RustScan
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/bbscute]
└─$ rustscan -a $IP
________________________________________
: http://discord.skerritt.blog :
: https://github.com/RustScan/RustScan :
--------------------------------------
Scanning ports faster than you can say 'SYN ACK'
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 10000.
Open 192.168.239.128:22
Open 192.168.239.128:80
Open 192.168.239.128:88
Open 192.168.239.128:110
Open 192.168.239.128:995
Nmap
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/bbscute]
└─$ nmap -p- -sC -sV -T5 --min-parallelism 100 --max-parallelism 256 $IP --open
Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-29 14:17 CEST
Nmap scan report for 192.168.239.128
Host is up (0.047s latency).
Not shown: 64243 closed tcp ports (reset), 1287 filtered tcp ports (no-response)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT STATE SERVICE VERSION
22/tcp open tcpwrapped
| ssh-hostkey:
| 2048 04:d0:6e:c4:ba:4a:31:5a:6f:b3:ee:b8:1b:ed:5a:b7 (RSA)
| 256 24:b3:df:01:0b:ca:c2:ab:2e:e9:49:b0:58:08:6a:fa (ECDSA)
|_ 256 6a:c4:35:6a:7a:1e:7e:51:85:5b:81:5c:7c:74:49:84 (ED25519)
80/tcp open tcpwrapped
|_http-server-header: Apache/2.4.38 (Debian)
|_http-title: Apache2 Debian Default Page: It works
88/tcp open tcpwrapped
110/tcp open tcpwrapped
| ssl-cert: Subject: commonName=localhost/organizationName=Courier Mail Server/stateOrProvinceName=NY/countryName=US
| Subject Alternative Name: email:postmaster@example.com
| Not valid before: 2020-09-17T16:28:06
|_Not valid after: 2021-09-17T16:28:06
|_ssl-date: TLS randomness does not represent time
|_pop3-capabilities: IMPLEMENTATION(Courier Mail Server) TOP STLS PIPELINING UIDL USER LOGIN-DELAY(10) UTF8(USER)
995/tcp open tcpwrapped
|_pop3-capabilities: TOP IMPLEMENTATION(Courier Mail Server) PIPELINING UIDL USER LOGIN-DELAY(10) UTF8(USER)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=localhost/organizationName=Courier Mail Server/stateOrProvinceName=NY/countryName=US
| Subject Alternative Name: email:postmaster@example.com
| Not valid before: 2020-09-17T16:28:06
|_Not valid after: 2021-09-17T16:28:06
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 34.14 seconds
The target system appears to be Debian
UDP
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/bbscute]
└─$ sudo nmap -sU --top-ports 1000 $IP --open
Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-29 14:17 CEST
Nmap scan report for 192.168.239.128
Host is up (0.023s latency).
Not shown: 996 closed udp ports (port-unreach)
PORT STATE SERVICE
631/udp open|filtered ipp
5353/udp open|filtered zeroconf
42508/udp open|filtered candp
46532/udp open|filtered unknown
Nmap done: 1 IP address (1 host up) scanned in 1089.37 seconds