RustScan
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/insanityhosting]
└─$ rustscan --no-banner --scripts none -a $IP
Open 192.168.207.124:21
Open 192.168.207.124:22
Open 192.168.207.124:80
192.168.207.124 -> [21,22,80]
Nmap
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/insanityhosting]
└─$ nmap -Pn -p- -T5 --min-parallelism 100 --max-parallelism 100 $IP --open
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-03 21:09 CEST
Nmap scan report for 192.168.207.124
Host is up (0.021s latency).
Not shown: 65467 filtered tcp ports (no-response), 65 filtered tcp ports (host-prohibited)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
80/tcp open http
Nmap done: 1 IP address (1 host up) scanned in 75.68 seconds
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/insanityhosting]
└─$ nmap -Pn -sC -sV -p21,22,80 $IP
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-03 21:11 CEST
Nmap scan report for 192.168.207.124
Host is up (0.020s latency).
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 3.0.2
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_Can't get directory listing: ERROR
| ftp-syst:
| STAT:
| FTP server status:
| Connected to ::ffff:192.168.45.158
| Logged in as ftp
| TYPE: ASCII
| No session bandwidth limit
| Session timeout in seconds is 300
| Control connection is plain text
| Data connections will be plain text
| At session startup, client count was 2
| vsFTPd 3.0.2 - secure, fast, stable
|_End of status
22/tcp open ssh OpenSSH 7.4 (protocol 2.0)
| ssh-hostkey:
| 2048 85:46:41:06:da:83:04:01:b0:e4:1f:9b:7e:8b:31:9f (RSA)
| 256 e4:9c:b1:f2:44:f1:f0:4b:c3:80:93:a9:5d:96:98:d3 (ECDSA)
|_ 256 65:cf:b4:af:ad:86:56:ef:ae:8b:bf:f2:f0:d9:be:10 (ED25519)
80/tcp open http Apache httpd 2.4.6 ((CentOS) PHP/7.2.33)
|_http-title: Insanity - UK and European Servers
|_http-server-header: Apache/2.4.6 (CentOS) PHP/7.2.33
| http-methods:
|_ Potentially risky methods: TRACE
Service Info: OS: Unix
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 23.85 seconds
The target system appears to be CentOS
UDP
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/insanityhosting]
└─$ sudo nmap -Pn -sU -top-ports 1000 $IP
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-03 21:09 CEST
Nmap scan report for 192.168.207.124
Host is up (0.022s latency).
All 1000 scanned ports on 192.168.207.124 are in ignored states.
Not shown: 1000 filtered udp ports (host-prohibited)
Nmap done: 1 IP address (1 host up) scanned in 1146.23 seconds