RustScan


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/shifty]
└─$ rustscan -a $IP
________________________________________
: http://discord.skerritt.blog         :
: https://github.com/RustScan/RustScan :
 --------------------------------------
🌍HACK THE PLANET🌍
 
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 10000.
Open 192.168.219.59:22
Open 192.168.219.59:80
Open 192.168.219.59:5000
Open 192.168.219.59:11211

Nmap


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/shifty]
└─$ nmap -p- $IP
Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-05 10:50 CET
Nmap scan report for 192.168.219.59
Host is up (0.033s latency).
Not shown: 65530 filtered tcp ports (no-response)
PORT      STATE  SERVICE
22/tcp    open   ssh
80/tcp    open   http
5000/tcp  open   upnp
11211/tcp open   memcache
 
Nmap done: 1 IP address (1 host up) scanned in 176.59 seconds
 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/shifty]
└─$ nmap -p- -sC -sV -T5 --min-parallelism 100 --max-parallelism 256 $IP
Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-05 10:54 CET
Nmap scan report for 192.168.219.59
Host is up (0.026s latency).
Not shown: 65530 filtered tcp ports (no-response)
PORT      STATE  SERVICE   VERSION
22/tcp    open   ssh       OpenSSH 7.4p1 Debian 10+deb9u7 (protocol 2.0)
| ssh-hostkey: 
|   2048 54:d8:d1:1a:e4:8c:66:48:37:ba:89:0a:9b:aa:db:47 (RSA)
|   256 fb:75:84:86:ec:b5:00:f3:4f:cb:c8:f2:18:85:42:b7 (ECDSA)
|_  256 2f:fd:b2:b1:6c:02:e8:a0:ba:e7:f7:52:80:3f:de:a3 (ED25519)
80/tcp    open   http      nginx 1.10.3
|_http-title: Gatsby + Netlify CMS Starter
|_http-server-header: nginx/1.10.3
|_http-generator: Gatsby 2.22.15
5000/tcp  open   http      Werkzeug httpd 1.0.1 (Python 3.5.3)
|_http-title: Hello, world!
|_http-server-header: Werkzeug/1.0.1 Python/3.5.3
11211/tcp open   memcached Memcached 1.4.33 (uptime 403 seconds)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
 
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 59.72 seconds

The target system appear to be Debian

UDP


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/shifty]
└─$ sudo nmap -sU -Pn -top-ports 1000 $IP
[sudo] password for kali: 
Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-05 10:54 CET
Nmap scan report for 192.168.219.59
Host is up.
All 1000 scanned ports on 192.168.219.59 are in ignored states.
Not shown: 1000 open|filtered udp ports (no-response)
 
Nmap done: 1 IP address (1 host up) scanned in 201.41 seconds