RustScan


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/craft]
└─$ rustscan -a $IP
________________________________________
: http://discord.skerritt.blog         :
: https://github.com/RustScan/RustScan :
 --------------------------------------
I don't always scan ports, but when I do, I prefer RustScan.
 
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 10000.
Open 192.168.138.169:80

Nmap


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/craft]
└─$ nmap -Pn -p- $IP --open
Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-08 19:32 CEST
Nmap scan report for 192.168.138.169
Host is up (0.028s latency).
Not shown: 65529 filtered tcp ports (no-response), 5 filtered tcp ports (host-unreach)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT   STATE SERVICE
80/tcp open  http
 
Nmap done: 1 IP address (1 host up) scanned in 130.38 seconds
 
 
 

UDP


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/craft]
└─$ sudo nmap -sU --top-ports 10000 $IP
Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-08 19:32 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.10 seconds