RustScan
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/compromised]
└─$ rustscan --no-banner --scripts none -a $IP
Open 192.168.225.152:80
Open 192.168.225.152:135
Open 192.168.225.152:139
Open 192.168.225.152:443
Open 192.168.225.152:445
Open 192.168.225.152:5985
Open 192.168.225.152:49666
192.168.225.152 -> [80,135,139,443,445,5985,49666]
Nmap
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/compromised]
└─$ nmap -Pn -p- -T5 --min-parallelism 100 --max-parallelism 100 $IP --open
Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-28 19:45 CEST
Nmap scan report for 192.168.225.152
Host is up (0.021s latency).
Not shown: 65528 filtered tcp ports (no-response)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT STATE SERVICE
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
5985/tcp open wsman
49666/tcp open unknown
Nmap done: 1 IP address (1 host up) scanned in 74.81 seconds
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/compromised]
└─$ nmap -Pn -sC -sV -p80,135,139,443,445,5985,49666 $IP
Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-28 19:48 CEST
Nmap scan report for 192.168.225.152
Host is up (0.021s latency).
PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
| http-methods:
|_ Potentially risky methods: TRACE
|_http-title: IIS Windows Server
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
443/tcp open ssl/http Microsoft IIS httpd 10.0
| tls-alpn:
|_ http/1.1
|_http-title: IIS Windows Server
|_ssl-date: 2025-06-28T17:50:15+00:00; -3s from scanner time.
| ssl-cert: Subject: commonName=PowerShellWebAccessTestWebSite
| Not valid before: 2021-06-01T08:00:08
|_Not valid after: 2021-08-30T08:00:08
| http-methods:
|_ Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/10.0
445/tcp open microsoft-ds?
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
49666/tcp open msrpc Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled but not required
| smb2-time:
| date: 2025-06-28T17:49:36
|_ start_date: N/A
|_clock-skew: mean: -3s, deviation: 0s, median: -4s
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 100.64 seconds
The target system appears to be a Windows host.
UDP
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/compromised]
└─$ sudo nmap -Pn -sU --top-ports 1000 $IP --open
Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-28 19:45 CEST
Nmap scan report for 192.168.225.152
Host is up.
All 1000 scanned ports on 192.168.225.152 are in ignored states.
Not shown: 1000 open|filtered udp ports (no-response)
Nmap done: 1 IP address (1 host up) scanned in 206.92 seconds