hacking wp
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-10-09 13:41 EDT
NSE: Loaded 156 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 13:41
Completed NSE at 13:41, 0.00s elapsed
Initiating NSE at 13:41
Completed NSE at 13:41, 0.00s elapsed
Initiating NSE at 13:41
Completed NSE at 13:41, 0.00s elapsed
Initiating Ping Scan at 13:41
Scanning www.jtkswk.gov.my (103.42.207.56) [4 ports]
Completed Ping Scan at 13:41, 0.03s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 13:41
Completed Parallel DNS resolution of 1 host. at 13:41, 0.48s elapsed
Initiating SYN Stealth Scan at 13:41
Scanning www.jtkswk.gov.my (103.42.207.56) [1000 ports]
Discovered open port 443/tcp on 103.42.207.56
Discovered open port 21/tcp on 103.42.207.56
Discovered open port 80/tcp on 103.42.207.56
Discovered open port 554/tcp on 103.42.207.56
Discovered open port 1723/tcp on 103.42.207.56
Completed SYN Stealth Scan at 13:41, 4.89s elapsed (1000 total ports)
Initiating Service scan at 13:41
Scanning 5 services on www.jtkswk.gov.my (103.42.207.56)
Completed Service scan at 13:41, 5.03s elapsed (5 services on 1 host)
Initiating OS detection (try #1) against www.jtkswk.gov.my (103.42.207.56)
Retrying OS detection (try #2) against www.jtkswk.gov.my (103.42.207.56)
Initiating Traceroute at 13:42
Completed Traceroute at 13:42, 0.03s elapsed
Initiating Parallel DNS resolution of 2 hosts. at 13:42
Completed Parallel DNS resolution of 2 hosts. at 13:42, 0.08s elapsed
NSE: Script scanning 103.42.207.56.
Initiating NSE at 13:42
Completed NSE at 13:42, 18.15s elapsed
Initiating NSE at 13:42
Completed NSE at 13:43, 68.30s elapsed
Initiating NSE at 13:43
Completed NSE at 13:43, 0.00s elapsed
Nmap scan report for www.jtkswk.gov.my (103.42.207.56)
Host is up (0.011s latency).
Other addresses for www.jtkswk.gov.my (not scanned): 2404:160:0:f:0:5:672a:cf38
Not shown: 995 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
21/tcp open tcpwrapped
80/tcp open tcpwrapped
|_http-title: Did not follow redirect to https://www.jtkswk.gov.my
|_http-server-header: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
443/tcp open ssl/tcpwrapped
|_http-server-header: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips
| http-title: Portal Rasmi Jabatan Tenaga Kerja Sarawak – Portal rasmi...
|_Requested resource was https://www.jtkswk.gov.my/v2/
| ssl-cert: Subject: commonName=www.jtkswk.gov.my/organizationName=JABATAN TENAGA KERJA SARAWAK/stateOrProvinceName=SARAWAK/countryName=MY
| Subject Alternative Name: DNS:www.jtkswk.gov.my, DNS:jtkswkapps.jtkswk.gov.my, DNS:jtkswk.gov.my
| Issuer: commonName=GlobalSign RSA OV SSL CA 2018/organizationName=GlobalSign nv-sa/countryName=BE
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2024-04-29T09:16:18
| Not valid after: 2025-05-31T09:16:17
| MD5: d994:5de0:bae0:332b:15f6:33ba:3e3f:f958
|_SHA-1: d5c2:20ad:f67b:fa22:0fe9:26d7:cbc9:0a3b:e412:896b
|_http-generator: WordPress 6.4.3
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_ssl-date: TLS randomness does not represent time
554/tcp open tcpwrapped
1723/tcp open tcpwrapped
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: bridge|general purpose
Running (JUST GUESSING): Oracle Virtualbox (93%), QEMU (89%)
OS CPE: cpe:/o:oracle:virtualbox cpe:/a:qemu:qemu
Aggressive OS guesses: Oracle Virtualbox (93%), QEMU user mode network gateway (89%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
TCP Sequence Prediction: Difficulty=20 (Good luck!)
IP ID Sequence Generation: Randomized
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 9.74 ms 10.0.2.2
2 9.82 ms 103.42.207.56
NSE: Script Post-scanning.
Initiating NSE at 13:43
Completed NSE at 13:43, 0.00s elapsed
Initiating NSE at 13:43
Completed NSE at 13:43, 0.00s elapsed
Initiating NSE at 13:43
Completed NSE at 13:43, 0.00s elapsed
Read data files from: /usr/share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 102.35 seconds
Raw packets sent: 2097 (97.252KB) | Rcvd: 48 (2.036KB)
Comments
Post a Comment