Text Example

NMAP NSE Vulnerability Scan PCAP File Download Traffic Sample

Download Attachments

  • 1 pcap 14
    Date added: May 23, 2019 9:45 pm Added by: admin File size: 5 MB Downloads: 1755

2019-05-10 04:18:38.531152 IP 192.168.149.136.37666 > 192.168.149.131.8000: Flags [.], ack 1, win 29, options [nop,nop,TS val 3936358178 ecr 18079585], length 0
E..4..@.@…………”.@…..H.z………..
…”…a
…skipping…
User-Agent: Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)

2019-05-10 04:19:28.947548 IP 192.168.149.131.80 > 192.168.149.136.60324: Flags [.], ack 163, win 235, options [nop,nop,TS val 18092189 ecr 3936408595], length 0
E..4w
@.@..]………P…rg…g…………
……..
2019-05-10 04:19:28.947591 IP 192.168.149.136.37752 > 192.168.149.131.8000: Flags [P.], seq 1:183, ack 1, win 29, options [nop,nop,TS val 3936408595 ecr 18092176], length 182
E…xG@.@..j………x.@.:.6qa……T……
……..GET /nmaplowercheck1557510561 HTTP/1.1
Host: 192.168.149.131:8000
Connection: close
User-Agent: Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)

2019-05-10 04:19:28.947597 IP 192.168.149.131.8000 > 192.168.149.136.37752: Flags [.], ack 183, win 235, options [nop,nop,TS val 18092189 ecr 3936408595], length 0
E..4..@.@.}g………@.xqa…:………….
……..
2019-05-10 04:19:28.947625 IP 192.168.149.136.35212 > 192.168.149.131.8089: Flags [R], seq 1847165668, win 0, length 0
E..(..@.@……………n…….P…i........ 2019-05-10 04:19:28.947627 IP 192.168.149.136.35212 > 192.168.149.131.8089: Flags [R], seq 1847165668, win 0, length 0 E..(..@.@...............n.......P...i……..
2019-05-10 04:19:28.947705 IP 192.168.149.136.60330 > 192.168.149.131.80: Flags [P.], seq 1:220, ack 1, win 29, options [nop,nop,TS val 3936408595 ecr 18092176], length 219: HTTP: GET / HTTP/1.1
E…a.@.@.+…………P.{……………..
……..GET / HTTP/1.1
Host: 192.168.149.131
Connection: close
Authorization: NTLM TlRMTVNTUAABAAAAB4IIoAAAAAAAAAAAAAAAAAAAAAA=
User-Agent: Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)

2019-05-10 04:19:28.947713 IP 192.168.149.131.80 > 192.168.149.136.60330: Flags [.], ack 220, win 235, options [nop,nop,TS val 18092189 ecr 3936408595], length 0
E..4. @.@..F………P…….{.w………..
……..
2019-05-10 04:19:28.947747 IP 192.168.149.136.35206 > 192.168.149.131.8089: Flags [P.], seq 1:97, ack 1, win 29, options [nop,nop,TS val 3936408595 ecr 18092176], length 96
E…)@.@.1………….~..X…D………..
…………[…W…..PWYOERSMBEPGMJQZRDBKPRCMAVYT..
./.
…9…..$3t…………………………….
2019-05-10 04:19:28.947751 IP 192.168.149.131.8089 > 192.168.149.136.35206: Flags [.], ack 97, win 227, options [nop,nop,TS val 18092189 ecr 3936408595], length 0
E..4..@.@………………D~…………..
……..
2019-05-10 04:19:28.947856 IP 192.168.149.136.35208 > 192.168.149.131.8089: Flags [P.], seq 644:846, ack 2406, win 36, options [nop,nop,TS val 3936408595 ecr 18092187], length 202
E…..@.@.t………….#…5.+(…$.”…..
…………..e.
..9..L…..N…..@,..<.x.s.s w.o…………H.:.A..!.Zj….’..9.1S.nx….^Z.=S…8y.FI…..qn*O..j.M^…q……cRK………..!9….. ……9i.cL…i..p..F6Zw…FZ….m..~.fn…6..8I..3..T.h}V. 2019-05-10 04:19:28.947932 IP 192.168.149.136.37760 > 192.168.149.131.8000: Flags [P.], seq 1:225, ack 1, win 29, options [nop,nop,TS val 3936408595 ecr 18092177], length 224
E…..@.@…………..@……e…… …..
……..GET / HTTP/1.1
Host: 192.168.149.131:8000
Connection: close
Authorization: NTLM TlRMTVNTUAABAAAAB4IIoAAAAAAAAAAAAAAAAAAAAAA=
User-Agent: Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)

Leave a Reply