RustScan


┌──(kali㉿kali)-[~/archive/htb/labs/solidstate]
└─$ rustscan -a $IP --ulimit=5000
The Modern Day Port Scanner.
________________________________________
: https://discord.gg/GFrQsGy           :
: https://github.com/RustScan/RustScan :
 --------------------------------------
😵 https://admin.tryhackme.com
 
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 5000.
open 10.10.10.51:25
open 10.10.10.51:22
open 10.10.10.51:80
open 10.10.10.51:110
open 10.10.10.51:119
open 10.10.10.51:4555

Nmap


┌──(kali㉿kali)-[~/archive/htb/labs/solidstate]
└─$ sudo nmap -AO -p22,25,80,110,119,4555 $IP 
Starting Nmap 7.93 ( https://nmap.org ) at 2023-01-18 19:05 CEST
Nmap scan report for 10.10.10.51
Host is up (0.029s latency).
 
PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 7.4p1 Debian 10+deb9u1 (protocol 2.0)
| ssh-hostkey: 
|   2048 770084f578b9c7d354cf712e0d526d8b (RSA)
|   256 78b83af660190691f553921d3f48ed53 (ECDSA)
|_  256 e445e9ed074d7369435a12709dc4af76 (ED25519)
25/tcp   open  smtp    JAMES smtpd 2.3.2
|_smtp-commands: solidstate Hello nmap.scanme.org (10.10.14.7 [10.10.14.7])
| smtp-open-relay: Server is an open relay (2/16 tests)
|  MAIL FROM:<> -> RCPT TO:<relaytest@nmap.scanme.org>
|_ SMTP: RSET 550 5.7.1 Requested action not taken: relaying denied\x0D
80/tcp   open  http    Apache httpd 2.4.25 ((Debian))
|_http-title: Home - Solid State Security
|_http-server-header: Apache/2.4.25 (Debian)
110/tcp  open  pop3    JAMES pop3d 2.3.2
Service Info: Host: solidstate
119/tcp  open  nntp    JAMES nntpd (posting ok)
4555/tcp open  rsip?
| fingerprint-strings: 
|   GenericLines: 
|     JAMES Remote Administration Tool 2.3.2
|     Please enter your login and password
|     Login id:
|     Password:
|     Login failed for 
|_    Login id:
 
Network Distance: 2 hops
Service Info: Host: solidstate; OS: Linux; CPE: cpe:/o:linux:linux_kernel
 
TRACEROUTE (using port 25/tcp)
HOP RTT      ADDRESS
1   29.05 ms 10.10.14.1
2   29.17 ms 10.10.10.51
 
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 264.43 seconds