scanning web
open port scan shell sudo nmap -sS -p- -T4 192.168.1.108 scan result text PORT STATE SERVICE 21/tcp filtered ftp 22/tcp open ssh 53/tcp filtered domain 80/tcp open http MAC Address: 90:78:41:AD:C7:5D (Intel Corporate) Scan for details shell nmap -sV --script=vuln -p22,80 -T4 192.168.1.108 scan result text PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0) | vulners: | cpe:/a:openbsd:openssh:7.9p1: | EXPLOITPACK:98FE96309F9524B8C84C508837551A19 5.8 https://vulners.com/exploitpack/EXPLOITPACK:98FE96309F9524B8C84C508837551A19 *EXPLOIT* | EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97 5.8 https://vulners.com/exploitpack/EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97 *EXPLOIT* | EDB-ID:46516 5.8 https://vulners.com/exploitdb/EDB-ID:46516 *EXPLOIT* | ...