RustScan


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/flu]
└─$ rustscan -a $IP
________________________________________
: http://discord.skerritt.blog         :
: https://github.com/RustScan/RustScan :
 --------------------------------------
I dont always scan ports, but when I do, I prefer RustScan.
 
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 10000.
Open 192.168.144.41:22
Open 192.168.144.41:8090
Open 192.168.144.41:8091

Nmap


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/flu]
└─$ nmap -p- -sC -sV -T5 --min-parallelism 100 --max-parallelism 256 $IP
Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-03 09:55 CEST
Warning: 192.168.144.41 giving up on port because retransmission cap hit (2).
Nmap scan report for 192.168.144.41
Host is up (0.021s latency).
Not shown: 65216 closed tcp ports (reset), 316 filtered tcp ports (no-response)
PORT     STATE SERVICE  VERSION
22/tcp   open  ssh      OpenSSH 9.0p1 Ubuntu 1ubuntu8.5 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 02:79:64:84:da:12:97:23:77:8a:3a:60:20:96:ee:cf (ECDSA)
|_  256 dd:49:a3:89:d7:57:ca:92:f0:6c:fe:59:a6:24:cc:87 (ED25519)
8090/tcp open  http     Apache Tomcat (language: en)
| http-title: Log In - Confluence
|_Requested resource was /login.action?os_destination=%2Findex.action&permissionViolation=true
|_http-trane-info: Problem with XML parsing of /evox/about
8091/tcp open  jamlink?
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 204 No Content
|     Server: Aleph/0.4.6
|     Date: Thu, 03 Apr 2025 08:02:16 GMT
|     Connection: Close
|   GetRequest: 
|     HTTP/1.1 204 No Content
|     Server: Aleph/0.4.6
|     Date: Thu, 03 Apr 2025 08:01:45 GMT
|     Connection: Close
|   HTTPOptions: 
|     HTTP/1.1 200 OK
|     Access-Control-Allow-Origin: *
|     Access-Control-Max-Age: 31536000
|     Access-Control-Allow-Methods: OPTIONS, GET, PUT, POST
|     Server: Aleph/0.4.6
|     Date: Thu, 03 Apr 2025 08:01:44 GMT
|     Connection: Close
|     content-length: 0
|   Help, Kerberos, LDAPSearchReq, LPDString, SSLSessionReq, TLSSessionReq, TerminalServerCookie: 
|     HTTP/1.1 414 Request-URI Too Long
|     text is empty (possibly HTTP/0.9)
|   RTSPRequest: 
|     HTTP/1.1 200 OK
|     Access-Control-Allow-Origin: *
|     Access-Control-Max-Age: 31536000
|     Access-Control-Allow-Methods: OPTIONS, GET, PUT, POST
|     Server: Aleph/0.4.6
|     Date: Thu, 03 Apr 2025 08:01:45 GMT
|     Connection: Keep-Alive
|     content-length: 0
|   SIPOptions: 
|     HTTP/1.1 200 OK
|     Access-Control-Allow-Origin: *
|     Access-Control-Max-Age: 31536000
|     Access-Control-Allow-Methods: OPTIONS, GET, PUT, POST
|     Server: Aleph/0.4.6
|     Date: Thu, 03 Apr 2025 08:02:21 GMT
|     Connection: Keep-Alive
|_    content-length: 0
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port8091-TCP:V=7.95%I=7%D=4/3%Time=67EE4069%P=x86_64-pc-linux-gnu%r(Get
SF:Request,68,"HTTP/1\.1\x20204\x20No\x20Content\r\nServer:\x20Aleph/0\.4\
SF:.6\r\nDate:\x20Thu,\x2003\x20Apr\x202025\x2008:01:45\x20GMT\r\nConnecti
SF:on:\x20Close\r\n\r\n")%r(HTTPOptions,EC,"HTTP/1\.1\x20200\x20OK\r\nAcce
SF:ss-Control-Allow-Origin:\x20\*\r\nAccess-Control-Max-Age:\x2031536000\r
SF:\nAccess-Control-Allow-Methods:\x20OPTIONS,\x20GET,\x20PUT,\x20POST\r\n
SF:Server:\x20Aleph/0\.4\.6\r\nDate:\x20Thu,\x2003\x20Apr\x202025\x2008:01
SF::44\x20GMT\r\nConnection:\x20Close\r\ncontent-length:\x200\r\n\r\n")%r(
SF:RTSPRequest,F1,"HTTP/1\.1\x20200\x20OK\r\nAccess-Control-Allow-Origin:\
SF:x20\*\r\nAccess-Control-Max-Age:\x2031536000\r\nAccess-Control-Allow-Me
SF:thods:\x20OPTIONS,\x20GET,\x20PUT,\x20POST\r\nServer:\x20Aleph/0\.4\.6\
SF:r\nDate:\x20Thu,\x2003\x20Apr\x202025\x2008:01:45\x20GMT\r\nConnection:
SF:\x20Keep-Alive\r\ncontent-length:\x200\r\n\r\n")%r(Help,46,"HTTP/1\.1\x
SF:20414\x20Request-URI\x20Too\x20Long\r\n\r\ntext\x20is\x20empty\x20\(pos
SF:sibly\x20HTTP/0\.9\)")%r(SSLSessionReq,46,"HTTP/1\.1\x20414\x20Request-
SF:URI\x20Too\x20Long\r\n\r\ntext\x20is\x20empty\x20\(possibly\x20HTTP/0\.
SF:9\)")%r(TerminalServerCookie,46,"HTTP/1\.1\x20414\x20Request-URI\x20Too
SF:\x20Long\r\n\r\ntext\x20is\x20empty\x20\(possibly\x20HTTP/0\.9\)")%r(TL
SF:SSessionReq,46,"HTTP/1\.1\x20414\x20Request-URI\x20Too\x20Long\r\n\r\nt
SF:ext\x20is\x20empty\x20\(possibly\x20HTTP/0\.9\)")%r(Kerberos,46,"HTTP/1
SF:\.1\x20414\x20Request-URI\x20Too\x20Long\r\n\r\ntext\x20is\x20empty\x20
SF:\(possibly\x20HTTP/0\.9\)")%r(FourOhFourRequest,68,"HTTP/1\.1\x20204\x2
SF:0No\x20Content\r\nServer:\x20Aleph/0\.4\.6\r\nDate:\x20Thu,\x2003\x20Ap
SF:r\x202025\x2008:02:16\x20GMT\r\nConnection:\x20Close\r\n\r\n")%r(LPDStr
SF:ing,46,"HTTP/1\.1\x20414\x20Request-URI\x20Too\x20Long\r\n\r\ntext\x20i
SF:s\x20empty\x20\(possibly\x20HTTP/0\.9\)")%r(LDAPSearchReq,46,"HTTP/1\.1
SF:\x20414\x20Request-URI\x20Too\x20Long\r\n\r\ntext\x20is\x20empty\x20\(p
SF:ossibly\x20HTTP/0\.9\)")%r(SIPOptions,F1,"HTTP/1\.1\x20200\x20OK\r\nAcc
SF:ess-Control-Allow-Origin:\x20\*\r\nAccess-Control-Max-Age:\x2031536000\
SF:r\nAccess-Control-Allow-Methods:\x20OPTIONS,\x20GET,\x20PUT,\x20POST\r\
SF:nServer:\x20Aleph/0\.4\.6\r\nDate:\x20Thu,\x2003\x20Apr\x202025\x2008:0
SF:2:21\x20GMT\r\nConnection:\x20Keep-Alive\r\ncontent-length:\x200\r\n\r\
SF:n");
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
 
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 484.24 seconds

The target system appears to be Ubuntu