RustScan


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/zenphoto]
└─$ rustscan -a $IP
________________________________________
: http://discord.skerritt.blog         :
: https://github.com/RustScan/RustScan :
 --------------------------------------
I dont always scan ports, but when I do, I prefer RustScan.
 
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 10000.
Open 192.168.132.41:22
Open 192.168.132.41:23
Open 192.168.132.41:80
Open 192.168.132.41:3306

Nmap


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/zenphoto]
└─$ nmap -p- -sC -sV -T5 --min-parallelism 100 --max-parallelism 256 $IP
Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-24 13:50 CET
Warning: 192.168.132.41 giving up on port because retransmission cap hit (2).
Nmap scan report for 192.168.132.41
Host is up (0.023s latency).
Not shown: 65531 closed tcp ports (reset)
PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 5.3p1 Debian 3ubuntu7 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   1024 83:92:ab:f2:b7:6e:27:08:7b:a9:b8:72:32:8c:cc:29 (DSA)
|_  2048 65:77:fa:50:fd:4d:9e:f1:67:e5:cc:0c:c6:96:f2:3e (RSA)
23/tcp   open  ipp     CUPS 1.4
|_http-server-header: CUPS/1.4
|_http-title: 403 Forbidden
| http-methods: 
|_  Potentially risky methods: PUT
80/tcp   open  http    Apache httpd 2.2.14 ((Ubuntu))
|_http-server-header: Apache/2.2.14 (Ubuntu)
|_http-title: Site doesn't have a title (text/html).
3306/tcp open  mysql   MySQL (unauthorized)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
 
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 57.10 seconds

The target system appears to be Ubuntu

UDP


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/zenphoto]
└─$ sudo nmap -sU --top-ports 1000 $IP
Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-24 14:17 CET
Nmap scan report for 192.168.132.41
Host is up (0.020s latency).
Not shown: 998 closed udp ports (port-unreach)
PORT      STATE         SERVICE
5353/udp  open          zeroconf
18134/udp open|filtered unknown
 
Nmap done: 1 IP address (1 host up) scanned in 1021.29 seconds