├── .github └── FUNDING.yml ├── README.md ├── docs ├── nmap_advanced_portscan.xml └── report.html └── nmap-bootstrap.xsl /.github/FUNDING.yml: -------------------------------------------------------------------------------- 1 | # These are supported funding model platforms 2 | 3 | github: [l4rm4nd] 4 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 |
2 |

nmap-bootstrap-xsl

3 |

An Nmap XSL implementation with Bootstrap.
Allows Nmap XML port scan results to be converted into beautiful HTML reports.

4 | > Demo HTML Report <

5 | 6 |
7 | 8 | 9 |
10 | 11 | 12 |

13 | Buy Me A Coffee 14 |

15 | 16 | ## 🔥 Features 17 | 18 | - Bootstrap Datatable filters and search bars 19 | - Export functionality like Copy, CSV, Excel and PDF 20 | - Automatic classification of web network services to a separate audit space with clickable HTTP/HTTPS URLs 21 | - Nmap CLI flag explanation via https://explainshell.com 22 | - Dynamic keyword highlighting via JS (e.g. keywords like password, login, insecure) 23 | - Quick glance at HTTP titles and SSL certificate information (CN, Expiry etc.) 24 | - Hostname and IP address listing of scan targets 25 | - Indication for encrypted network services (plaintext vs. SSL/STARTTLS) 26 | - Links to 3rd party services such as a CVE database by Pentest Factory, an SSL scan service by Qualys and an HTTP security header scan service by securityheaders.com 27 | 28 | ## ✨ Requirements 29 | - xsltproc — command line xslt processor 30 | 31 | ```` 32 | sudo apt install xsltproc 33 | ```` 34 | 35 | ## 🎓 Usage 36 | 37 | ### Converting Nmap XML 38 | 39 | You can convert an already existing Nmap XML file into a nicely formatted HTML report by executing the following commands: 40 | 41 | ```` 42 | # download the nmap bootstrap xsl 43 | wget https://raw.githubusercontent.com/Haxxnet/nmap-bootstrap-xsl/main/nmap-bootstrap.xsl 44 | 45 | # convert your nmap xml file into html 46 | xsltproc -o report.html nmap-bootstrap.xsl 47 | ```` 48 | 49 | The resulting Nmap HTML report `report.html` can be directly opened with any web browser of your choice. 50 | 51 | ### Applying XSL in advance 52 | 53 | If you have not yet started your Nmap port scan, you can also apply the bootstrap XSL in your Nmap CLI command as follows: 54 | 55 | ```` 56 | nmap -sS -Pn --stylesheet https://raw.githubusercontent.com/Haxxnet/nmap-bootstrap-xsl/main/nmap-bootstrap.xsl scanme.nmap.org 57 | ```` 58 | 59 | The resulting Nmap XML file can be directly opened with a supported web browser. The bootstrap XSL will already be applied. 60 | 61 | > **Note**: 62 | > Nonetheless, it is recommended to convert the XML file into an HTML report. This ensures that the final Nmap bootstrap report is supported by all web browsers and that clients, to which you'll hopefully send your port scanning results, can easily categorize and open the file with the default OS application - a web browser. 63 | 64 | ## 💎 Acknowledgment & Credits 65 | 66 | Many thanks to the following individuals: 67 | 68 | - ❤ [honze-net](https://github.com/honze-net) for [nmap-bootstrap-xsl](https://github.com/honze-net/nmap-bootstrap-xsl) 69 | -------------------------------------------------------------------------------- /docs/report.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 42 | Nmap Results 43 | 44 | 45 |
116 |
117 |

Nmap Port Scanning Results

118 |

Nmap Version 7.93
Sat Mar 11 20:27:34 2023 – Sat Mar 11 20:29:33 2023

119 |
nmap -sS -sV -sC -Pn --open --min-rate 5000 --max-retries 3 --script-timeout 300 -oA nmap_advanced_portscan -vvv -p- --min-hostgroup 256 scanme.nmap.org scanme2.nmap.org
120 |

2 hosts scanned. 121 | 2 hosts up. 122 | 0 hosts down. 123 |

124 |
125 |
2 126 |
127 |
0 128 |
129 |
130 |
131 |
132 |
133 | 134 |
135 |
136 | Nmap Bootstrap XSL by LRVT 137 |
138 |
139 |
140 |

Scanned Hosts

141 |
142 | 143 | 144 | 145 | 146 | 147 | 148 | 149 | 150 | 151 | 152 | 153 | 154 | 155 | 156 | 157 | 158 | 159 | 160 | 161 | 162 | 163 | 164 | 165 |
StateAddressHostnameTCP (open)UDP (open)
up45.33.32.156scanme.nmap.org30
up45.33.49.119scanme2.nmap.org40
166 |

Open Services

167 |
168 | 169 | 170 | 171 | 172 | 173 | 174 | 175 | 176 | 177 | 178 | 179 | 180 | 181 | 182 | 183 | 184 | 185 | 186 | 187 | 188 | 189 | 190 | 191 | 192 | 193 | 194 | 195 | 196 | 197 | 198 | 199 | 200 | 201 | 202 | 203 | 204 | 205 | 206 | 207 | 208 | 209 | 210 | 211 | 212 | 213 | 214 | 215 | 216 | 217 | 218 | 219 | 220 | 221 | 222 | 223 | 224 | 225 | 226 | 227 | 228 | 229 | 230 | 231 | 232 | 233 | 234 | 235 | 236 | 237 | 238 | 239 | 240 | 241 | 242 | 243 | 245 | 246 | 247 | 248 | 249 | 250 | 251 | 252 | 253 | 254 | 255 | 256 | 257 | 258 | 259 | 260 | 261 | 262 | 263 | 264 | 265 | 266 | 267 | 268 | 269 | 270 | 272 | 273 | 274 | 275 | 276 |
HostnameAddressPortProtocolServiceProductVersionExtraSSL CertificateTitleCPE
scanme.nmap.org45.33.32.15622tcpsshOpenSSH6.6.1p1 Ubuntu 2ubuntu2.13Ubuntu Linux; protocol 2.0cpe:/a:openbsd:openssh:6.6.1p1
scanme.nmap.org45.33.32.15680tcphttpApache httpd2.4.7(Ubuntu)Go ahead and ScanMe!cpe:/a:apache:http_server:2.4.7
scanme.nmap.org45.33.32.1569929tcpnping-echoNping echo
scanme2.nmap.org45.33.49.11922tcpsshOpenSSH7.4protocol 2.0cpe:/a:openbsd:openssh:7.4
scanme2.nmap.org45.33.49.11925tcpsmtpPostfix smtpdCN: insecure.com
Expiry: 2023-05-12T10:01:21
SigAlgo: sha256WithRSAEncryption 244 |
cpe:/a:postfix:postfix
scanme2.nmap.org45.33.49.11980tcphttpApache httpd2.4.6Did not follow redirect to https://nmap.org/cpe:/a:apache:http_server:2.4.6
scanme2.nmap.org45.33.49.119443tcpssl/httpApache httpd2.4.6CN: insecure.com
Expiry: 2023-05-12T10:01:21
SigAlgo: sha256WithRSAEncryption 271 |
Did not follow redirect to https://nmap.org/cpe:/a:apache:http_server:2.4.6
277 |

Web Services

278 |
279 | 280 | 281 | 282 | 283 | 284 | 285 | 286 | 287 | 288 | 289 | 290 | 291 | 292 | 293 | 294 | 295 | 296 | 297 | 298 | 299 | 300 | 301 | 302 | 303 | 304 | 305 | 306 | 307 | 308 | 309 | 310 | 311 | 312 | 313 | 314 | 315 | 316 | 317 | 318 | 319 | 320 | 321 | 323 | 324 | 325 | 326 |
HostnameAddressPortServiceProduktVersionTitleSSL CertificateURL
scanme.nmap.org45.33.32.15680httpApache httpd2.4.7Go ahead and ScanMe!http://scanme.nmap.org:80
scanme2.nmap.org45.33.49.11980httpApache httpd2.4.6Did not follow redirect to https://nmap.org/http://scanme2.nmap.org:80
scanme2.nmap.org45.33.49.119443ssl/httpApache httpd2.4.6Did not follow redirect to https://nmap.org/CN: insecure.com
Expiry: 2023-05-12T10:01:21
SigAlgo: sha256WithRSAEncryption 322 |
https://scanme2.nmap.org:443
327 |

Online Hosts

328 |
329 |

45.33.32.156 - scanme.nmap.org

330 |
331 |

Hostnames

332 |
    333 |
  • scanme.nmap.org (user)
  • 334 |
  • scanme.nmap.org (PTR)
  • 335 |
336 |

Ports

337 |
338 | 339 | 340 | 341 | 342 | 343 | 344 | 345 | 346 | 347 | 348 | 349 | 350 | 351 | 352 | 353 | 354 | 355 | 356 | 357 | 369 | 370 | 371 | 372 | 373 | 374 | 375 | 376 | 377 | 378 | 389 | 390 | 391 | 392 | 393 | 394 | 395 | 396 | 397 | 398 | 399 | 400 |
PortProtocolState
Reason
ServiceProductVersionExtra Info
22tcpopen
syn-ack
sshOpenSSH6.6.1p1 Ubuntu 2ubuntu2.13Ubuntu Linux; protocol 2.0
358 | cpe:/a:openbsd:openssh:6.6.1p1
ssh-hostkey
359 |
360 |   1024 ac00a01a82ffcc5599dc672b34976b75 (DSA)
361 | ssh-dss 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
362 |   2048 203d2d44622ab05a9db5b30514c2a6b2 (RSA)
363 | ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6afooTZ9mVUGFNEhkMoRR1Btzu64XXwElhCsHw/zVlIx/HXylNbb9+11dm2VgJQ21pxkWDs+L6+EbYyDnvRURTrMTgHL0xseB0EkNqexs9hYZSiqtMx4jtGNtHvsMxZnbxvVUk2dasWvtBkn8J5JagSbzWTQo4hjKMOI1SUlXtiKxAs2F8wiq2EdSuKw/KNk8GfIp1TA+8ccGeAtnsVptTJ4D/8MhAWsROkQzOowQvnBBz2/8ecEvoMScaf+kDfNQowK3gENtSSOqYw9JLOza6YJBPL/aYuQQ0nJ74Rr5vL44aNIlrGI9jJc2x0bV7BeNA5kVuXsmhyfWbbkB8yGd
364 |   256 9602bb5e57541c4e452f564c4a24b257 (ECDSA)
365 | ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBMD46g67x6yWNjjQJnXhiz/TskHrqQ0uPcOspFrIYW382uOGzmWDZCFV8FbFwQyH90u+j0Qr1SGNAxBZMhOQ8pc=
366 |   256 33fa910fe0e17b1f6d05a2b0f1544156 (ED25519)
367 | ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILzVjfIyIHfXyRd8jVBaVT8Yvk/UvHh5Afvho8sGciG7
368 |
80tcpopen
syn-ack
httpApache httpd2.4.7(Ubuntu)
379 | cpe:/a:apache:http_server:2.4.7
http-title
380 |
Go ahead and ScanMe!
381 |
http-methods
382 |
383 |   Supported Methods: GET HEAD POST OPTIONS
384 |
http-favicon
385 |
Nmap Project
386 |
http-server-header
387 |
Apache/2.4.7 (Ubuntu)
388 |
9929tcpopen
syn-ack
nping-echoNping echo
401 |
402 |
403 |
404 |

45.33.49.119 - scanme2.nmap.org

405 |
406 |

Hostnames

407 |
    408 |
  • scanme2.nmap.org (user)
  • 409 |
  • ack.nmap.org (PTR)
  • 410 |
411 |

Ports

412 |
413 | 414 | 415 | 416 | 417 | 418 | 419 | 420 | 421 | 422 | 423 | 424 | 425 | 426 | 427 | 428 | 429 | 430 | 431 | 432 | 442 | 443 | 444 | 445 | 446 | 447 | 448 | 449 | 450 | 451 | 504 | 505 | 506 | 507 | 508 | 509 | 510 | 511 | 512 | 513 | 522 | 523 | 524 | 525 | 526 | 527 | 528 | 529 | 530 | 531 | 589 | 590 |
PortProtocolState
Reason
ServiceProductVersionExtra Info
22tcpopen
syn-ack
sshOpenSSH7.4protocol 2.0
433 | cpe:/a:openbsd:openssh:7.4
ssh-hostkey
434 |
435 |   2048 48e0c6cd140000dbb6b03df20a2a3b6d (RSA)
436 | ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOrn6FG1D6Z9flFRcBJyAD7twguPmDpnIQkK6R5zczrHPK7vyIx55zS9Gn//KfefecFkcu3AI8x/YTIMPb36UFyS/cJN/j1VY86eS6xJX/7VTzgZzcbAoBL8715EQgWoEz60mV698i8kXRqvvWJ1HDdwqWT+NtHIU3nEyHgWFCwQOCC5Y6dGe3JXvbv3BEXiMDaRRba+apTNOG+Gii92VjM1bo+UiiSo+scZCmZrTmZD+lDQbDhvmgPoWZ7FmUKLJOfZY44dyrgsLQuYVGuNwa6xNFi2BCr0+E6Vb4C8vQKOkYKOuNygL9atv+eptVz4XGtDVxBZoBr0NL574qVCX5
437 |   256 882b2900d0c781acddf49042d2aaf05b (ECDSA)
438 | ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBH2Vn80AsQMrvM0nAMhVmvVXROwxhWkS+hfXvtzKFkcofYcO6UfNVEDVcfZczTrKoNEvb0At0cX5WICgeCM1S1k=
439 |   256 64d6393504761cba17f3fd4f1fb37161 (ED25519)
440 | ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDwv3wAH3YNnQYUjojwk4BWrG7Idd9QHA2YoZGIO7V/y
441 |
25tcpopen
syn-ack
smtpPostfix smtpd
452 | cpe:/a:postfix:postfix
smtp-commands
453 |
ack.nmap.org, PIPELINING, SIZE 102400000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN
454 |
ssl-date
455 |
TLS randomness does not represent time
456 |
ssl-cert
457 |
Subject: commonName=insecure.com
458 | Subject Alternative Name: DNS:insecure.com, DNS:insecure.org, DNS:issues.nmap.org, DNS:issues.npcap.org, DNS:nmap.com, DNS:nmap.net, DNS:nmap.org, DNS:npcap.com, DNS:npcap.org, DNS:seclists.com, DNS:seclists.net, DNS:seclists.org, DNS:sectools.com, DNS:sectools.net, DNS:sectools.org, DNS:secwiki.com, DNS:secwiki.net, DNS:secwiki.org, DNS:svn.nmap.org, DNS:www.nmap.org
459 | Issuer: commonName=R3/organizationName=Let's Encrypt/countryName=US
460 | Public Key type: rsa
461 | Public Key bits: 2048
462 | Signature Algorithm: sha256WithRSAEncryption
463 | Not valid before: 2023-02-11T10:01:22
464 | Not valid after:  2023-05-12T10:01:21
465 | MD5:   1b264c6723302b23b453bdd37e316da9
466 | SHA-1: 2bbb71fab60c50d220e0d0243f2d3d46c36ef70b
467 | -----BEGIN CERTIFICATE-----
468 | MIIGHjCCBQagAwIBAgISBOqporboNvsoylhNNmxAmHF9MA0GCSqGSIb3DQEBCwUA
469 | MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD
470 | EwJSMzAeFw0yMzAyMTExMDAxMjJaFw0yMzA1MTIxMDAxMjFaMBcxFTATBgNVBAMT
471 | DGluc2VjdXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAO+c
472 | LEYzcbVjyXvZiHH0R5J7x9ZlMQVGDqPD6zErjtKQgXgfE4WjXWc5LZMsHs4FRKw5
473 | MI8GBgyrwfhNVZBIrMBmWmtA6j1s53htYFY0ztf5gfdhSf1eqAenf4//rswpnvlu
474 | kQUJabVmE9dkBqDdgImhg8AUP/ApW+bKReeM6K4KYgjpOFeehe5GVTDZTqBgW103
475 | CUs99G7Cqa2LEEpwGPeDvJP6NuBOLP31NhexuyQ7cuQSh/mGsx1SdB53JtVee+C7
476 | UMk7rLD2dLzg0sly5gHfO6T7V8qMJ8JpCU67PIkMDl4EONDSsm3ohKuGNYvzSg6j
477 | H8b2mKcsZyvEsr1y6UMCAwEAAaOCA0cwggNDMA4GA1UdDwEB/wQEAwIFoDAdBgNV
478 | HSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4E
479 | FgQUU41mIYkTy3mKElE6Q52FZwkJHYYwHwYDVR0jBBgwFoAUFC6zF7dYVsuuUAlA
480 | 5h+vnYsUwsYwVQYIKwYBBQUHAQEESTBHMCEGCCsGAQUFBzABhhVodHRwOi8vcjMu
481 | by5sZW5jci5vcmcwIgYIKwYBBQUHMAKGFmh0dHA6Ly9yMy5pLmxlbmNyLm9yZy8w
482 | ggEXBgNVHREEggEOMIIBCoIMaW5zZWN1cmUuY29tggxpbnNlY3VyZS5vcmeCD2lz
483 | c3Vlcy5ubWFwLm9yZ4IQaXNzdWVzLm5wY2FwLm9yZ4IIbm1hcC5jb22CCG5tYXAu
484 | bmV0gghubWFwLm9yZ4IJbnBjYXAuY29tgglucGNhcC5vcmeCDHNlY2xpc3RzLmNv
485 | bYIMc2VjbGlzdHMubmV0ggxzZWNsaXN0cy5vcmeCDHNlY3Rvb2xzLmNvbYIMc2Vj
486 | dG9vbHMubmV0ggxzZWN0b29scy5vcmeCC3NlY3dpa2kuY29tggtzZWN3aWtpLm5l
487 | dIILc2Vjd2lraS5vcmeCDHN2bi5ubWFwLm9yZ4IMd3d3Lm5tYXAub3JnMEwGA1Ud
488 | IARFMEMwCAYGZ4EMAQIBMDcGCysGAQQBgt8TAQEBMCgwJgYIKwYBBQUHAgEWGmh0
489 | dHA6Ly9jcHMubGV0c2VuY3J5cHQub3JnMIIBAgYKKwYBBAHWeQIEAgSB8wSB8ADu
490 | AHUAtz77JN+cTbp18jnFulj0bF38Qs96nzXEnh0JgSXttJkAAAGGQCMH1gAABAMA
491 | RjBEAiBm7P2rfixUuxOORx5lKHY9Ds36LpYu6kFwEmd2+o41BQIgOsIjTOW9zZeJ
492 | X4VYBBG5/Iih6vUlP7uOt0kV0O+A28kAdQCt9776fP8QyIudPZwePhhqtGcpXc+x
493 | DCTKhYY069yCigAAAYZAIwfnAAAEAwBGMEQCIGeF+8qczjSWq4fDa3Zd+3+Go0gm
494 | IAWrVorG68zzloOYAiBXOsn/PjoFFpbm/imnItDEFA8cmFr0b9zz+i1odyd3BTAN
495 | BgkqhkiG9w0BAQsFAAOCAQEAYyaybOGvrdvdMxNxGlKyHKqdXWbQCjE+1eLwWiSI
496 | IsRUTmaNCXCbXHsj9j3GQZKC+w8C88Lt0AzhS6pkO2bJXK7yC8Fzd080Gk+GlG/r
497 | uEBqa7L3bx3p0EHBH9wfUdz6JlKDEmAGITJUrrD2X8FNeyDiztEvM/E6TMQW7jPI
498 | guxs1ww+Ed2nXpgBnUwK7HNpSuFD9n98xkBUXJkWGT2vYqZ/m+dGGwLmAltzxTdS
499 | /ycfgUlcQrqo3n8BV42jDMCHhOcs0Bpvt1cwpSWM+wa4EmbdPIG3aK78fVw0oAVh
500 | tQL8+epINgVEdOxgOEpMslYHKMBgc8yiaq215AULT10AHQ==
501 | -----END CERTIFICATE-----
502 | 
503 |
80tcpopen
syn-ack
httpApache httpd2.4.6
514 | cpe:/a:apache:http_server:2.4.6
http-title
515 |
Did not follow redirect to https://nmap.org/
516 |
http-methods
517 |
518 |   Supported Methods: GET HEAD POST OPTIONS
519 |
http-server-header
520 |
Apache/2.4.6 (CentOS)
521 |
443tcpopen
syn-ack
ssl/httpApache httpd2.4.6
532 | cpe:/a:apache:http_server:2.4.6
http-title
533 |
Did not follow redirect to https://nmap.org/
534 |
http-methods
535 |
536 |   Supported Methods: GET HEAD POST OPTIONS
537 |
ssl-date
538 |
TLS randomness does not represent time
539 |
ssl-cert
540 |
Subject: commonName=insecure.com
541 | Subject Alternative Name: DNS:insecure.com, DNS:insecure.org, DNS:issues.nmap.org, DNS:issues.npcap.org, DNS:nmap.com, DNS:nmap.net, DNS:nmap.org, DNS:npcap.com, DNS:npcap.org, DNS:seclists.com, DNS:seclists.net, DNS:seclists.org, DNS:sectools.com, DNS:sectools.net, DNS:sectools.org, DNS:secwiki.com, DNS:secwiki.net, DNS:secwiki.org, DNS:svn.nmap.org, DNS:www.nmap.org
542 | Issuer: commonName=R3/organizationName=Let's Encrypt/countryName=US
543 | Public Key type: rsa
544 | Public Key bits: 2048
545 | Signature Algorithm: sha256WithRSAEncryption
546 | Not valid before: 2023-02-11T10:01:22
547 | Not valid after:  2023-05-12T10:01:21
548 | MD5:   1b264c6723302b23b453bdd37e316da9
549 | SHA-1: 2bbb71fab60c50d220e0d0243f2d3d46c36ef70b
550 | -----BEGIN CERTIFICATE-----
551 | MIIGHjCCBQagAwIBAgISBOqporboNvsoylhNNmxAmHF9MA0GCSqGSIb3DQEBCwUA
552 | MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD
553 | EwJSMzAeFw0yMzAyMTExMDAxMjJaFw0yMzA1MTIxMDAxMjFaMBcxFTATBgNVBAMT
554 | DGluc2VjdXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAO+c
555 | LEYzcbVjyXvZiHH0R5J7x9ZlMQVGDqPD6zErjtKQgXgfE4WjXWc5LZMsHs4FRKw5
556 | MI8GBgyrwfhNVZBIrMBmWmtA6j1s53htYFY0ztf5gfdhSf1eqAenf4//rswpnvlu
557 | kQUJabVmE9dkBqDdgImhg8AUP/ApW+bKReeM6K4KYgjpOFeehe5GVTDZTqBgW103
558 | CUs99G7Cqa2LEEpwGPeDvJP6NuBOLP31NhexuyQ7cuQSh/mGsx1SdB53JtVee+C7
559 | UMk7rLD2dLzg0sly5gHfO6T7V8qMJ8JpCU67PIkMDl4EONDSsm3ohKuGNYvzSg6j
560 | H8b2mKcsZyvEsr1y6UMCAwEAAaOCA0cwggNDMA4GA1UdDwEB/wQEAwIFoDAdBgNV
561 | HSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4E
562 | FgQUU41mIYkTy3mKElE6Q52FZwkJHYYwHwYDVR0jBBgwFoAUFC6zF7dYVsuuUAlA
563 | 5h+vnYsUwsYwVQYIKwYBBQUHAQEESTBHMCEGCCsGAQUFBzABhhVodHRwOi8vcjMu
564 | by5sZW5jci5vcmcwIgYIKwYBBQUHMAKGFmh0dHA6Ly9yMy5pLmxlbmNyLm9yZy8w
565 | ggEXBgNVHREEggEOMIIBCoIMaW5zZWN1cmUuY29tggxpbnNlY3VyZS5vcmeCD2lz
566 | c3Vlcy5ubWFwLm9yZ4IQaXNzdWVzLm5wY2FwLm9yZ4IIbm1hcC5jb22CCG5tYXAu
567 | bmV0gghubWFwLm9yZ4IJbnBjYXAuY29tgglucGNhcC5vcmeCDHNlY2xpc3RzLmNv
568 | bYIMc2VjbGlzdHMubmV0ggxzZWNsaXN0cy5vcmeCDHNlY3Rvb2xzLmNvbYIMc2Vj
569 | dG9vbHMubmV0ggxzZWN0b29scy5vcmeCC3NlY3dpa2kuY29tggtzZWN3aWtpLm5l
570 | dIILc2Vjd2lraS5vcmeCDHN2bi5ubWFwLm9yZ4IMd3d3Lm5tYXAub3JnMEwGA1Ud
571 | IARFMEMwCAYGZ4EMAQIBMDcGCysGAQQBgt8TAQEBMCgwJgYIKwYBBQUHAgEWGmh0
572 | dHA6Ly9jcHMubGV0c2VuY3J5cHQub3JnMIIBAgYKKwYBBAHWeQIEAgSB8wSB8ADu
573 | AHUAtz77JN+cTbp18jnFulj0bF38Qs96nzXEnh0JgSXttJkAAAGGQCMH1gAABAMA
574 | RjBEAiBm7P2rfixUuxOORx5lKHY9Ds36LpYu6kFwEmd2+o41BQIgOsIjTOW9zZeJ
575 | X4VYBBG5/Iih6vUlP7uOt0kV0O+A28kAdQCt9776fP8QyIudPZwePhhqtGcpXc+x
576 | DCTKhYY069yCigAAAYZAIwfnAAAEAwBGMEQCIGeF+8qczjSWq4fDa3Zd+3+Go0gm
577 | IAWrVorG68zzloOYAiBXOsn/PjoFFpbm/imnItDEFA8cmFr0b9zz+i1odyd3BTAN
578 | BgkqhkiG9w0BAQsFAAOCAQEAYyaybOGvrdvdMxNxGlKyHKqdXWbQCjE+1eLwWiSI
579 | IsRUTmaNCXCbXHsj9j3GQZKC+w8C88Lt0AzhS6pkO2bJXK7yC8Fzd080Gk+GlG/r
580 | uEBqa7L3bx3p0EHBH9wfUdz6JlKDEmAGITJUrrD2X8FNeyDiztEvM/E6TMQW7jPI
581 | guxs1ww+Ed2nXpgBnUwK7HNpSuFD9n98xkBUXJkWGT2vYqZ/m+dGGwLmAltzxTdS
582 | /ycfgUlcQrqo3n8BV42jDMCHhOcs0Bpvt1cwpSWM+wa4EmbdPIG3aK78fVw0oAVh
583 | tQL8+epINgVEdOxgOEpMslYHKMBgc8yiaq215AULT10AHQ==
584 | -----END CERTIFICATE-----
585 | 
586 |
http-server-header
587 |
Apache/2.4.6 (CentOS)
588 |
591 |
592 |
593 |
594 | 684 | 685 | 686 | -------------------------------------------------------------------------------- /nmap-bootstrap.xsl: -------------------------------------------------------------------------------- 1 | 2 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 62 | Nmap Results 63 | 64 | 65 | 122 | 147 |
148 |
149 |

Nmap Port Scanning Results

150 |

Nmap Version 151 |

152 |
https://explainshell.com/explain?cmd=
153 |

154 | hosts scanned. 155 | hosts up. 156 | hosts down. 157 |

158 |
159 |
160 | width:%; 161 | 162 | 163 |
164 |
165 | width:%; 166 | 167 | 168 |
169 |
170 |
171 |
172 | 173 |
174 |
175 | 176 | 177 |
178 |
179 | 180 |
181 |
182 |
183 |

Scanned Hosts (offline hosts are hidden)

184 |
185 | 186 | 187 | 188 | 189 | 190 | 191 | 192 | 193 | 194 | 195 | 196 | 197 | 198 | 199 | 200 | 201 | 202 | 203 | 204 | 205 | 206 | 207 | 208 | 209 | 210 | 211 | 212 | 213 | 214 | 215 | 216 | 217 | 218 | 219 | 220 | 221 |
StateAddressHostnameTCP (open)UDP (open)
label label-success#onlinehosts-
label label-success#onlinehosts-
222 |
223 |

Open Services

224 |
225 | 226 | 227 | 228 | 229 | 230 | 231 | 232 | 233 | 234 | 235 | 236 | 237 | 238 | 239 | 240 | 241 | 242 | 243 | 244 | 245 | 246 | 247 | 250 | 252 | 253 | 255 | 256 | 257 | 258 | 259 | 260 | 265 | 266 | 267 | 268 | 269 | 270 | 271 |
HostnameAddressPortProtocolServiceProductVersionExtraSSL CertificateTitleCPE
248 | N/A 249 | 251 | #onlinehosts- 254 | #port--/ 261 | CN: 262 |
Expiry:
263 |
SigAlgo:
264 |
272 |
273 | 274 |

Web Services

275 |
276 | 277 | 278 | 279 | 280 | 281 | 282 | 283 | 284 | 285 | 286 | 287 | 288 | 289 | 290 | 291 | 292 | 293 | 294 | 295 | 296 | 297 | 300 | 302 | 303 | 306 | 307 | 308 | 309 | 310 | 311 | 312 | 313 | 318 | 319 | 320 | 321 | 322 | 326 | 327 | 328 | 329 | 333 | 334 | 335 | 336 | 337 | 338 | 339 | 340 |
HostnameAddressPortServiceProduktVersionTitleSSL CertificateURL
298 | N/A 299 | 301 | #onlinehosts- 304 | 305 | #port--/ 314 | CN: 315 |
Expiry:
316 |
SigAlgo:
317 |
323 | https://: 324 | https://: 325 | 330 | http://: 331 | http://: 332 |
341 |
342 | 343 |

Online Hosts

344 | 345 |
346 |
347 | onlinehosts- 348 | # 349 |

-

350 |
351 |
352 | 353 | 354 |

Hostnames

355 |
    356 | 357 |
  • ()
  • 358 |
    359 |
360 |
361 |

Ports

362 |
363 | 364 | 365 | 366 | 367 | 368 | 369 | 370 | 371 | 372 | 373 | 374 | 375 | 376 | 377 | 378 | 379 | 380 | 381 | 382 | 383 | 384 | 385 | 386 | 387 | 388 | 389 | 396 | 397 | 398 | 399 | 400 | 401 | 402 | 403 | 404 | 405 | 406 | 407 | 408 | 409 | 410 | 411 | 412 | 413 | 414 | 415 | 416 | 417 | 418 | 419 | 420 | 421 | 422 | 423 | 424 | 425 | 426 | 427 | 428 | 429 | 430 | 431 | 432 | 433 | 434 |
PortProtocolState
Reason
ServiceProductVersionExtra Info
port--
/
390 | https://nvd.nist.gov/vuln/search/results?form_type=Advanced&cves=on&cpe_version= 391 | 392 |
393 |
394 |
395 |



435 |
436 | 437 |

Host Script

438 |
439 | 440 |
441 |
442 |
443 | 444 |

OS Detection

445 | 446 |
OS details: (%)
447 | 448 | Device type:
449 | Running: (%)
450 | OS CPE: https://nvd.nist.gov/vuln/search/results?form_type=Advanced&cves=on&cpe_version= 451 |
452 |
453 |
454 |
455 |
456 |
457 |
458 |
459 |
460 | 470 | 471 | 515 | 555 | 566 | 567 | 568 |
569 |
570 | --------------------------------------------------------------------------------