Vulnhub

SickOs 1.2

First, Nmap was run to scan for open ports and running service versions. nmap -sV 192.168.130.131 Starting Nmap 7.30 ( https://nmap.org ) at 2016-10-14 11:29 MDT Nmap scan report for 192.168.130.131 Host is up (0.00059s latency). Not shown: 998 filtered ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.9p1 Debian 5ubuntu1.8 (Ubuntu Linux; protocol 2.0) 80/tcp open http lighttpd 1.4.28 MAC Address: 00:0C:29:09:A5:6D (VMware) Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Service detection performed.

Fristileaks

First, Nmap was run to scan for open ports and service version on the machine. nmap -sV 192.168.130.128 Starting Nmap 7.30 ( https://nmap.org ) at 2016-10-20 11:46 MDT Nmap scan report for 192.168.130.128 Host is up (0.0014s latency). Not shown: 999 filtered ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.2.15 ((CentOS) DAV/2 PHP/5.3.3) MAC Address: 08:00:27:A5:A6:76 (Oracle VirtualBox virtual NIC) Service detection performed. Please report any incorrect results at https://nmap.

Brainpan2

First, Nmap was used to port scan the target machine and enumerate running services with the -sV flag. nmap -sV 192.168.130.130 Starting Nmap 7.30 ( https=//nmap.org ) at 2016-10-25 11:47 MDT Nmap scan report for 192.168.130.130 Host is up (0.000071s latency). Not shown= 998 closed ports PORT STATE SERVICE VERSION 9999/tcp open abyss? 10000/tcp open http SimpleHTTPServer 0.6 (Python 2.7.3) MAC Address= 00:0C:29:4E:E6:A7 (VMware) Service detection performed. Please report any incorrect results at https=//nmap.