RustScan


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/xposedapi]
└─$ rustscan -a $IP
________________________________________
: http://discord.skerritt.blog         :
: https://github.com/RustScan/RustScan :
 --------------------------------------
I don't always scan ports, but when I do, I prefer RustScan.
 
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 10000.
Open 192.168.209.134:22
Open 192.168.209.134:13337

Nmap


 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/xposedapi]
└─$ nmap -sS -sC -sV -p22,13337 $IP
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-06 18:05 CET
Nmap scan report for 192.168.209.134
Host is up (0.57s latency).
 
PORT      STATE SERVICE VERSION
22/tcp    open  ssh     OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey: 
|   2048 74:ba:20:23:89:92:62:02:9f:e7:3d:3b:83:d4:d9:6c (RSA)
|   256 54:8f:79:55:5a:b0:3a:69:5a:d5:72:39:64:fd:07:4e (ECDSA)
|_  256 7f:5d:10:27:62:ba:75:e9:bc:c8:4f:e2:72:87:d4:e2 (ED25519)
13337/tcp open  http    Gunicorn 20.0.4
|_http-title: Remote Software Management API
|_http-server-header: gunicorn/20.0.4
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
 
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.36 seconds

The target system appears to be Debian

UDP


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE]
└─$ sudo nmap -sU -Pn -top-ports 1000 $IP
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-06 20:27 CET
Nmap scan report for 192.168.209.134
Host is up (0.026s latency).
All 1000 scanned ports on 192.168.209.134 are in ignored states.
Not shown: 1000 closed udp ports (port-unreach)
 
Nmap done: 1 IP address (1 host up) scanned in 1098.45 seconds