Open Spoodies opened 5 years ago
NSE: Using Lua 5.3. NSE: Arguments from CLI: NSE: Loaded 46 scripts for scanning. NSE: Script Pre-scanning. NSE: Starting runlevel 1 (of 2) scan. Initiating NSE at 04:21 Completed NSE at 04:21, 0.00s elapsed NSE: Starting runlevel 2 (of 2) scan. Initiating NSE at 04:21 Completed NSE at 04:21, 0.00s elapsed mass_rdns: Using DNS server 192.168.1.1 Initiating Parallel DNS resolution of 1 host. at 04:21 mass_rdns: 0.01s 0/1 [#: 1, OK: 0, NX: 0, DR: 0, SF: 0, TR: 1] Completed Parallel DNS resolution of 1 host. at 04:21, 0.01s elapsed DNS resolution of 1 IPs took 0.01s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0] Initiating Connect Scan at 04:21 Scanning 192.168.1.11 [1000 ports] Connect Scan Timing: About 15.50% done; ETC: 04:25 (0:02:49 remaining) Connect Scan Timing: About 30.50% done; ETC: 04:25 (0:02:19 remaining) Connect Scan Timing: About 45.50% done; ETC: 04:25 (0:01:49 remaining) Connect Scan Timing: About 60.50% done; ETC: 04:25 (0:01:19 remaining) Connect Scan Timing: About 75.50% done; ETC: 04:25 (0:00:49 remaining) Stats: 0:03:20 elapsed; 0 hosts completed (1 up), 1 undergoing Connect Scan Connect Scan Timing: About 99.00% done; ETC: 04:25 (0:00:02 remaining) Current sending rates: 9.98 packets / s. Completed Connect Scan at 04:25, 201.40s elapsed (1000 total ports) Overall sending rates: 9.93 packets / s. Initiating Service scan at 04:25 NSE: Script scanning 192.168.1.11. NSE: Starting runlevel 1 (of 2) scan. Initiating NSE at 04:25 Completed NSE at 04:25, 0.00s elapsed NSE: Starting runlevel 2 (of 2) scan. Initiating NSE at 04:25 Completed NSE at 04:25, 0.00s elapsed Nmap scan report for 192.168.1.11 Host is up, received user-set. All 1000 scanned ports on 192.168.1.11 are filtered because of 1000 no-responses
NSE: Script Post-scanning. NSE: Starting runlevel 1 (of 2) scan. Initiating NSE at 04:25 Completed NSE at 04:25, 0.00s elapsed NSE: Starting runlevel 2 (of 2) scan. Initiating NSE at 04:25 Completed NSE at 04:25, 0.00s elapsed Read from /usr/bin/../share/nmap: nmap-payloads nmap-service-probes nmap-services. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 202.18 seconds
same here in 2021.1 kali. its broken
Hello.
Do you have a specific CVE script is unable to show? Try scanning the nmap host:
nmap -sV --script vulners -p80 scanme.nmap.org
Hi everyone. I found out that 804a692 broke the script. Just remove line 135 (Accept-Encoding) and the script will work.
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 206.31 seconds
Thank you!