University of Texas Nmap and Sparta Vulnerability Scanning Report


Description

The continued narrations environing endangers and facts exfiltrations affair our CISO. The CISO is deeply affaired environing our Product Innovation Lair’s Lab (PILL) now that it has been upgraded. You can solely get mode to the PILL in the CSL. The PILL netoperation is located at 192.168.101.150-205. Take caution to not mode anything adown 150 as it accomplish be logged and fix you get no praise for this operation. Using the Kali2 implied utensil reconnoitre the 150-205 rank to see what boxes are on PILL and what may or may not be weak. Then use any other dupes you elect on the Kali2 VM to individualize risks on PILL. But bear-in-mind, the goal is not to document any of the utensils on PILL. If you use a dupe that documents utensils on PILL you may feel points deducted. You can solely mode the internet in the rest (the equable completion) proximate to the target rank utensils if you insufficiency to do online discovery. You can login after a while your CSL completionitys (firstname.lastname) on those utensils. Special notes: 1) Mode to the Target Rank (TR).  2) All utensils after a while TR mode are identifiable after a while a quibble lection Target Rank on the warner 3) If the location is public and beneficial, sit down and flip the quibble to the tail of the warner and log in after a while the .\MIL1 completionity on the whiteboard 5) Verify that you are on the punish netoperation by placing the mouse icon balance the netoperation icon in the SYSTRAY foregoing to starting the exercise/project/homework. It should peruse Enterprise.net 6) Continue after a while your operation to amount 7) If you endanger any utensil on the Enterprise.net network, fascinate communicate a Lab Assistant without-delay so they can reset the endangerd utensil 8) When perfect fascinate draw the Target Rank tract tail balance to the face of the warner so that appended students entering the lab can also mode the punish network. 

POST

Starting Nmap 7.70 ( https://nmap.org ) at 2020-02-25 18:14 CSTNSE: Loaded 148 scripts for reconnoitrening.NSE: Script Pre-scanning.Initiating NSE at 18:14Completed NSE at 18:14, 0.00s spentInitiating NSE at 18:14Completed NSE at 18:14, 0.00s spentInitiating ARP Ping Reconnoitre at 18:14Scanning 55 multitudes [1 carriage/host]Completed ARP Ping Reconnoitre at 18:14, 0.47s spent (55 completion multitudes)Initiating Parallel DNS disentanglement of 55 multitudes. at 18:14Completed Parallel DNS disentanglement of 55 multitudes. at 18:14, 0.00s spentNmap reconnoitre narration for 192.168.101.151 [multitude down]Nmap reconnoitre narration for 192.168.101.153 [multitude down]Nmap reconnoitre narration for 192.168.101.159 [multitude down]Nmap reconnoitre narration for 192.168.101.160 [multitude down]Nmap reconnoitre narration for 192.168.101.161 [multitude down]Nmap reconnoitre narration for 192.168.101.162 [multitude down]Nmap reconnoitre narration for 192.168.101.163 [multitude down]Nmap reconnoitre narration for 192.168.101.164 [multitude down]Nmap reconnoitre narration for 192.168.101.172 [multitude down]Nmap reconnoitre narration for 192.168.101.174 [multitude down]Nmap reconnoitre narration for 192.168.101.175 [multitude down]Nmap reconnoitre narration for 192.168.101.177 [multitude down]Nmap reconnoitre narration for 192.168.101.178 [multitude down]Nmap reconnoitre narration for 192.168.101.179 [multitude down]Nmap reconnoitre narration for 192.168.101.180 [multitude down]Nmap reconnoitre narration for 192.168.101.181 [multitude down]Nmap reconnoitre narration for 192.168.101.182 [multitude down]Nmap reconnoitre narration for 192.168.101.183 [multitude down]Nmap reconnoitre narration for 192.168.101.184 [multitude down]Nmap reconnoitre narration for 192.168.101.185 [multitude down]Nmap reconnoitre narration for 192.168.101.186 [multitude down]Nmap reconnoitre narration for 192.168.101.187 [multitude down]Nmap reconnoitre narration for 192.168.101.188 [multitude down]Nmap reconnoitre narration for 192.168.101.189 [multitude down]Nmap reconnoitre narration for 192.168.101.190 [multitude down]Nmap reconnoitre narration for 192.168.101.191 [multitude down]Nmap reconnoitre narration for 192.168.101.193 [multitude down]Nmap reconnoitre narration for 192.168.101.194 [multitude down]Nmap reconnoitre narration for 192.168.101.195 [multitude down]Nmap reconnoitre narration for 192.168.101.196 [multitude down]Nmap reconnoitre narration for 192.168.101.198 [multitude down]Nmap reconnoitre narration for 192.168.101.199 [multitude down]Nmap reconnoitre narration for 192.168.101.200 [multitude down]Nmap reconnoitre narration for 192.168.101.201 [multitude down]Nmap reconnoitre narration for 192.168.101.202 [multitude down]Nmap reconnoitre narration for 192.168.101.204 [multitude down]Nmap reconnoitre narration for 192.168.101.205 [multitude down]Initiating Parallel DNS disentanglement of 1 multitude. at 18:14Completed Parallel DNS disentanglement of 1 multitude. at 18:14, 0.00s spentInitiating SYN Stealth Reconnoitre at 18:14Scanning 18 multitudes [1000 carriages/host]Discovered public carriage 139/tcp on 192.168.101.156Discovered public carriage 139/tcp on 192.168.101.169Discovered public carriage 139/tcp on 192.168.101.203Discovered public carriage 25/tcp on 192.168.101.203Discovered public carriage 5900/tcp on 192.168.101.203Discovered public carriage 5900/tcp on 192.168.101.192Discovered public carriage 111/tcp on 192.168.101.203Discovered public carriage 111/tcp on 192.168.101.150Discovered public carriage 111/tcp on 192.168.101.155Discovered public carriage 554/tcp on 192.168.101.197Discovered public carriage 53/tcp on 192.168.101.203Discovered public carriage 53/tcp on 192.168.101.169Discovered public carriage 443/tcp on 192.168.101.170Discovered public carriage 445/tcp on 192.168.101.169Discovered public carriage 445/tcp on 192.168.101.203Discovered public carriage 3389/tcp on 192.168.101.154Discovered public carriage 21/tcp on 192.168.101.203Discovered public carriage 21/tcp on 192.168.101.197Discovered public carriage 3306/tcp on 192.168.101.203Discovered public carriage 23/tcp on 192.168.101.203Discovered public carriage 22/tcp on 192.168.101.169Discovered public carriage 22/tcp on 192.168.101.192Discovered public carriage 22/tcp on 192.168.101.203Discovered public carriage 22/tcp on 192.168.101.171Discovered public carriage 22/tcp on 192.168.101.173Discovered public carriage 80/tcp on 192.168.101.203Discovered public carriage 80/tcp on 192.168.101.197Discovered public carriage 514/tcp on 192.168.101.203Discovered public carriage 6000/tcp on 192.168.101.203Discovered public carriage 88/tcp on 192.168.101.192Discovered public carriage 49152/tcp on 192.168.101.197Completed SYN Stealth Reconnoitre opposite 192.168.101.155 in 0.89s (17 multitudes left)Completed SYN Stealth Reconnoitre opposite 192.168.101.169 in 0.89s (16 multitudes left)Completed SYN Stealth Reconnoitre opposite 192.168.101.150 in 0.90s (15 multitudes left)Completed SYN Stealth Reconnoitre opposite 192.168.101.173 in 0.90s (14 multitudes left)Completed SYN Stealth Reconnoitre opposite 192.168.101.170 in 0.90s (13 multitudes left)Completed SYN Stealth Reconnoitre opposite 192.168.101.171 in 0.90s (12 multitudes left)Discovered public carriage 22/tcp on 192.168.101.154Discovered public carriage 445/tcp on 192.168.101.156Discovered public carriage 3389/tcp on 192.168.101.152Discovered public carriage 3389/tcp on 192.168.101.158Discovered public carriage 443/tcp on 192.168.101.176Discovered public carriage 22/tcp on 192.168.101.152Discovered public carriage 135/tcp on 192.168.101.156Discovered public carriage 80/tcp on 192.168.101.176Discovered public carriage 2049/tcp on 192.168.101.203Discovered public carriage 8300/tcp on 192.168.101.176Discovered public carriage 6667/tcp on 192.168.101.203Discovered public carriage 1099/tcp on 192.168.101.203Discovered public carriage 512/tcp on 192.168.101.203Discovered public carriage 513/tcp on 192.168.101.203Discovered public carriage 1524/tcp on 192.168.101.203Completed SYN Stealth Reconnoitre opposite 192.168.101.197 in 21.65s (11 multitudes left)Discovered public carriage 5432/tcp on 192.168.101.203Discovered public carriage 3283/tcp on 192.168.101.192Discovered public carriage 427/tcp on 192.168.101.176Discovered public carriage 9080/tcp on 192.168.101.176Discovered public carriage 2121/tcp on 192.168.101.203Discovered public carriage 902/tcp on 192.168.101.176Completed SYN Stealth Reconnoitre opposite 192.168.101.192 in 26.89s (10 multitudes left)Completed SYN Stealth Reconnoitre opposite 192.168.101.158 in 27.02s (9 multitudes left)Completed SYN Stealth Reconnoitre opposite 192.168.101.156 in 27.06s (8 multitudes left)Completed SYN Stealth Reconnoitre opposite 192.168.101.154 in 27.34s (7 multitudes left)Completed SYN Stealth Reconnoitre opposite 192.168.101.152 in 27.69s (6 multitudes left)Discovered public carriage 8180/tcp on 192.168.101.203Completed SYN Stealth Reconnoitre opposite 192.168.101.165 in 27.77s (5 multitudes left)Completed SYN Stealth Reconnoitre opposite 192.168.101.203 in 27.81s (4 multitudes left)Discovered public carriage 8000/tcp on 192.168.101.176Completed SYN Stealth Reconnoitre opposite 192.168.101.166 in 28.12s (3 multitudes left)Completed SYN Stealth Reconnoitre opposite 192.168.101.167 in 28.50s (2 multitudes left)Completed SYN Stealth Reconnoitre opposite 192.168.101.176 in 28.74s (1 multitude left)Completed SYN Stealth Reconnoitre at 18:14, 28.81s spent (18000 completion carriages)Initiating Service reconnoitre at 18:14Scanning 54 services on 18 multitudesCompleted Service reconnoitre at 18:16, 109.12s spent (54 services on 18 multitudes)Initiating OS defiance (try #1) opposite 18 multitudesRetrying OS defiance (try #2) opposite 6 multitudesNSE: Script reconnoitrening 18 multitudes.Initiating NSE at 18:16NSE: [ftp-bounce] Couldn't contravene reconnoitreme.nmap.org, reconnoitrening 10.0.0.1 instead.NSE: [ftp-bounce] PORT response: 500 Illegal PORT enjoin.Completed NSE at 18:22, 351.87s spentInitiating NSE at 18:22Completed NSE at 18:22, 1.02s spentNmap reconnoitre narration for 192.168.101.150Host is up (0.00063s latency).Not shown: 999 settled carriagesPORT    STATE SERVICE VERSION111/tcp public  rpcbind 2-4 (RPC #100000)| rpcinfo:|   program accompute   port/proto  service|   100000  2,3,4        111/tcp  rpcbind|_  100000  2,3,4        111/udp  rpcbindMAC Address: 00:0C:29:65:1B:9A (VMware)Device type: public purposeRunning: Linux 3.X|4.XOS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4OS details: Linux 3.2 - 4.9Upspace guess: 19.904 days (past Wed Feb  5 20:40:30 2020)Netoperation Distance: 1 hopTCP Sequence Prediction: Difficulty=261 (Good luck!)IP ID Sequence Generation: All zerosTRACEROUTEHOP RTT     ADDRESS1   0.63 ms 192.168.101.150Nmap reconnoitre narration for 192.168.101.152Host is up (0.00033s latency).Not shown: 998 filtered carriagesPORT     STATE SERVICE       VERSION22/tcp   public  ssh           OpenSSH 7.2p2 Ubuntu 4ubuntu2.6 (Ubuntu Linux; protocol 2.0)| ssh-hostkey:|   2048 23:db:c7:d4:54:15:c9:12:28:3e:09:cc:c0:c5:07:ac (RSA)|   256 5b:c6:25:59:e4:c0:7c:21:b0:d8:be:bd:b7:6e:fd:8f (ECDSA)|_  256 8d:9c:bd:1e:d6:13:c5:f0:70:54:1f:07:ac:5b:56:ef (ED25519)3389/tcp public  ms-wbt-server xrdpMAC Address: 9E:2E:63:F8:AD:55 (Unknown)Warning: OSScan results may be fabulous accordingly we could not invent at lowest 1 public and 1 settled carriageDevice type: public purposeRunning: Linux 3.X|4.XOS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4OS details: Linux 3.10 - 4.11, Linux 3.2 - 4.9Upspace guess: 13.504 days (past Wed Feb 12 06:16:36 2020)Netoperation Distance: 1 hopTCP Sequence Prediction: Difficulty=253 (Good luck!)IP ID Sequence Generation: All zerosService Info: OS: Linux; CPE: cpe:/o:linux:linux_kernelTRACEROUTEHOP RTT     ADDRESS1   0.33 ms 192.168.101.152Nmap reconnoitre narration for 192.168.101.154Host is up (0.00032s latency).Not shown: 998 filtered carriagesPORT     STATE SERVICE       VERSION22/tcp   public  ssh           OpenSSH 7.4 (protocol 2.0)| ssh-hostkey:|   2048 2f:18:34:5b:96:a1:e5:a2:32:82:6b:ab:c6:6d:cd:02 (RSA)|   256 da:93:ae:f7:28:13:08:d0:2b:84:66:6c:2e:f0:6d:08 (ECDSA)|_  256 5d:10:e7:72:49:e2:51:72:cb:f6:cc:4c:61:00:4e:66 (ED25519)3389/tcp public  ms-wbt-server xrdpMAC Address: 26:54:AB:85:4A:5E (Unknown)Warning: OSScan results may be fabulous accordingly we could not invent at lowest 1 public and 1 settled carriageDevice type: public purposeRunning: Linux 3.X|4.XOS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4OS details: Linux 3.10 - 4.11, Linux 3.2 - 4.9Upspace guess: 2.577 days (past Sun Feb 23 04:31:29 2020)Netoperation Distance: 1 hopTCP Sequence Prediction: Difficulty=264 (Good luck!)IP ID Sequence Generation: All zerosTRACEROUTEHOP RTT     ADDRESS1   0.32 ms 192.168.101.154Nmap reconnoitre narration for 192.168.101.155Host is up (0.00060s latency).Not shown: 999 settled carriagesPORT    STATE SERVICE VERSION111/tcp public  rpcbind 2-4 (RPC #100000)| rpcinfo:|   program accompute   port/proto  service|   100000  2,3,4        111/tcp  rpcbind|_  100000  2,3,4        111/udp  rpcbindMAC Address: 00:0C:29:47:F0:0C (VMware)Device type: public purposeRunning: Linux 3.X|4.XOS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4OS details: Linux 3.2 - 4.9Upspace guess: 36.447 days (past Mon Jan 20 07:38:55 2020)Netoperation Distance: 1 hopTCP Sequence Prediction: Difficulty=261 (Good luck!)IP ID Sequence Generation: All zerosTRACEROUTEHOP RTT     ADDRESS1   0.60 ms 192.168.101.155Nmap reconnoitre narration for WIN-IHR719BBSLU.ENTERPRISE.NET (192.168.101.156)Host is up (0.00051s latency).Not shown: 997 filtered carriagesPORT    STATE SERVICE      VERSION135/tcp public  msrpc        Microsoft Windows RPC139/tcp public  netbios-ssn  Microsoft Windows netbios-ssn445/tcp public  microsoft-ds Windows Server 2016 Standard 14393 microsoft-ds (workgroup: ENTERPRISE)MAC Address: B6:6E:63:C5:B3:12 (Unknown)Warning: OSScan results may be fabulous accordingly we could not invent at lowest 1 public and 1 settled carriageDevice type: public purposeRunning: Microsoft Windows 2016OS CPE: cpe:/o:microsoft:windows_server_2016OS details: Microsoft Windows Server 2016Upspace guess: 28.180 days (past Tue Jan 28 14:02:48 2020)Netoperation Distance: 1 hopTCP Sequence Prediction: Difficulty=257 (Good luck!)IP ID Sequence Generation: IncrementalService Info: Host: ARCHER; OS: Windows; CPE: cpe:/o:microsoft:windowsHost script results:|_clock-skew: mean: -14m33s, deviation: 4h37m08s, median: -2h54m34s| nbstat: NetBIOS name: ARCHER, NetBIOS user: <unknown>, NetBIOS MAC: b6:6e:63:c5:b3:12 (unknown)| Names:|   ARCHER<00>           Flags: <unique><active>|   ENTERPRISE<00>       Flags: <group><active>|_  ARCHER<20>           Flags: <unique><active>| smb-os-discovery:|   OS: Windows Server 2016 Standard 14393 (Windows Server 2016 Standard 6.3)|   Computer name: ARCHER|   NetBIOS computer name: ARCHER\x00|   Domain name: ENTERPRISE.NET|   Forest name: ENTERPRISE.NET|   FQDN: ARCHER.ENTERPRISE.NET|_  System space: 2020-02-25T13:21:59-08:00| smb-security-mode:|   account_used: <blank>|   authentication_level: user|   challenge_response: befriended|_  message_signing: disabled (dangerous, but forfeit)| smb2-security-mode:|   2.02:|_    Message signing enabled but not required| smb2-time:|   date: 2020-02-25 15:22:25|_  start_date: 2020-01-28 11:20:17TRACEROUTEHOP RTT     ADDRESS1   0.51 ms WIN-IHR719BBSLU.ENTERPRISE.NET (192.168.101.156)Nmap reconnoitre narration for W10DSKTP.ENTERPRISE.NET (192.168.101.158)Host is up (0.00054s latency).Not shown: 999 filtered carriagesPORT     STATE SERVICE            VERSION3389/tcp public  ssl/ms-wbt-server?|_ssl-date: 2020-02-25T21:21:46+00:00; -2h55m19s from reconnoitrener space.MAC Address: 56:83:D7:21:81:BB (Unknown)Warning: OSScan results may be fabulous accordingly we could not invent at lowest 1 public and 1 settled carriageDevice type: public purposeRunning (JUST GUESSING): FreeBSD 6.X (94%)OS CPE: cpe:/o:freebsd:freebsd:6.2Aggressive OS guesses: FreeBSD 6.2-RELEASE (94%)No fair OS equalityes for multitude (ordeal provisions non-ideal).Upspace guess: 29.046 days (past Mon Jan 27 17:16:42 2020)Netoperation Distance: 1 hopTCP Sequence Prediction: Difficulty=257 (Good luck!)IP ID Sequence Generation: IncrementalHost script results:|_clock-skew: mean: -2h55m19s, deviation: 0s, median: -2h55m19sTRACEROUTEHOP RTT     ADDRESS1   0.54 ms W10DSKTP.ENTERPRISE.NET (192.168.101.158)Nmap reconnoitre narration for khan.ENTERPRISE.NET (192.168.101.165)Host is up (0.00054s latency).All 1000 reconnoitrened carriages on khan.ENTERPRISE.NET (192.168.101.165) are filteredMAC Address: 3A:82:44:A0:AE:C5 (Unknown)Too sundry fingerprints equality this multitude to yield restricted OS detailsNetoperation Distance: 1 hopTRACEROUTEHOP RTT     ADDRESS1   0.54 ms khan.ENTERPRISE.NET (192.168.101.165)Nmap reconnoitre narration for JabbaDHut.ENTERPRISE.NET (192.168.101.166)Host is up (0.00058s latency).All 1000 reconnoitrened carriages on JabbaDHut.ENTERPRISE.NET (192.168.101.166) are filteredMAC Address: 82:8B:6F:08:FB:90 (Unknown)Too sundry fingerprints equality this multitude to yield restricted OS detailsNetoperation Distance: 1 hopTRACEROUTEHOP RTT     ADDRESS1   0.58 ms JabbaDHut.ENTERPRISE.NET (192.168.101.166)Nmap reconnoitre narration for Workstation.ENTERPRISE.NET (192.168.101.167)Host is up (0.00030s latency).All 1000 reconnoitrened carriages on Workstation.ENTERPRISE.NET (192.168.101.167) are filteredMAC Address: 3A:7C:E3:C4:D9:5B (Unknown)Too sundry fingerprints equality this multitude to yield restricted OS detailsNetoperation Distance: 1 hopTRACEROUTEHOP RTT     ADDRESS1   0.30 ms Workstation.ENTERPRISE.NET (192.168.101.167)Nmap reconnoitre narration for Win7-Old.ENTERPRISE.NET (192.168.101.168)Host is up (0.00026s latency).All 1000 reconnoitrened carriages on Win7-Old.ENTERPRISE.NET (192.168.101.168) are filteredMAC Address: 32:AE:A9:23:93:6F (Unknown)Too sundry fingerprints equality this multitude to yield restricted OS detailsNetoperation Distance: 1 hopTRACEROUTEHOP RTT     ADDRESS1   0.26 ms Win7-Old.ENTERPRISE.NET (192.168.101.168)Nmap reconnoitre narration for docker-host.enterprise.net (192.168.101.169)Host is up (0.00047s latency).Not shown: 996 settled carriagesPORT    STATE SERVICE     VERSION22/tcp  public  ssh         OpenSSH 7.2p2 Ubuntu 4ubuntu2.7 (Ubuntu Linux; protocol 2.0)| ssh-hostkey:|   2048 a6:20:7e:0a:6d:52:e2:69:9e:59:92:7e:37:c7:64:a2 (RSA)|   256 34:b2:9a:ff:9e:14:8d:60:41:f4:38:ee:4f:69:c8:9a (ECDSA)|_  256 9f:c1:12:0a:37:22:f1:25:cb:60:43:11:c4:b3:ba:af (ED25519)53/tcp  public  domain      ISC BIND 9.10.3-P4 (Ubuntu Linux)| dns-nsid:|_  bind.version: 9.10.3-P4-Ubuntu139/tcp public  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)445/tcp public  netbios-ssn Samba smbd 4.3.11-Ubuntu (workgroup: WORKGROUP)MAC Address: C6:5A:33:EA:90:03 (Unknown)Device type: public purposeRunning: Linux 3.X|4.XOS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4OS details: Linux 3.2 - 4.9Upspace guess: 39.326 days (past Fri Jan 17 10:32:37 2020)Netoperation Distance: 1 hopTCP Sequence Prediction: Difficulty=261 (Good luck!)IP ID Sequence Generation: All zerosService Info: Host: DOCKER-HOST; OS: Linux; CPE: cpe:/o:linux:linux_kernelHost script results:|_clock-skew: mean: -2h42m23s, deviation: 3h28m09s, median: -4h42m34s| nbstat: NetBIOS name: DOCKER-HOST, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)| Names:|   DOCKER-HOST<00>      Flags: <unique><active>|   DOCKER-HOST<03>      Flags: <unique><active>|   DOCKER-HOST<20>      Flags: <unique><active>|   \x01\x02__MSBROWSE__\x02<01>  Flags: <group><active>|   WORKGROUP<00>        Flags: <group><active>|   WORKGROUP<1d>        Flags: <unique><active>|_  WORKGROUP<1e>        Flags: <group><active>| smb-os-discovery:|   OS: Windows 6.1 (Samba 4.3.11-Ubuntu)|   Computer name: docker-host|   NetBIOS computer name: DOCKER-HOST\x00|   Domain name: act.net|   FQDN: docker-host.enterprise.net|_  System space: 2020-02-25T13:34:30-06:00| smb-security-mode:|   account_used: visitor|   authentication_level: user|   challenge_response: befriended|_  message_signing: disabled (dangerous, but forfeit)| smb2-security-mode:|   2.02:|_    Message signing enabled but not required| smb2-time:|   date: 2020-02-25 13:34:15|_  start_date: N/ATRACEROUTEHOP RTT     ADDRESS1   0.47 ms docker-host.enterprise.net (192.168.101.169)Nmap reconnoitre narration for heartbleed.enterprise.net (192.168.101.170)Host is up (0.00036s latency).Not shown: 999 settled carriagesPORT    STATE SERVICE   VERSION443/tcp public  ssl/https nginx/1.1.19|_http-server-header: nginx/1.1.19|_http-title: 400 The obvious HTTP ask was sent to HTTPS carriage|_ssl-date: 2020-02-25T19:34:24+00:00; -4h42m34s from reconnoitrener space.MAC Address: 76:65:3E:02:4D:1A (Unknown)Device type: public purposeRunning: Linux 2.6.X|3.XOS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3OS details: Linux 2.6.32 - 3.10Upspace guess: 39.326 days (past Fri Jan 17 10:32:47 2020)Netoperation Distance: 1 hopTCP Sequence Prediction: Difficulty=260 (Good luck!)IP ID Sequence Generation: All zerosHost script results:|_clock-skew: mean: -4h42m34s, deviation: 0s, median: -4h42m34sTRACEROUTEHOP RTT     ADDRESS1   0.36 ms heartbleed.enterprise.net (192.168.101.170)Nmap reconnoitre narration for shellshock.ENTERPRISE.NET (192.168.101.171)Host is up (0.00040s latency).Not shown: 999 settled carriagesPORT   STATE SERVICE VERSION

Papers accomplish be 5-7 single-spaced pages in protraction (font extent 12). The epithet page does not compute as one of the pages for the narration. Proper referencing is a must. The bibliography accomplish not compute as one of the page requirements. Appendices accomplish not compute as pages for the narration and should include sustaining comments you perform in the tract—like elaborate defencelessness facts(use the tract to bestow abstract facts). All references accomplish be justly cited throughout the narration.