8e\xdfF\x9d\xbc\[M\ SF:xde\]B\xad\x85\xe7Qs\.1\x05c\x8fM\rZ\xf0\x96\x10\xed\xe5g,\xcd\xd3\xd9\ SF:xd8\x18\x9er\x8dn\x81RB\xe2Z\x1eyf1\xaf\xf2\.\x94\x0e\x9dW\xc9\xdb\x9b\ SF:xdb\xeb\xf7\xdf\xcd\xc1w\xe3\xdd\)\xae\xdcTi\xc6\x98\x8a\x8f\xbc}@\x01\ SF:xf7\xd5f\x9dZ;\xda\xf5\xa2-\x19\xa48\xef\x18\xee\x08DZ-\r\xe8F\xee\xadr SF:AP\r\x96\x895\x16\xb6\x01f,-e\\!1\xa1\xe6\(\x1f5\$\xa8!\xb6\x03\xd0Z\xe SF:9!\xdb\xb4j\x8c\xf5Kj\x1bc5\xc6\xb6\?\xdd\xaf\.\xb8f\xa5\x16,dK\x94\x89 SF:ZzB5\xcc\xbc\x82\xdb\xacb\xcc~<\x11\x19\xe0:\xce\xce\x082n\xb2\x036\xa6 SF:\xec\x94\x06\xab\\5JP\xb2\xb9\x96\x83\xaf\x9f\[\xc2\(\xe7\xcc\xaa\xc6\x SF:0bVP\xb5\x05\xec\x87Mm\xbd\xfd:<`n\x19\x08\xf2\xe3\"\^\xff\"\^\xbf\x8b\ SF:xb2\xffw\xe2\x01U\x01\x05\xa3\xef\x93\xa1\*\xedOu<\xc3>\xf9\n2V\t\|\xf9 SF:\xfc\xc7\xbd\xca\x0b%\)Y\x03\n\xdc\x1et\xdb\xeb=C\|\|L\x95\xf9\xb3\xda} SF:\xc7\xe8\xf1\x91\x80\x9fgi\xba3J\xc1\xc6\xd9\xa0O\xd3\x03\xfd\xc5\xb5\x SF:9f\+\x1aKJ\xfb"); MAC Address: 00:0C:29:15:15:41 (VMware) Service Info: CPE: cpe:/o:fortinet:fortios Nmap scan report for 192.168.3.86 Host is up (0.0055s latency). Not shown: 997 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.2p1 Debian 2+deb12u7 (protocol 2.0) 8000/tcp open ssl/http Golang net/http server (Go-IPFS json-rpc or InfluxDB API) 8001/tcp open ssl/vcom-tunnel? MAC Address: 00:0C:29:E5:85:F9 (VMware) Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Nmap scan report for 192.168.3.89 Host is up (0.0047s latency). Not shown: 999 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.2p1 Debian 2+deb12u7 (protocol 2.0) MAC Address: 00:0C:29:3C:A9:E5 (VMware) Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Nmap scan report for 192.168.3.94 Host is up (0.0084s latency). Not shown: 989 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 53/tcp open domain Simple DNS Plus 88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-08-28 15:36:19Z) 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: lab.local0., Site: Default-First-Site-Name) 464/tcp open kpasswd5? 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 636/tcp open tcpwrapped 3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: lab.local0., Site: Default-First-Site-Name) 3269/tcp open tcpwrapped 5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) MAC Address: 00:0C:29:9E:C1:A2 (VMware) Service Info: Host: WINDOWS-SERVER; OS: Windows; CPE: cpe:/o:microsoft:windows Nmap scan report for 192.168.3.96 Host is up (0.085s latency). All 1000 scanned ports on 192.168.3.96 are in ignored states. Not shown: 1000 filtered tcp ports (no-response) MAC Address: 00:0C:29:65:28:BB (VMware) Nmap scan report for 192.168.3.200 Host is up (0.0083s latency). Not shown: 968 filtered tcp ports (no-response), 28 filtered tcp ports (port-unreach) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.0 (protocol 2.0) 80/tcp closed http 443/tcp open ssl/http Apache httpd 514/tcp open shell? MAC Address: 00:0C:29:D6:FF:AD (VMware) Nmap scan report for 192.168.3.88 Host is up (0.000074s latency). Not shown: 997 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 10.0p2 Debian 7 (protocol 2.0) 3389/tcp open ms-wbt-server Microsoft Terminal Service 5900/tcp open vnc VNC (protocol 3.8) Service Info: OSs: Linux, Windows; CPE: cpe:/o:linux:linux_kernel, cpe:/o:microsoft:windows Nmap scan report for 192.168.3.93 Host is up (0.00011s latency). Not shown: 997 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 10.0p2 Debian 7 (protocol 2.0) 3389/tcp open ms-wbt-server Microsoft Terminal Service 5900/tcp open vnc VNC (protocol 3.8) Service Info: OSs: Linux, Windows; CPE: cpe:/o:linux:linux_kernel, cpe:/o:microsoft:windows Nmap scan report for 192.168.3.101 Host is up (0.000099s latency). Not shown: 997 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 10.0p2 Debian 7 (protocol 2.0) 3389/tcp open ms-wbt-server Microsoft Terminal Service 5900/tcp open vnc VNC (protocol 3.8) Service Info: OSs: Linux, Windows; CPE: cpe:/o:linux:linux_kernel, cpe:/o:microsoft:windows Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Thu Aug 28 15:40:00 2025 -- 251 IP addresses (12 hosts up) scanned in 222.11 seconds