RustScan
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/dc-9]
└─$ rustscan --no-banner --scripts none -a $IP
Open 192.168.207.209:22
Open 192.168.207.209:80
Nmap
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/dc-9]
└─$ nmap -Pn -p- -T5 --min-parallelism 100 --max-parallelism 100 $IP --open
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-03 00:45 CEST
Nmap scan report for 192.168.207.209
Host is up (0.022s latency).
Not shown: 65533 closed tcp ports (reset)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
Nmap done: 1 IP address (1 host up) scanned in 22.44 seconds
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/dc-9]
└─$ nmap -Pn -sC -sV -p22,80 $IP
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-03 00:45 CEST
Nmap scan report for 192.168.207.209
Host is up (0.020s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u1 (protocol 2.0)
| ssh-hostkey:
| 2048 a2:b3:38:74:32:74:0b:c5:16:dc:13:de:cb:9b:8a:c3 (RSA)
| 256 06:5c:93:87:15:54:68:6b:88:91:55:cf:f8:9a:ce:40 (ECDSA)
|_ 256 e4:2c:88:da:88:63:26:8c:93:d5:f7:63:2b:a3:eb:ab (ED25519)
80/tcp open http Apache httpd 2.4.38 ((Debian))
|_http-server-header: Apache/2.4.38 (Debian)
|_http-title: Example.com - Staff Details - Welcome
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 16.79 seconds
The target system appears to be Debian
UDP
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/dc-9]
└─$ sudo nmap -Pn -sU -top-ports 1000 $IP
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-02 21:35 CEST
Nmap scan report for 192.168.207.209
Host is up (0.022s latency).
All 1000 scanned ports on 192.168.207.209 are in ignored states.
Not shown: 961 closed udp ports (port-unreach), 39 open|filtered udp ports (no-response)
Nmap done: 1 IP address (1 host up) scanned in 1050.31 seconds