RustScan


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/spidersociety]
└─$ rustscan --no-banner --scripts none -a $IP 
 
Open 192.168.210.214:22
Open 192.168.210.214:80
Open 192.168.210.214:2121
192.168.210.214 -> [22,80,2121]

Nmap


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/spidersociety]
└─$ nmap -Pn -p- -T5 --min-parallelism 100 --max-parallelism 100 $IP --open
Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-26 17:09 CEST
Nmap scan report for 192.168.210.214
Host is up (0.021s latency).
Not shown: 56138 filtered tcp ports (no-response), 9394 closed tcp ports (reset)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT     STATE SERVICE
22/tcp   open  ssh
80/tcp   open  http
2121/tcp open  ccproxy-ftp
 
Nmap done: 1 IP address (1 host up) scanned in 66.87 seconds
 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/spidersociety]
└─$ nmap -Pn -sC -sV -p22,80,2121 $IP
Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-26 17:12 CEST
Nmap scan report for 192.168.210.214
Host is up (0.021s latency).
 
PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 9.6p1 Ubuntu 3ubuntu13.9 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 f2:5a:a9:66:65:3e:d0:b8:9d:a5:16:8c:e8:16:37:e2 (ECDSA)
|_  256 9b:2d:1d:f8:13:74:ce:96:82:4e:19:35:f9:7e:1b:68 (ED25519)
80/tcp   open  http    Apache httpd 2.4.58 ((Ubuntu))
|_http-server-header: Apache/2.4.58 (Ubuntu)
|_http-title: Spider Society
2121/tcp open  ftp     vsftpd 3.0.5
Service Info: OSs: Linux, Unix; CPE: cpe:/o:linux:linux_kernel
 
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 17.15 seconds

The target system appears to be Ubuntu

UDP


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/spidersociety]
└─$ sudo nmap -Pn -sU --top-ports 1000 $IP --open
[sudo] password for kali: 
Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-26 17:12 CEST
Nmap scan report for 192.168.210.214
Host is up.
All 1000 scanned ports on 192.168.210.214 are in ignored states.
Not shown: 1000 open|filtered udp ports (no-response)
 
Nmap done: 1 IP address (1 host up) scanned in 206.95 seconds