Starting Nmap 7.80 ( https://nmap.org ) at 2022-12-19 11:31 ?D1ú±ê×?ê±?? Pre-scan script results: | broadcast-avahi-dos: | Discovered hosts: | 224.0.0.251 | After NULL UDP avahi packet DoS (CVE-2011-1002). |_ Hosts are all up (not vulnerable). Nmap scan report for 192.168.1.10 Host is up (0.0026s latency).
PORT STATE SERVICE 22/tcp open ssh |_clamav-exec: ERROR: Script execution failed (use -d to debug) 80/tcp open http |_clamav-exec: ERROR: Script execution failed (use -d to debug) | http-csrf: | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.1.10 | Found the following possible CSRF vulnerabilities: | | Path: http://192.168.1.10:80/ | Form id: wmtb | Form action: /web/submit | | Path: http://192.168.1.10:80/ | Form id: | Form action: /web/20020720170457/http://jarbas.com.br:80/user.php | | Path: http://192.168.1.10:80/ | Form id: |_ Form action: /web/20020720170457/http://jarbas.com.br:80/busca/ |_http-dombased-xss: Couldn't find any DOM based XSS. | http-enum: |_ /icons/: Potentially interesting folder w/ directory listing | http-sql-injection: | Possible sqli for queries: | http://192.168.1.10:80/index_arquivos/?C=M%3bO%3dA%27%20OR%20sqlspider | http://192.168.1.10:80/index_arquivos/?C=N%3bO%3dD%27%20OR%20sqlspider | http://192.168.1.10:80/index_arquivos/?C=D%3bO%3dA%27%20OR%20sqlspider | http://192.168.1.10:80/index_arquivos/?C=S%3bO%3dA%27%20OR%20sqlspider | http://192.168.1.10:80/index_arquivos/?C=S%3bO%3dA%27%20OR%20sqlspider | http://192.168.1.10:80/index_arquivos/?C=D%3bO%3dA%27%20OR%20sqlspider | http://192.168.1.10:80/index_arquivos/?C=M%3bO%3dD%27%20OR%20sqlspider | http://192.168.1.10:80/index_arquivos/?C=N%3bO%3dA%27%20OR%20sqlspider | http://192.168.1.10:80/index_arquivos/?C=D%3bO%3dA%27%20OR%20sqlspider | http://192.168.1.10:80/index_arquivos/?C=S%3bO%3dA%27%20OR%20sqlspider | http://192.168.1.10:80/index_arquivos/?C=N%3bO%3dA%27%20OR%20sqlspider |_ http://192.168.1.10:80/index_arquivos/?C=M%3bO%3dA%27%20OR%20sqlspider |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. |_http-trace: TRACE is enabled 3306/tcp open mysql |_clamav-exec: ERROR: Script execution failed (use -d to debug) |_mysql-vuln-cve2012-2122: ERROR: Script execution failed (use -d to debug) 8080/tcp open http-proxy |_clamav-exec: ERROR: Script execution failed (use -d to debug) | http-enum: |_ /robots.txt: Robots file MAC Address: 00:0C:29:11:8A:24 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 78.70 seconds