RustScan


┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/dc-9]
└─$ rustscan --no-banner --scripts none -a $IP 
 
Open 192.168.207.209:22
Open 192.168.207.209:80

Nmap


┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/dc-9]
└─$ nmap -Pn -p- -T5 --min-parallelism 100 --max-parallelism 100 $IP --open 
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-03 00:45 CEST
Nmap scan report for 192.168.207.209
Host is up (0.022s latency).
Not shown: 65533 closed tcp ports (reset)
PORT   STATE SERVICE
22/tcp open  ssh
80/tcp open  http
 
Nmap done: 1 IP address (1 host up) scanned in 22.44 seconds
 
 
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/dc-9]
└─$ nmap -Pn -sC -sV -p22,80 $IP
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-03 00:45 CEST
Nmap scan report for 192.168.207.209
Host is up (0.020s latency).
 
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.9p1 Debian 10+deb10u1 (protocol 2.0)
| ssh-hostkey: 
|   2048 a2:b3:38:74:32:74:0b:c5:16:dc:13:de:cb:9b:8a:c3 (RSA)
|   256 06:5c:93:87:15:54:68:6b:88:91:55:cf:f8:9a:ce:40 (ECDSA)
|_  256 e4:2c:88:da:88:63:26:8c:93:d5:f7:63:2b:a3:eb:ab (ED25519)
80/tcp open  http    Apache httpd 2.4.38 ((Debian))
|_http-server-header: Apache/2.4.38 (Debian)
|_http-title: Example.com - Staff Details - Welcome
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
 
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 16.79 seconds

The target system appears to be Debian

UDP


┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/dc-9]
└─$ sudo nmap -Pn -sU -top-ports 1000 $IP          
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-02 21:35 CEST
Nmap scan report for 192.168.207.209
Host is up (0.022s latency).
All 1000 scanned ports on 192.168.207.209 are in ignored states.
Not shown: 961 closed udp ports (port-unreach), 39 open|filtered udp ports (no-response)
 
Nmap done: 1 IP address (1 host up) scanned in 1050.31 seconds