You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
nmap --iflist
Starting Nmap 7.92 ( https://nmap.org ) at 2022-12-02 19:56 EST INTERFACES
DEV (SHORT) IP/MASK TYPE UP MTU MAC
lo (lo) 127.0.0.1/8 loopback up 65536
lo (lo) ::1/128 loopback up 65536
eth0 (eth0) 192.168.30.129/24 ethernet up 1500 00:0C:29:60:A9:B1
eth0 (eth0) fe80::20c:29ff:fe60:a9b1/64 ethernet up 1500 00:0C:29:60:A9:B1
tun0 (tun0) 10.10.14.2/23 point2point up 1500
tun0 (tun0) dead:beef:2::1000/64 point2point up 1500
tun0 (tun0) fe80::f391:6a99:405a:49d2/64 point2point up 1500
zsh: segmentation fault on most commands in version 7.92
output recieved
nmap -Pn --script vuln 10.129.251.11 -p 49666
Starting Nmap 7.92 ( https://nmap.org ) at 2022-12-02 19:46 EST
Pre-scan script results:
| broadcast-avahi-dos:
| Discovered hosts:
| 224.0.0.251
| After NULL UDP avahi packet DoS (CVE-2011-1002).
|_ Hosts are all up (not vulnerable).
Nmap scan report for 10.129.251.11
Host is up (0.32s latency).
PORT STATE SERVICE
49666/tcp open unknown
Nmap done: 1 IP address (1 host up) scanned in 53.74 seconds
zsh: segmentation fault nmap -Pn --script vuln 10.129.251.11 -p 49666
Expected behavior
Host script results:
| firewall-bypass:
|_ Firewall vulnerable to bypass through ftp helper. (IPv4)
Version info (please complete the following information):
OS: vmware pro on windows 11 home
nmap --version
:nmap --version
Nmap version 7.92 ( https://nmap.org )
Platform: x86_64-pc-linux-gnu
Compiled with: liblua-5.3.6 openssl-3.0.4 libssh2-1.10.0 libz-1.2.11 libpcre-8.39 nmap-libpcap-1.7.3 nmap-libdnet-1.12 ipv6
Compiled without:
Available nsock engines: epoll poll select
nmap --iflist
:nmap --iflist
Starting Nmap 7.92 ( https://nmap.org ) at 2022-12-02 19:56 EST
INTERFACES
DEV (SHORT) IP/MASK TYPE UP MTU MAC
lo (lo) 127.0.0.1/8 loopback up 65536
lo (lo) ::1/128 loopback up 65536
eth0 (eth0) 192.168.30.129/24 ethernet up 1500 00:0C:29:60:A9:B1
eth0 (eth0) fe80::20c:29ff:fe60:a9b1/64 ethernet up 1500 00:0C:29:60:A9:B1
tun0 (tun0) 10.10.14.2/23 point2point up 1500
tun0 (tun0) dead:beef:2::1000/64 point2point up 1500
tun0 (tun0) fe80::f391:6a99:405a:49d2/64 point2point up 1500
ROUTES
DST/MASK DEV METRIC GATEWAY
192.168.30.0/24 eth0 100
10.10.10.0/23 tun0 0 10.10.14.1
10.10.14.0/23 tun0 0
10.129.0.0/16 tun0 0 10.10.14.1
0.0.0.0/0 eth0 100 192.168.30.2
::1/128 lo 0
dead:beef:2::1000/128 tun0 0
fe80::20c:29ff:fe60:a9b1/128 eth0 0
fe80::f391:6a99:405a:49d2/128 tun0 0
::1/128 lo 256
dead:beef:2::/64 tun0 256
fe80::/64 tun0 256
dead:beef::/64 tun0 1024
fe80::/64 eth0 1024
ff00::/8 eth0 256
ff00::/8 tun0 256
The text was updated successfully, but these errors were encountered: