> nmap -A -T4 -v 192.168.1.1/29 Starting Nmap 6.01 ( http://nmap.org ) at 2012-10-23 07:39 EDT NSE: Loaded 93 scripts for scanning. NSE: Script Pre-scanning. Initiating Ping Scan at 07:39 Scanning 8 hosts [2 ports/host] Completed Ping Scan at 07:39, 1.21s elapsed (8 total hosts) Initiating Parallel DNS resolution of 8 hosts. at 07:39 Completed Parallel DNS resolution of 8 hosts. at 07:39, 0.02s elapsed Nmap scan report for 192.168.1.0 [host down] Nmap scan report for 192.168.1.5 [host down] Nmap scan report for 192.168.1.7 [host down] Initiating Connect Scan at 07:39 Scanning 5 hosts [1000 ports/host] Discovered open port 80/tcp on 192.168.1.4 Discovered open port 3306/tcp on 192.168.1.4 Discovered open port 21/tcp on 192.168.1.4 Discovered open port 80/tcp on 192.168.1.1 Discovered open port 139/tcp on 192.168.1.6 Discovered open port 139/tcp on 192.168.1.2 Discovered open port 139/tcp on 192.168.1.3 Discovered open port 5900/tcp on 192.168.1.4 Discovered open port 445/tcp on 192.168.1.4 Discovered open port 21/tcp on 192.168.1.2 Discovered open port 23/tcp on 192.168.1.6 Discovered open port 135/tcp on 192.168.1.6 Discovered open port 554/tcp on 192.168.1.6 Discovered open port 21/tcp on 192.168.1.6 Discovered open port 23/tcp on 192.168.1.1 Discovered open port 135/tcp on 192.168.1.2 Discovered open port 22/tcp on 192.168.1.4 Discovered open port 443/tcp on 192.168.1.1 Discovered open port 445/tcp on 192.168.1.6 Discovered open port 445/tcp on 192.168.1.2 Discovered open port 8080/tcp on 192.168.1.1 Discovered open port 10243/tcp on 192.168.1.6 Discovered open port 49154/tcp on 192.168.1.2 Discovered open port 49154/tcp on 192.168.1.6 Discovered open port 49155/tcp on 192.168.1.6 Discovered open port 49158/tcp on 192.168.1.2 Discovered open port 49159/tcp on 192.168.1.2 Discovered open port 8443/tcp on 192.168.1.1 Discovered open port 49156/tcp on 192.168.1.6 Discovered open port 5357/tcp on 192.168.1.6 Discovered open port 49153/tcp on 192.168.1.6 Discovered open port 49156/tcp on 192.168.1.2 Discovered open port 49152/tcp on 192.168.1.6 Discovered open port 5357/tcp on 192.168.1.2 Discovered open port 49157/tcp on 192.168.1.6 Discovered open port 4567/tcp on 192.168.1.1 Discovered open port 4242/tcp on 192.168.1.2 Discovered open port 49153/tcp on 192.168.1.2 Discovered open port 49152/tcp on 192.168.1.2 Discovered open port 2869/tcp on 192.168.1.6 Completed Connect Scan against 192.168.1.6 in 1.38s (4 hosts left) Discovered open port 992/tcp on 192.168.1.1 Discovered open port 49157/tcp on 192.168.1.2 Completed Connect Scan against 192.168.1.1 in 1.43s (3 hosts left) Completed Connect Scan against 192.168.1.3 in 1.51s (2 hosts left) Completed Connect Scan against 192.168.1.2 in 1.53s (1 host left) Discovered open port 3031/tcp on 192.168.1.4 Discovered open port 49152/tcp on 192.168.1.4 Discovered open port 548/tcp on 192.168.1.4 Completed Connect Scan at 07:40, 4.53s elapsed (5000 total ports) Initiating Service scan at 07:40 Scanning 45 services on 5 hosts Completed Service scan at 07:42, 126.15s elapsed (45 services on 5 hosts) NSE: Script scanning 5 hosts. Initiating NSE at 07:42 Completed NSE at 07:43, 74.26s elapsed Nmap scan report for 192.168.1.1 Host is up (0.054s latency). Not shown: 993 closed ports PORT STATE SERVICE VERSION 23/tcp open tcpwrapped 80/tcp open http Verizon FIOS Actiontec http config |_http-title: Verizon |_http-methods: No Allow or Public header in OPTIONS response (status code 501) 443/tcp open ssl/http Verizon FIOS Actiontec http config |_sslv2: server still supports SSLv2 | ssl-cert: Subject: commonName=ORname_Actiontec: Actiontec Electronics, Inc./countryName=US | Issuer: commonName=ORname_Actiontec: Actiontec Electronics, Inc./countryName=US | Public Key type: rsa | Public Key bits: 1024 | Not valid before: 2006-03-08 20:07:52 | Not valid after: 2026-03-03 20:07:52 | MD5: 9fca eb9a 24cd 3a60 0af4 2151 e052 f093 |_SHA-1: 7603 5f4c 2daf 8a19 926f 7233 cd2c 0d67 f3c5 39e7 |_http-title: Verizon |_http-methods: No Allow or Public header in OPTIONS response (status code 501) 992/tcp open ssl/tcpwrapped | ssl-cert: Subject: commonName=ORname_Actiontec: Actiontec Electronics, Inc./countryName=US | Issuer: commonName=ORname_Actiontec: Actiontec Electronics, Inc./countryName=US | Public Key type: rsa | Public Key bits: 1024 | Not valid before: 2006-03-08 20:07:52 | Not valid after: 2026-03-03 20:07:52 | MD5: 9fca eb9a 24cd 3a60 0af4 2151 e052 f093 |_SHA-1: 7603 5f4c 2daf 8a19 926f 7233 cd2c 0d67 f3c5 39e7 |_sslv2: server still supports SSLv2 4567/tcp open http ActionTec TR-069 remote access |_http-title: 405 Method Not Allowed |_http-methods: No Allow or Public header in OPTIONS response (status code 501) 8080/tcp open http Verizon FIOS Actiontec http config |_http-title: Verizon |_http-methods: No Allow or Public header in OPTIONS response (status code 501) 8443/tcp open ssl/http Verizon FIOS Actiontec http config |_http-title: Verizon |_http-methods: No Allow or Public header in OPTIONS response (status code 501) | ssl-cert: Subject: commonName=ORname_Actiontec: Actiontec Electronics, Inc./countryName=US | Issuer: commonName=ORname_Actiontec: Actiontec Electronics, Inc./countryName=US | Public Key type: rsa | Public Key bits: 1024 | Not valid before: 2006-03-08 20:07:52 | Not valid after: 2026-03-03 20:07:52 | MD5: 9fca eb9a 24cd 3a60 0af4 2151 e052 f093 |_SHA-1: 7603 5f4c 2daf 8a19 926f 7233 cd2c 0d67 f3c5 39e7 |_sslv2: server still supports SSLv2 Service Info: Device: broadband router Nmap scan report for kitchen.germans (192.168.1.2) Host is up (0.056s latency). Not shown: 987 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp FileZilla ftpd 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn 445/tcp open netbios-ssn 4242/tcp open vrml-multi-use? 5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-title: Service Unavailable |_http-methods: No Allow or Public header in OPTIONS response (status code 503) 49152/tcp open msrpc Microsoft Windows RPC 49153/tcp open msrpc Microsoft Windows RPC 49154/tcp open msrpc Microsoft Windows RPC 49156/tcp open msrpc Microsoft Windows RPC 49157/tcp open msrpc Microsoft Windows RPC 49158/tcp open msrpc Microsoft Windows RPC 49159/tcp open msrpc Microsoft Windows RPC Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows Host script results: |_smbv2-enabled: Server supports SMBv2 protocol | smb-os-discovery: | OS: Windows 7 Home Premium 7601 Service Pack 1 (Windows 7 Home Premium 6.1) | Computer name: kitchen | NetBIOS computer name: KITCHEN | Workgroup: RWSW |_ System time: 2012-10-23 07:42:15 UTC-4 | nbstat: | NetBIOS name: KITCHEN, NetBIOS user: , NetBIOS MAC: 00:1b:21:a4:32:bd (Intel Corporate) | Names | KITCHEN<00> Flags: | RWSW<00> Flags: | KITCHEN<20> Flags: | RWSW<1e> Flags: | RWSW<1d> Flags: |_ \x01\x02__MSBROWSE__\x02<01> Flags: | smb-security-mode: | Account that was used for smb scripts: | User-level authentication | SMB Security: Challenge/response passwords supported |_ Message signing disabled (dangerous, but default) Nmap scan report for 192.168.1.3 Host is up (0.051s latency). Not shown: 999 closed ports PORT STATE SERVICE VERSION 139/tcp open netbios-ssn Host script results: | nbstat: | NetBIOS name: SCANNER, NetBIOS user: DGERMAN, NetBIOS MAC: 00:50:fc:9c:e0:18 (Edimax Technology CO.) | Names | SCANNER<00> Flags: | RWSW<00> Flags: | SCANNER<03> Flags: | SCANNER<20> Flags: | RWSW<1e> Flags: |_ DGERMAN<03> Flags: |_smbv2-enabled: Server doesn't support SMBv2 protocol | smb-security-mode: | Account that was used for smb scripts: guest | Share-level authentication (dangerous) | SMB Security: Challenge/response passwords supported |_ Message signing disabled (dangerous, but default) Nmap scan report for smackerPro.germans (192.168.1.4) Host is up (0.0026s latency). Not shown: 991 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp? 22/tcp open ssh OpenSSH 5.9 (protocol 2.0) | ssh-hostkey: 1024 ab:c6:6c:32:c0:5e:f6:2e:5b:72:08:70:fc:d9:2b:c4 (DSA) |_2048 38:48:9e:a8:a6:07:a6:2d:48:87:e7:70:b9:55:9b:e8 (RSA) 80/tcp open http Apache httpd 2.2.22 ((Unix) DAV/2 mod_ssl/2.2.22 OpenSSL/0.9.8r) |_http-favicon: Unknown favicon MD5: 39FF423698D9620C94904949846CF87C |_http-methods: GET HEAD POST OPTIONS |_http-title: Site doesn't have a title (text/html). 445/tcp open microsoft-ds? 548/tcp open afp? | afp-serverinfo: | | Server Flags: 0x9ffb | | Super Client: Yes | | UUIDs: Yes | | UTF8 Server Name: Yes | | Open Directory: Yes | | Reconnect: Yes | | Server Notifications: Yes | | TCP/IP: Yes | | Server Signature: Yes | | ServerMessages: Yes | | Password Saving Prohibited: No | | Password Changing: Yes | |_ Copy File: Yes | Server Name: smackerPro | Machine Type: MacBookPro5,5 | AFP Versions: AFP3.4, AFP3.3, AFP3.2, AFP3.1, AFPX03 | UAMs: DHCAST128, DHX2, Recon1, Client Krb v2, GSS | Server Signature: 099e206221f75b02b3b09d404735f313 | Network Address 1: 192.168.1.4:548 | Network Address 2: [fe80:0000:0000:0000:fa1e:dfff:fed9:4788]:548 | Network Address 3: smackerpro.germans | Directory Name 1: host/smackerpro.germans@GERMANS |_ UTF8 Server Name: smackerPro 3031/tcp open appleevents Apple Remote Events 3306/tcp open mysql MySQL 5.5.17 | mysql-info: Protocol: 10 | Version: 5.5.17 | Thread ID: 5 | Some Capabilities: Long Passwords, Connect with DB, Compress, ODBC, Transactions, Secure Connection | Status: Autocommit |_Salt: 3(ljQ5S# 5900/tcp open vnc Apple remote desktop vnc | vnc-info: | Protocol version: 3.889 | Security types: | Mac OS X security type (30) | Unknown security type (31) | Unknown security type (32) |_ Mac OS X security type (35) 49152/tcp open http Apple ODS DVD/CD Sharing Agent httpd 1.0 |_http-methods: No Allow or Public header in OPTIONS response (status code 501) | http-auth: | HTTP/1.1 401 Unauthorized |_ Digest nonce=414d600305a268475ce594e0795926f2 realm=ODS 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port21-TCP:V=6.01%I=7%D=10/23%Time=50868218%P=x86_64-apple-darwin10.8.0 SF:%r(NULL,110,"220-\r\n\x20\x20\x20\x20This\x20is\x20192\.168\.1\.4\x20tn SF:ftpd\x20it\x20is\x20now\x20Tue\x20Oct\x2023\x2007:40:02\x202012\r\n\x20 SF:\x20\x20\x20\r\n\x20\x20\x20\x20You\x20are\x20connected\x20from\x20192\ SF:.168\.1\.4,\x20and\x20are\x20a\x20class\x20\x20user\.\r\n\x20\ SF:x20\x20\x20THe\x20CWD\x20is\x20/,\x20\r\n\x20\x20\x20\x20\r\n\x20\x20\x SF:20\x20\r\n\x20\x20\x20\x20/etc/ftpwelcome\x20\r\n\x20\x20\x20\x20\r\n22 SF:0\x20192\.168\.1\.4\x20FTP\x20server\x20\(tnftpd\x2020100324\+GSSAPI\)\ SF:x20ready\.\r\n")%r(GenericLines,152,"220-\r\n\x20\x20\x20\x20This\x20is SF:\x20192\.168\.1\.4\x20tnftpd\x20it\x20is\x20now\x20Tue\x20Oct\x2023\x20 SF:07:40:02\x202012\r\n\x20\x20\x20\x20\r\n\x20\x20\x20\x20You\x20are\x20c SF:onnected\x20from\x20192\.168\.1\.4,\x20and\x20are\x20a\x20class\x20\x20user\.\r\n\x20\x20\x20\x20THe\x20CWD\x20is\x20/,\x20\r\n\x20\x SF:20\x20\x20\r\n\x20\x20\x20\x20\r\n\x20\x20\x20\x20/etc/ftpwelcome\x20\r SF:\n\x20\x20\x20\x20\r\n220\x20192\.168\.1\.4\x20FTP\x20server\x20\(tnftp SF:d\x2020100324\+GSSAPI\)\x20ready\.\r\n500\x20'':\x20command\x20not\x20u SF:nderstood\.\r\n500\x20'':\x20command\x20not\x20understood\.\r\n")%r(Hel SF:p,3AD,"220-\r\n\x20\x20\x20\x20This\x20is\x20192\.168\.1\.4\x20tnftpd\x SF:20it\x20is\x20now\x20Tue\x20Oct\x2023\x2007:40:13\x202012\r\n\x20\x20\x SF:20\x20\r\n\x20\x20\x20\x20You\x20are\x20connected\x20from\x20192\.168\. SF:1\.4,\x20and\x20are\x20a\x20class\x20\x20user\.\r\n\x20\x20\x2 SF:0\x20THe\x20CWD\x20is\x20/,\x20\r\n\x20\x20\x20\x20\r\n\x20\x20\x20\x20 SF:\r\n\x20\x20\x20\x20/etc/ftpwelcome\x20\r\n\x20\x20\x20\x20\r\n220\x201 SF:92\.168\.1\.4\x20FTP\x20server\x20\(tnftpd\x2020100324\+GSSAPI\)\x20rea SF:dy\.\r\n214-\r\n\x20\x20\x20\x20The\x20following\x20commands\x20are\x20 SF:recognized\.\r\n\x20\x20\x20\x20\(`-'\x20=\x20not\x20implemented,\x20`\ SF:+'\x20=\x20supports\x20options\)\r\n\x20\x20\x20\x20USER\x20\x20\x20\x2 SF:0REIN-\x20\x20\x20TYPE\x20\x20\x20\x20ALLO\x20\x20\x20\x20MKD\x20\x20\x SF:20\x20\x20HELP\x20\x20\x20\x20MIC\x20\x20\x20\x20\x20MLST\+\x20\x20\x20 SF:MSND-\r\n\x20\x20\x20\x20PASS\x20\x20\x20\x20PORT\x20\x20\x20\x20STRU\x SF:20\x20\x20\x20REST\x20\x20\x20\x20PWD\x20\x20\x20\x20\x20NOOP\+\x20\x20 SF:\x20CONF\x20\x20\x20\x20MLSD\x20\x20\x20\x20MSOM-\r\n\x20\x20\x20\x20AC SF:CT-\x20\x20\x20LPRT\x20\x20\x20\x20MODE\x20\x20\x20\x20RNFR\x20\x20\x20 SF:\x20LIST\x20\x20\x20\x20AUTH\x20\x20\x20\x20ENC\x20\x20\x20\x20\x20MAIL SF:-\x20\x20\x20XCUP\r\n\x20\x20\x20\x20CWD\x20\x20\x20\x20\x20EPRT\x20\x2 SF:0\x20\x20RETR\x20\x20\x20\x20RNTO\x20\x20\x20\x20NLST\x20\x20\x20\x20AD SF:AT\x20\x20\x20\x20FEAT\x20\x20\x20\x20MLFL-\x20\x20\x20XCWD\r\n\x20\x20 SF:\x20\x20CDUP\x20\x20\x20\x20PASV\x20\x20\x20\x20STOR\x20\x20\x20\x20ABO SF:R\x20\x20\x20\x20SITE\x20\x20\x20\x20PROT\x20\x20\x20\x20OPTS\x20\x20\x SF:20\x20MRCP-\x20\x20\x20XMKD\r\n\x20\x20\x20\x20SMNT-\x20\x20\x20LPSV\x2 SF:0\x20\x20\x20STOU\x20\x20\x20\x20DELE\x20\x20\x20\x20SYST\x20\x20\x20\x SF:20PBSZ\x20\x20\x20\x20MDTM\x20\x20\x20\x20MRSQ-\x20\x20\x20XPWD\r\n\x20 SF:\x20\x20\x20QUIT\x20\x20\x20\x20EPSV\x20\x20\x20\x20APPE\x20\x20\x20\x2 SF:0RMD\x20\x20\x20\x20\x20STAT\x20\x20\x20\x20CCC\x20\x20\x20\x20\x20SIZE SF:\x20\x20\x20\x20MSAM-\x20\x20\x20XRMD\r\n214\x20D"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port548-TCP:V=6.01%I=7%D=10/23%Time=50868218%P=x86_64-apple-darwin10.8. SF:0%r(SSLSessionReq,17E,"\x01\x03\0\0Q\xec\xff\xff\0\0\x01n\0\0\0\0\0\x20 SF:\0\.\0R\0\0\x9f\xfb\nsmackerPro\0\0{\0\x8b\0\xbc\0\xde\0\xea\rMacBookPr SF:o5,5\x05\x06AFP3\.4\x06AFP3\.3\x06AFP3\.2\x06AFP3\.1\x06AFPX03\x05\tDHC SF:AST128\x04DHX2\x06Recon1\rClient\x20Krb\x20v2\x03GSS\t\x9e\x20b!\xf7\[\ SF:x02\xb3\xb0\x9d@G5\xf3\x13\x03\x08\x02\xc0\xa8\x01\x04\x02\$\x14\x07\xf SF:e\x80\0\0\0\0\0\0\xfa\x1e\xdf\xff\xfe\xd9G\x88\x02\$\x14\x04smackerpro\ SF:.germans\x01\x1fhost/smackerpro\.germans@GERMANS\0\0\nsmackerPro\0\0\0\ SF:x80`~\x06\x06\+\x06\x01\x05\x05\x02\xa0t0r\xa0D0B\x06\t\*\x86H\x82\xf7\ SF:x12\x01\x02\x02\x06\t\*\x86H\x86\xf7\x12\x01\x02\x02\x06\x06\*\x85p\+\x SF:0e\x03\x06\x06\+\x06\x01\x05\x05\x0e\x06\n\+\x06\x01\x04\x01\x827\x02\x SF:02\n\x06\x06\+\x05\x01\x05\x02\x07\x06\x06\+\x06\x01\x05\x02\x05\xa3\*0 SF:\(\xa0&\x1b\$not_defined_in_RFC4178@please_ignore")%r(SSLv23SessionReq, SF:17E,"\x01\x03\0\x80Q\xec\xff\xff\0\0\x01n\0\0\0\0\0\x20\0\.\0R\0\0\x9f\ SF:xfb\nsmackerPro\0\0{\0\x8b\0\xbc\0\xde\0\xea\rMacBookPro5,5\x05\x06AFP3 SF:\.4\x06AFP3\.3\x06AFP3\.2\x06AFP3\.1\x06AFPX03\x05\tDHCAST128\x04DHX2\x SF:06Recon1\rClient\x20Krb\x20v2\x03GSS\t\x9e\x20b!\xf7\[\x02\xb3\xb0\x9d@ SF:G5\xf3\x13\x03\x08\x02\xc0\xa8\x01\x04\x02\$\x14\x07\xfe\x80\0\0\0\0\0\ SF:0\xfa\x1e\xdf\xff\xfe\xd9G\x88\x02\$\x14\x04smackerpro\.germans\x01\x1f SF:host/smackerpro\.germans@GERMANS\0\0\nsmackerPro\0\0\0\x80`~\x06\x06\+\ SF:x06\x01\x05\x05\x02\xa0t0r\xa0D0B\x06\t\*\x86H\x82\xf7\x12\x01\x02\x02\ SF:x06\t\*\x86H\x86\xf7\x12\x01\x02\x02\x06\x06\*\x85p\+\x0e\x03\x06\x06\+ SF:\x06\x01\x05\x05\x0e\x06\n\+\x06\x01\x04\x01\x827\x02\x02\n\x06\x06\+\x SF:05\x01\x05\x02\x07\x06\x06\+\x06\x01\x05\x02\x05\xa3\*0\(\xa0&\x1b\$not SF:_defined_in_RFC4178@please_ignore")%r(afp,17E,"\x01\x03\0\x01\0\0\0\0\0 SF:\0\x01n\0\0\0\0\0\x20\0\.\0R\0\0\x9f\xfb\nsmackerPro\0\0{\0\x8b\0\xbc\0 SF:\xde\0\xea\rMacBookPro5,5\x05\x06AFP3\.4\x06AFP3\.3\x06AFP3\.2\x06AFP3\ SF:.1\x06AFPX03\x05\tDHCAST128\x04DHX2\x06Recon1\rClient\x20Krb\x20v2\x03G SF:SS\t\x9e\x20b!\xf7\[\x02\xb3\xb0\x9d@G5\xf3\x13\x03\x08\x02\xc0\xa8\x01 SF:\x04\x02\$\x14\x07\xfe\x80\0\0\0\0\0\0\xfa\x1e\xdf\xff\xfe\xd9G\x88\x02 SF:\$\x14\x04smackerpro\.germans\x01\x1fhost/smackerpro\.germans@GERMANS\0 SF:\0\nsmackerPro\0\0\0\x80`~\x06\x06\+\x06\x01\x05\x05\x02\xa0t0r\xa0D0B\ SF:x06\t\*\x86H\x82\xf7\x12\x01\x02\x02\x06\t\*\x86H\x86\xf7\x12\x01\x02\x SF:02\x06\x06\*\x85p\+\x0e\x03\x06\x06\+\x06\x01\x05\x05\x0e\x06\n\+\x06\x SF:01\x04\x01\x827\x02\x02\n\x06\x06\+\x05\x01\x05\x02\x07\x06\x06\+\x06\x SF:01\x05\x02\x05\xa3\*0\(\xa0&\x1b\$not_defined_in_RFC4178@please_ignore" SF:); Service Info: OS: Mac OS X; CPE: cpe:/o:apple:mac_os_x Nmap scan report for 192.168.1.6 Host is up (0.059s latency). Not shown: 985 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp FileZilla ftpd 0.9.41 beta 23/tcp open telnet Microsoft Windows XP telnetd 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn 445/tcp open netbios-ssn 554/tcp open rtsp? 2869/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) 5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-title: Service Unavailable |_http-methods: No Allow or Public header in OPTIONS response (status code 503) 10243/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-methods: No Allow or Public header in OPTIONS response (status code 404) |_http-title: Not Found 49152/tcp open msrpc Microsoft Windows RPC 49153/tcp open msrpc Microsoft Windows RPC 49154/tcp open msrpc Microsoft Windows RPC 49155/tcp open msrpc Microsoft Windows RPC 49156/tcp open msrpc Microsoft Windows RPC 49157/tcp open msrpc Microsoft Windows RPC Service Info: OSs: Windows, Windows XP; CPE: cpe:/o:microsoft:windows, cpe:/o:microsoft:windows_xp Host script results: | smb-security-mode: | Account that was used for smb scripts: guest | User-level authentication | SMB Security: Challenge/response passwords supported |_ Message signing disabled (dangerous, but default) |_smbv2-enabled: Server supports SMBv2 protocol | nbstat: | NetBIOS name: SLIGIGA, NetBIOS user: , NetBIOS MAC: 50:e5:49:df:6d:6a (Giga-byte Technology Co.) | Names | SLIGIGA<20> Flags: | SLIGIGA<00> Flags: | WORKGROUP<00> Flags: | WORKGROUP<1e> Flags: | WORKGROUP<1d> Flags: |_ \x01\x02__MSBROWSE__\x02<01> Flags: | smb-os-discovery: | OS: Windows 8 Release Preview 8400 (Windows 8 Release Preview 6.2) | NetBIOS computer name: SLIGIGA | Workgroup: WORKGROUP |_ System time: 2012-10-23 07:42:12 UTC-4 NSE: Script Post-scanning. Initiating NSE at 07:43 Completed NSE at 07:43, 0.00s elapsed Read data files from: /usr/local/bin/../share/nmap Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 8 IP addresses (5 hosts up) scanned in 207.15 seconds