RustScan


┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/insanityhosting]
└─$ rustscan --no-banner --scripts none -a $IP 
 
Open 192.168.207.124:21
Open 192.168.207.124:22
Open 192.168.207.124:80
192.168.207.124 -> [21,22,80]

Nmap


┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/insanityhosting]
└─$ nmap -Pn -p- -T5 --min-parallelism 100 --max-parallelism 100 $IP --open 
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-03 21:09 CEST
Nmap scan report for 192.168.207.124
Host is up (0.021s latency).
Not shown: 65467 filtered tcp ports (no-response), 65 filtered tcp ports (host-prohibited)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT   STATE SERVICE
21/tcp open  ftp
22/tcp open  ssh
80/tcp open  http
 
Nmap done: 1 IP address (1 host up) scanned in 75.68 seconds
 
 
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/insanityhosting]
└─$ nmap -Pn -sC -sV -p21,22,80 $IP                                          
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-03 21:11 CEST
Nmap scan report for 192.168.207.124
Host is up (0.020s latency).
 
PORT   STATE SERVICE VERSION
21/tcp open  ftp     vsftpd 3.0.2
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_Can't get directory listing: ERROR
| ftp-syst: 
|   STAT: 
| FTP server status:
|      Connected to ::ffff:192.168.45.158
|      Logged in as ftp
|      TYPE: ASCII
|      No session bandwidth limit
|      Session timeout in seconds is 300
|      Control connection is plain text
|      Data connections will be plain text
|      At session startup, client count was 2
|      vsFTPd 3.0.2 - secure, fast, stable
|_End of status
22/tcp open  ssh     OpenSSH 7.4 (protocol 2.0)
| ssh-hostkey: 
|   2048 85:46:41:06:da:83:04:01:b0:e4:1f:9b:7e:8b:31:9f (RSA)
|   256 e4:9c:b1:f2:44:f1:f0:4b:c3:80:93:a9:5d:96:98:d3 (ECDSA)
|_  256 65:cf:b4:af:ad:86:56:ef:ae:8b:bf:f2:f0:d9:be:10 (ED25519)
80/tcp open  http    Apache httpd 2.4.6 ((CentOS) PHP/7.2.33)
|_http-title: Insanity - UK and European Servers
|_http-server-header: Apache/2.4.6 (CentOS) PHP/7.2.33
| http-methods: 
|_  Potentially risky methods: TRACE
Service Info: OS: Unix
 
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 23.85 seconds

The target system appears to be CentOS

UDP


┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/insanityhosting]
└─$ sudo nmap -Pn -sU -top-ports 1000 $IP
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-03 21:09 CEST
Nmap scan report for 192.168.207.124
Host is up (0.022s latency).
All 1000 scanned ports on 192.168.207.124 are in ignored states.
Not shown: 1000 filtered udp ports (host-prohibited)
 
Nmap done: 1 IP address (1 host up) scanned in 1146.23 seconds