┌──(kali㉿kali)-[~] └─$ nmap -sS 192.168.159.0/24 Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-27 21:26 CST Nmap scan report for 192.168.159.1 Host is up (0.00037s latency). Not shown: 997 filtered tcp ports (no-response) PORT STATE SERVICE 135/tcp open msrpc 139/tcp open netbios-ssn 445/tcp open microsoft-ds MAC Address: 00:50:56:C0:00:08 (VMware)
Nmap scan report for 192.168.159.2 Host is up (0.000084s latency). Not shown: 999 closed tcp ports (reset) PORT STATE SERVICE 53/tcp open domain MAC Address: 00:50:56:E1:64:0A (VMware)
Nmap scan report for 192.168.159.132 Host is up (0.00028s latency). Not shown: 997 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind MAC Address: 00:0C:29:57:62:33 (VMware)
Nmap scan report for 192.168.159.254 Host is up (0.000054s latency). All 1000 scanned ports on 192.168.159.254 are in ignored states. Not shown: 1000 filtered tcp ports (no-response) MAC Address: 00:50:56:FD:C9:B4 (VMware)
Nmap scan report for 192.168.159.129 Host is up (0.0000040s latency). Not shown: 999 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh
Nmap done: 256 IP addresses (5 hosts up) scanned in 12.00 seconds ┌──(kali㉿kali)-[~] └─$ nmap -sS -p- 192.168.159.132 Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-27 21:26 CST Nmap scan report for 192.168.159.132 Host is up (0.00080s latency). Not shown: 65531 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 60300/tcp open unknown MAC Address: 00:0C:29:57:62:33 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 4.76 seconds