┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/craft]└─$ rustscan -a $IP________________________________________: http://discord.skerritt.blog :: https://github.com/RustScan/RustScan : --------------------------------------I don't always scan ports, but when I do, I prefer RustScan.[~] The config file is expected to be at "/home/kali/.rustscan.toml"[~] Automatically increasing ulimit value to 10000.Open 192.168.138.169:80
Nmap
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/craft]└─$ nmap -Pn -p- $IP --openStarting Nmap 7.95 ( https://nmap.org ) at 2025-04-08 19:32 CESTNmap scan report for 192.168.138.169Host is up (0.028s latency).Not shown: 65529 filtered tcp ports (no-response), 5 filtered tcp ports (host-unreach)Some closed ports may be reported as filtered due to --defeat-rst-ratelimitPORT STATE SERVICE80/tcp open httpNmap done: 1 IP address (1 host up) scanned in 130.38 seconds
UDP
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/craft]└─$ sudo nmap -sU --top-ports 10000 $IPStarting Nmap 7.95 ( https://nmap.org ) at 2025-04-08 19:32 CESTNote: Host seems down. If it is really up, but blocking our ping probes, try -PnNmap done: 1 IP address (0 hosts up) scanned in 3.10 seconds