Date
Mar 25, 2025 → Mar 25, 2025
Tag
Nmap
Network Scanning
Web Application Security
192.168.134.140
Nmap
└─# nmap -sU -p- --min-rate 5000 $ip
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-03-25 05:48 EDT
Warning: 192.168.134.140 giving up on port because retransmission cap hit (10).
Nmap scan report for 192.168.134.140
Host is up (0.051s latency).
All 65535 scanned ports on 192.168.134.140 are in ignored states.
Not shown: 65389 open|filtered udp ports (no-response), 146 closed udp ports (port-unreach)
Nmap done: 1 IP address (1 host up) scanned in 145.12 seconds
└─# nmap -sT -p- --min-rate 5000 $ip
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-03-25 05:48 EDT
Nmap scan report for 192.168.134.140
Host is up (0.050s latency).
Not shown: 65512 closed tcp ports (conn-refused)
PORT STATE SERVICE
25/tcp open smtp
79/tcp open finger
105/tcp open csnet-ns
106/tcp open pop3pw
110/tcp open pop3
135/tcp open msrpc
139/tcp open netbios-ssn
143/tcp open imap
443/tcp open https
445/tcp open microsoft-ds
2224/tcp open efi-mg
5040/tcp open unknown
7680/tcp open pando-pub
8000/tcp open http-alt
11100/tcp open unknown
20001/tcp open microsan
33006/tcp open unknown
49664/tcp open unknown
49665/tcp open unknown
49666/tcp open unknown
49667/tcp open unknown
49668/tcp open unknown
49669/tcp open unknown
Nmap done: 1 IP address (1 host up) scanned in 14.17 seconds
143
nc 192.168.244.140 143
tag login jonas@localhost SicMundusCreatusEst
tag LIST "" "*"
tag SELECT INBOX
tag STATUS INBOX (MESSAGES)
tag fetch 1 (BODY[1])
tag fetch 2 BODY[HEADER] BODY[1]
tag fetch 3:5 BODY[HEADER] BODY[1]
tag fetch 4:5 BODY[HEADER] BODY[1]
tag fetch 5:5 BODY[HEADER] BODY[1]


139,450


443




seems like a password, mark down
jonas@localhost SicMundusCreatusEst
2224


8000


20001

download all file here
but seems like a website backup folder