Starting Nmap 6.01 ( http://nmap.org ) at 2012-10-17 10:25 Central Daylight Time Winpcap present, dynamic linked to: WinPcap version 4.1.2 (packet.dll version 4.1.0.2001), based on libpcap version 1.0 branch 1_0_rel0b (20091008) --------------- Timing report --------------- hostgroups: min 1, max 100000 rtt-timeouts: init 1000, min 100, max 10000 max-scan-delay: TCP 1000, UDP 1000, SCTP 1000 parallelism: min 0, max 0 max-retries: 10, host-timeout: 0 min-rate: 0, max-rate: 0 --------------------------------------------- NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. NSE: Starting runlevel 1 (of 1) scan. Initiating ARP Ping Scan at 10:25 Scanning 83 hosts [1 port/host] Packet capture filter (device eth0): arp and arp[18:4] = 0x00188B26 and arp[22:2] = 0x9F3C Completed ARP Ping Scan at 10:25, 1.12s elapsed (83 total hosts) Overall sending rates: 126.67 packets / s, 5320.25 bytes / s. mass_rdns: Using DNS server 192.168.87.35 mass_rdns: Using DNS server 8.8.8.8 Initiating Parallel DNS resolution of 83 hosts. at 10:25 mass_rdns: 0.00s 0/24 [#: 2, OK: 0, NX: 0, DR: 0, SF: 0, TR: 21] Completed Parallel DNS resolution of 83 hosts. at 10:25, 0.09s elapsed DNS resolution of 24 IPs took 0.10s. Mode: Async [#: 2, OK: 2, NX: 22, DR: 0, SF: 0, TR: 24, CN: 0] Nmap scan report for 192.168.87.0 [host down, received no-response] Nmap scan report for 192.168.87.1 [host down, received no-response] Nmap scan report for 192.168.87.2 [host down, received no-response] Nmap scan report for 192.168.87.3 [host down, received no-response] Nmap scan report for 192.168.87.4 [host down, received no-response] Nmap scan report for 192.168.87.5 [host down, received no-response] Nmap scan report for 192.168.87.6 [host down, received no-response] Nmap scan report for 192.168.87.7 [host down, received no-response] Nmap scan report for 192.168.87.8 [host down, received no-response] Nmap scan report for 192.168.87.9 [host down, received no-response] Nmap scan report for 192.168.87.10 [host down, received no-response] Nmap scan report for 192.168.87.11 [host down, received no-response] Nmap scan report for 192.168.87.12 [host down, received no-response] Nmap scan report for 192.168.87.13 [host down, received no-response] Nmap scan report for 192.168.87.14 [host down, received no-response] Nmap scan report for 192.168.87.15 [host down, received no-response] Nmap scan report for 192.168.87.16 [host down, received no-response] Nmap scan report for 192.168.87.17 [host down, received no-response] Nmap scan report for 192.168.87.18 [host down, received no-response] Nmap scan report for 192.168.87.19 [host down, received no-response] Nmap scan report for 192.168.87.20 [host down, received no-response] Nmap scan report for 192.168.87.21 [host down, received no-response] Nmap scan report for 192.168.87.22 [host down, received no-response] Nmap scan report for 192.168.87.23 [host down, received no-response] Nmap scan report for 192.168.87.24 [host down, received no-response] Nmap scan report for 192.168.87.25 [host down, received no-response] Nmap scan report for 192.168.87.26 [host down, received no-response] Nmap scan report for 192.168.87.27 [host down, received no-response] Nmap scan report for 192.168.87.28 [host down, received no-response] Nmap scan report for 192.168.87.29 [host down, received no-response] Nmap scan report for 192.168.87.31 [host down, received no-response] Nmap scan report for 192.168.87.32 [host down, received no-response] Nmap scan report for 192.168.87.34 [host down, received no-response] Nmap scan report for 192.168.87.45 [host down, received no-response] Nmap scan report for 192.168.87.46 [host down, received no-response] Nmap scan report for 192.168.87.47 [host down, received no-response] Nmap scan report for 192.168.87.48 [host down, received no-response] Nmap scan report for 192.168.87.49 [host down, received no-response] Nmap scan report for 192.168.87.50 [host down, received no-response] Nmap scan report for 192.168.87.51 [host down, received no-response] Nmap scan report for 192.168.87.52 [host down, received no-response] Nmap scan report for 192.168.87.53 [host down, received no-response] Nmap scan report for 192.168.87.54 [host down, received no-response] Nmap scan report for 192.168.87.55 [host down, received no-response] Nmap scan report for 192.168.87.59 [host down, received no-response] Nmap scan report for 192.168.87.61 [host down, received no-response] Nmap scan report for 192.168.87.63 [host down, received no-response] Nmap scan report for 192.168.87.64 [host down, received no-response] Nmap scan report for 192.168.87.65 [host down, received no-response] Nmap scan report for 192.168.87.66 [host down, received no-response] Nmap scan report for 192.168.87.67 [host down, received no-response] Nmap scan report for 192.168.87.68 [host down, received no-response] Nmap scan report for 192.168.87.69 [host down, received no-response] Nmap scan report for 192.168.87.74 [host down, received no-response] Nmap scan report for 192.168.87.75 [host down, received no-response] Nmap scan report for 192.168.87.77 [host down, received no-response] Nmap scan report for 192.168.87.78 [host down, received no-response] Nmap scan report for 192.168.87.79 [host down, received no-response] Nmap scan report for 192.168.87.80 [host down, received no-response] Initiating Parallel DNS resolution of 1 host. at 10:25 mass_rdns: 0.03s 0/1 [#: 2, OK: 0, NX: 0, DR: 0, SF: 0, TR: 1] Completed Parallel DNS resolution of 1 host. at 10:25, 0.03s elapsed DNS resolution of 1 IPs took 0.03s. Mode: Async [#: 2, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0] Initiating SYN Stealth Scan at 10:25 Scanning 24 hosts [1 port/host] Packet capture filter (device eth0): dst host 192.168.87.83 and (icmp or icmp6 or tcp or udp or sctp) Discovered open port 445/tcp on 192.168.87.35 Discovered open port 445/tcp on 192.168.87.36 Discovered open port 445/tcp on 192.168.87.72 Discovered open port 445/tcp on 192.168.87.76 Discovered open port 445/tcp on 192.168.87.81 Discovered open port 445/tcp on 192.168.87.82 Discovered open port 445/tcp on 192.168.87.56 Completed SYN Stealth Scan at 10:25, 0.47s elapsed (24 total ports) Overall sending rates: 55.20 packets / s, 2428.87 bytes / s. NSE: Script scanning 24 hosts. NSE: Starting runlevel 1 (of 1) scan. NSE: Starting smb-check-vulns against 192.168.87.35. NSE: Starting smb-check-vulns against 192.168.87.36. NSE: Starting smb-check-vulns against 192.168.87.56. NSE: Starting smb-check-vulns against 192.168.87.72. NSE: Starting smb-check-vulns against 192.168.87.76. NSE: Starting smb-check-vulns against 192.168.87.81. NSE: Starting smb-check-vulns against 192.168.87.82. Initiating NSE at 10:25 NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: SMB: Login as \guest failed (NT_STATUS_LOGON_FAILURE) NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: SMB: WARNING: the server appears to be Unix; your mileage may vary. NSE: SMB: Login as MSHOME\guest failed, but was given guest access (username may be wrong, or system may only allow guest) NSE: Finished smb-check-vulns against 192.168.87.72. NSE: SMB: Login as \guest failed (NT_STATUS_LOGON_FAILURE) NSE: Finished smb-check-vulns against 192.168.87.82. NSE: Finished smb-check-vulns against 192.168.87.81. NSE: SMB: WARNING: the server appears to be Unix; your mileage may vary. NSE: SMB: Login as ITS\guest failed, but was given guest access (username may be wrong, or system may only allow guest) NSE: SMB: WARNING: the server appears to be Unix; your mileage may vary. NSE: SMB: Login as BCS\guest failed, but was given guest access (username may be wrong, or system may only allow guest) NSE: Finished smb-check-vulns against 192.168.87.56. NSE: Finished smb-check-vulns against 192.168.87.35. NSE: Finished smb-check-vulns against 192.168.87.36. NSE: Finished smb-check-vulns against 192.168.87.76. Completed NSE at 10:25, 2.37s elapsed Nmap scan report for 192.168.87.30 Host is up, received arp-response (0.00s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 1s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:1E:4F:43:10:8B (Dell) Final times for host: srtt: 0 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.33 Host is up, received arp-response (0.0020s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 1s PORT STATE SERVICE REASON 445/tcp filtered microsoft-ds no-response MAC Address: 00:18:8B:F9:13:DD (Dell) Final times for host: srtt: 2000 rttvar: 5000 to: 100000 Nmap scan report for 192.168.87.35 Host is up, received arp-response (0.0019s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:26:B9:35:05:49 (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; not Windows, or Windows with disabled browser service (CLEAN); or Windows with crashed browser service (possibly INFECTED). | | If you know the remote system is Windows, try rebooting it and scanning | |_ again. (Error NT_STATUS_OBJECT_NAME_NOT_FOUND) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1875 rttvar: 4000 to: 100000 Nmap scan report for bcs-srv.bcs.cmsu.edu (192.168.87.36) Host is up, received arp-response (0.0019s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:26:B9:35:05:49 (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; not Windows, or Windows with disabled browser service (CLEAN); or Windows with crashed browser service (possibly INFECTED). | | If you know the remote system is Windows, try rebooting it and scanning | |_ again. (Error NT_STATUS_OBJECT_NAME_NOT_FOUND) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.37 Host is up, received arp-response (0.0020s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 1s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:20:AA:56:80:17 (Digimedia Vision) Final times for host: srtt: 2000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.38 Host is up, received arp-response (0.0027s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 1s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:20:AA:56:80:0B (Digimedia Vision) Final times for host: srtt: 2750 rttvar: 4250 to: 100000 Nmap scan report for 192.168.87.39 Host is up, received arp-response (0.0018s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 1s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:20:AA:56:7F:B0 (Digimedia Vision) Final times for host: srtt: 1750 rttvar: 4250 to: 100000 Nmap scan report for 192.168.87.40 Host is up, received arp-response (0.0019s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 1s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:20:AA:56:76:DD (Digimedia Vision) Final times for host: srtt: 1875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.41 Host is up, received arp-response (0.0019s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 1s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:20:AA:56:76:E4 (Digimedia Vision) Final times for host: srtt: 1875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.42 Host is up, received arp-response (0.0019s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 1s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:20:AA:56:77:74 (Digimedia Vision) Final times for host: srtt: 1875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.43 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 1s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:20:AA:56:77:15 (Digimedia Vision) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.44 Host is up, received arp-response (0.0011s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 1s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:20:AA:56:76:EC (Digimedia Vision) Final times for host: srtt: 1125 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.56 Host is up, received arp-response (0.00s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:24:21:55:7A:CF (Micro-star Int'l CO.) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 0 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.57 Host is up, received arp-response (0.00013s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 1s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:30:18:AE:CF:FF (Jetway Information Co.) Final times for host: srtt: 125 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.58 Host is up, received arp-response (0.0036s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 1s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:30:18:A5:76:4C (Jetway Information Co.) Final times for host: srtt: 3625 rttvar: 4500 to: 100000 Nmap scan report for 192.168.87.60 Host is up, received arp-response (0.0036s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 1s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:11:43:AF:4C:EB (Dell) Final times for host: srtt: 3625 rttvar: 4500 to: 100000 Nmap scan report for 192.168.87.62 Host is up, received arp-response (0.0027s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 1s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:1A:A0:E1:F0:48 (Dell) Final times for host: srtt: 2750 rttvar: 4250 to: 100000 Nmap scan report for 192.168.87.70 Host is up, received arp-response (0.046s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 2s PORT STATE SERVICE REASON 445/tcp filtered microsoft-ds no-response MAC Address: 00:60:35:0B:9C:E3 (Dallas Semiconductor) Final times for host: srtt: 46000 rttvar: 46000 to: 230000 Nmap scan report for 192.168.87.71 Host is up, received arp-response (0.0029s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 1s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:0D:AD:01:FA:E1 (Dataprobe) Final times for host: srtt: 2875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.72 Host is up, received arp-response (0.0019s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:1A:A0:DD:EC:92 (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; Network name not found (required service has crashed). (Error NT_STATUS_BAD_NETWORK_NAME) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.73 Host is up, received arp-response (0.0019s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 1s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:90:F9:30:72:BE (Leitch) Final times for host: srtt: 1875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.76 Host is up, received arp-response (0.0019s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:13:20:0B:33:81 (Intel Corporate) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.81 Host is up, received arp-response (0.0018s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:11:43:AE:EA:C1 (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1750 rttvar: 4250 to: 100000 Nmap scan report for BCS-MAR017C-01S.bcs.cmsu.edu (192.168.87.82) Host is up, received arp-response (0.0018s latency). Scanned at 2012-10-17 10:25:28 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:18:8B:27:44:49 (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN; access was denied. | | If you have a login, try using --script-args=smbuser=xxx,smbpass=yyy | | (replace xxx and yyy with your username and password). Also try | |_ smbdomain=zzz if you know the domain. (Error NT_STATUS_ACCESS_DENIED) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1750 rttvar: 4250 to: 100000 Initiating ARP Ping Scan at 10:25 Scanning 172 hosts [1 port/host] Packet capture filter (device eth0): arp and arp[18:4] = 0x00188B26 and arp[22:2] = 0x9F3C Completed ARP Ping Scan at 10:25, 4.04s elapsed (172 total hosts) Overall sending rates: 62.70 packets / s, 2633.46 bytes / s. Initiating Parallel DNS resolution of 172 hosts. at 10:25 mass_rdns: 0.00s 0/100 [#: 2, OK: 0, NX: 0, DR: 0, SF: 0, TR: 21] mass_rdns: 0.01s 50/100 [#: 2, OK: 16, NX: 34, DR: 0, SF: 0, TR: 100] Completed Parallel DNS resolution of 172 hosts. at 10:25, 0.05s elapsed DNS resolution of 100 IPs took 0.05s. Mode: Async [#: 2, OK: 20, NX: 80, DR: 0, SF: 0, TR: 100, CN: 0] Nmap scan report for 192.168.87.84 [host down, received no-response] Nmap scan report for 192.168.87.85 [host down, received no-response] Nmap scan report for 192.168.87.86 [host down, received no-response] Nmap scan report for 192.168.87.87 [host down, received no-response] Nmap scan report for 192.168.87.88 [host down, received no-response] Nmap scan report for 192.168.87.89 [host down, received no-response] Nmap scan report for 192.168.87.90 [host down, received no-response] Nmap scan report for 192.168.87.91 [host down, received no-response] Nmap scan report for 192.168.87.92 [host down, received no-response] Nmap scan report for 192.168.87.93 [host down, received no-response] Nmap scan report for 192.168.87.94 [host down, received no-response] Nmap scan report for 192.168.87.95 [host down, received no-response] Nmap scan report for 192.168.87.96 [host down, received no-response] Nmap scan report for 192.168.87.97 [host down, received no-response] Nmap scan report for 192.168.87.98 [host down, received no-response] Nmap scan report for 192.168.87.99 [host down, received no-response] Nmap scan report for 192.168.87.100 [host down, received no-response] Nmap scan report for 192.168.87.101 [host down, received no-response] Skipping SYN Stealth Scan against 192.168.87.83 because Windows does not support scanning your own machine (localhost) this way. NSE: Script scanning 192.168.87.83. NSE: Starting runlevel 1 (of 1) scan. Nmap scan report for 192.168.87.83 Host is up, received localhost-response. Scanned at 1969-12-31 18:00:00 Central Standard Time for 0s PORT STATE SERVICE REASON 445/tcp unknown microsoft-ds no-response Nmap scan report for 192.168.87.103 [host down, received no-response] Nmap scan report for 192.168.87.104 [host down, received no-response] Nmap scan report for 192.168.87.105 [host down, received no-response] Nmap scan report for 192.168.87.108 [host down, received no-response] Nmap scan report for 192.168.87.110 [host down, received no-response] Nmap scan report for 192.168.87.111 [host down, received no-response] Nmap scan report for 192.168.87.113 [host down, received no-response] Nmap scan report for 192.168.87.114 [host down, received no-response] Nmap scan report for 192.168.87.118 [host down, received no-response] Nmap scan report for 192.168.87.121 [host down, received no-response] Nmap scan report for 192.168.87.122 [host down, received no-response] Nmap scan report for 192.168.87.125 [host down, received no-response] Nmap scan report for 192.168.87.126 [host down, received no-response] Nmap scan report for 192.168.87.130 [host down, received no-response] Nmap scan report for 192.168.87.144 [host down, received no-response] Nmap scan report for 192.168.87.145 [host down, received no-response] Nmap scan report for 192.168.87.146 [host down, received no-response] Nmap scan report for 192.168.87.147 [host down, received no-response] Nmap scan report for 192.168.87.148 [host down, received no-response] Nmap scan report for 192.168.87.149 [host down, received no-response] Nmap scan report for 192.168.87.151 [host down, received no-response] Nmap scan report for 192.168.87.153 [host down, received no-response] Nmap scan report for 192.168.87.155 [host down, received no-response] Nmap scan report for 192.168.87.157 [host down, received no-response] Nmap scan report for 192.168.87.158 [host down, received no-response] Nmap scan report for 192.168.87.159 [host down, received no-response] Nmap scan report for 192.168.87.160 [host down, received no-response] Nmap scan report for 192.168.87.163 [host down, received no-response] Nmap scan report for 192.168.87.165 [host down, received no-response] Nmap scan report for 192.168.87.171 [host down, received no-response] Nmap scan report for 192.168.87.172 [host down, received no-response] Nmap scan report for 192.168.87.174 [host down, received no-response] Nmap scan report for 192.168.87.176 [host down, received no-response] Nmap scan report for 192.168.87.177 [host down, received no-response] Nmap scan report for 192.168.87.178 [host down, received no-response] Nmap scan report for 192.168.87.179 [host down, received no-response] Nmap scan report for 192.168.87.180 [host down, received no-response] Nmap scan report for 192.168.87.181 [host down, received no-response] Nmap scan report for 192.168.87.183 [host down, received no-response] Nmap scan report for 192.168.87.185 [host down, received no-response] Nmap scan report for 192.168.87.203 [host down, received no-response] Nmap scan report for 192.168.87.205 [host down, received no-response] Nmap scan report for 192.168.87.206 [host down, received no-response] Nmap scan report for 192.168.87.207 [host down, received no-response] Nmap scan report for 192.168.87.208 [host down, received no-response] Nmap scan report for 192.168.87.215 [host down, received no-response] Nmap scan report for 192.168.87.216 [host down, received no-response] Nmap scan report for 192.168.87.222 [host down, received no-response] Nmap scan report for 192.168.87.225 [host down, received no-response] Nmap scan report for 192.168.87.226 [host down, received no-response] Nmap scan report for 192.168.87.233 [host down, received no-response] Nmap scan report for 192.168.87.234 [host down, received no-response] Nmap scan report for 192.168.87.253 [host down, received no-response] Nmap scan report for 192.168.87.255 [host down, received no-response] Initiating SYN Stealth Scan at 10:25 Scanning 100 hosts [1 port/host] Packet capture filter (device eth0): dst host 192.168.87.83 and (icmp or icmp6 or tcp or udp or sctp) Discovered open port 445/tcp on 192.168.87.107 Discovered open port 445/tcp on 192.168.87.106 Discovered open port 445/tcp on 192.168.87.109 Discovered open port 445/tcp on 192.168.87.115 Discovered open port 445/tcp on 192.168.87.117 Discovered open port 445/tcp on 192.168.87.128 Discovered open port 445/tcp on 192.168.87.131 Discovered open port 445/tcp on 192.168.87.129 Discovered open port 445/tcp on 192.168.87.132 Discovered open port 445/tcp on 192.168.87.140 Discovered open port 445/tcp on 192.168.87.141 Discovered open port 445/tcp on 192.168.87.142 Discovered open port 445/tcp on 192.168.87.161 Discovered open port 445/tcp on 192.168.87.162 Discovered open port 445/tcp on 192.168.87.169 Discovered open port 445/tcp on 192.168.87.170 Discovered open port 445/tcp on 192.168.87.168 Discovered open port 445/tcp on 192.168.87.189 Discovered open port 445/tcp on 192.168.87.190 Discovered open port 445/tcp on 192.168.87.192 Discovered open port 445/tcp on 192.168.87.193 Discovered open port 445/tcp on 192.168.87.194 Discovered open port 445/tcp on 192.168.87.196 Discovered open port 445/tcp on 192.168.87.197 Discovered open port 445/tcp on 192.168.87.199 Discovered open port 445/tcp on 192.168.87.198 Discovered open port 445/tcp on 192.168.87.200 Discovered open port 445/tcp on 192.168.87.201 Discovered open port 445/tcp on 192.168.87.202 Discovered open port 445/tcp on 192.168.87.191 Discovered open port 445/tcp on 192.168.87.229 Discovered open port 445/tcp on 192.168.87.235 Discovered open port 445/tcp on 192.168.87.244 Discovered open port 445/tcp on 192.168.87.251 Discovered open port 445/tcp on 192.168.87.250 Discovered open port 445/tcp on 192.168.87.240 Discovered open port 445/tcp on 192.168.87.241 Discovered open port 445/tcp on 192.168.87.242 Discovered open port 445/tcp on 192.168.87.243 Discovered open port 445/tcp on 192.168.87.150 Discovered open port 445/tcp on 192.168.87.124 Discovered open port 445/tcp on 192.168.87.135 Discovered open port 445/tcp on 192.168.87.136 Increased max_successful_tryno for 192.168.87.136 to 1 (packet drop) Bogus rttdelta: 2608000 (srtt 443000) ... ignoring Bogus rttdelta: 2868780 (srtt 182220) ... ignoring Completed SYN Stealth Scan at 10:25, 3.06s elapsed (100 total ports) Overall sending rates: 36.96 packets / s, 1626.43 bytes / s. NSE: Script scanning 100 hosts. NSE: Starting runlevel 1 (of 1) scan. NSE: Starting smb-check-vulns against 192.168.87.106. NSE: Starting smb-check-vulns against 192.168.87.107. NSE: Starting smb-check-vulns against 192.168.87.109. NSE: Starting smb-check-vulns against 192.168.87.115. NSE: Starting smb-check-vulns against 192.168.87.117. NSE: Starting smb-check-vulns against 192.168.87.124. NSE: Starting smb-check-vulns against 192.168.87.128. NSE: Starting smb-check-vulns against 192.168.87.129. NSE: Starting smb-check-vulns against 192.168.87.131. NSE: Starting smb-check-vulns against 192.168.87.132. NSE: Starting smb-check-vulns against 192.168.87.135. NSE: Starting smb-check-vulns against 192.168.87.136. NSE: Starting smb-check-vulns against 192.168.87.140. NSE: Starting smb-check-vulns against 192.168.87.141. NSE: Starting smb-check-vulns against 192.168.87.142. NSE: Starting smb-check-vulns against 192.168.87.150. NSE: Starting smb-check-vulns against 192.168.87.161. NSE: Starting smb-check-vulns against 192.168.87.162. NSE: Starting smb-check-vulns against 192.168.87.168. NSE: Starting smb-check-vulns against 192.168.87.169. NSE: Starting smb-check-vulns against 192.168.87.170. NSE: Starting smb-check-vulns against 192.168.87.189. NSE: Starting smb-check-vulns against 192.168.87.190. NSE: Starting smb-check-vulns against 192.168.87.191. NSE: Starting smb-check-vulns against 192.168.87.192. NSE: Starting smb-check-vulns against 192.168.87.193. NSE: Starting smb-check-vulns against 192.168.87.194. NSE: Starting smb-check-vulns against 192.168.87.196. NSE: Starting smb-check-vulns against 192.168.87.197. NSE: Starting smb-check-vulns against 192.168.87.198. NSE: Starting smb-check-vulns against 192.168.87.199. NSE: Starting smb-check-vulns against 192.168.87.200. NSE: Starting smb-check-vulns against 192.168.87.201. NSE: Starting smb-check-vulns against 192.168.87.202. NSE: Starting smb-check-vulns against 192.168.87.229. NSE: Starting smb-check-vulns against 192.168.87.235. NSE: Starting smb-check-vulns against 192.168.87.240. NSE: Starting smb-check-vulns against 192.168.87.241. NSE: Starting smb-check-vulns against 192.168.87.242. NSE: Starting smb-check-vulns against 192.168.87.243. NSE: Starting smb-check-vulns against 192.168.87.244. NSE: Starting smb-check-vulns against 192.168.87.250. NSE: Starting smb-check-vulns against 192.168.87.251. Initiating NSE at 10:25 NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: SMB: WARNING: the server appears to be Unix; your mileage may vary. NSE: SMB: Login as EDITSHARE_GROUP\guest failed, but was given guest access (username may be wrong, or system may only allow guest) NSE: SMB: WARNING: the server appears to be Unix; your mileage may vary. NSE: SMB: Login as EDITSHARE_GROUP\guest failed, but was given guest access (username may be wrong, or system may only allow guest) NSE: Finished smb-check-vulns against 192.168.87.168. NSE: SMB: WARNING: the server appears to be Unix; your mileage may vary. NSE: SMB: Login as CONTENTDEPOT\guest failed, but was given guest access (username may be wrong, or system may only allow guest) NSE: Finished smb-check-vulns against 192.168.87.169. NSE: SMB: WARNING: the server appears to be Unix; your mileage may vary. NSE: SMB: Login as CONTENTDEPOT\guest failed, but was given guest access (username may be wrong, or system may only allow guest) NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: Finished smb-check-vulns against 192.168.87.170. NSE: Finished smb-check-vulns against 192.168.87.128. NSE: SMB: Login as \guest failed (NT_STATUS_LOGON_FAILURE) NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: Finished smb-check-vulns against 192.168.87.129. NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: Finished smb-check-vulns against 192.168.87.106. NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: Finished smb-check-vulns against 192.168.87.229. NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: Finished smb-check-vulns against 192.168.87.189. NSE: Finished smb-check-vulns against 192.168.87.109. NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: Finished smb-check-vulns against 192.168.87.132. NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: Finished smb-check-vulns against 192.168.87.190. NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: Finished smb-check-vulns against 192.168.87.191. NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: Finished smb-check-vulns against 192.168.87.192. NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: Finished smb-check-vulns against 192.168.87.135. NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: Finished smb-check-vulns against 192.168.87.193. NSE: Finished smb-check-vulns against 192.168.87.115. NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: Finished smb-check-vulns against 192.168.87.136. NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: Finished smb-check-vulns against 192.168.87.194. NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: Finished smb-check-vulns against 192.168.87.196. NSE: SMB: Login as WORKGROUP\guest failed, but was given guest access (username may be wrong, or system may only allow guest) NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: Finished smb-check-vulns against 192.168.87.117. NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: Finished smb-check-vulns against 192.168.87.197. NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: Finished smb-check-vulns against 192.168.87.131. NSE: SMB: WARNING: the server appears to be Unix; your mileage may vary. NSE: SMB: Login as CONTENTDEPOT\guest failed, but was given guest access (username may be wrong, or system may only allow guest) NSE: SMB: Added account '' to account list NSE: SMB: Added account 'guest' to account list NSE: Finished smb-check-vulns against 192.168.87.107. NSE: Finished smb-check-vulns against 192.168.87.140. NSE: Finished smb-check-vulns against 192.168.87.235. NSE: Finished smb-check-vulns against 192.168.87.199. NSE: Finished smb-check-vulns against 192.168.87.240. NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: SMB: WARNING: the server appears to be Unix; your mileage may vary. NSE: SMB: Login as CONTENTDEPOT\guest failed, but was given guest access (username may be wrong, or system may only allow guest) NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: Finished smb-check-vulns against 192.168.87.198. NSE: Finished smb-check-vulns against 192.168.87.141. NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: Finished smb-check-vulns against 192.168.87.242. NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: SMB: Login as \guest failed (NT_STATUS_LOGON_FAILURE) NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: SMB: Login as WORKGROUP\guest failed, but was given guest access (username may be wrong, or system may only allow guest) NSE: Finished smb-check-vulns against 192.168.87.142. NSE: SMB: Login as ITS\guest failed, but was given guest access (username may be wrong, or system may only allow guest) NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: Finished smb-check-vulns against 192.168.87.200. NSE: SMB: Login as \guest failed (NT_STATUS_LOGON_FAILURE) NSE: Finished smb-check-vulns against 192.168.87.124. NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: Finished smb-check-vulns against 192.168.87.201. NSE: Finished smb-check-vulns against 192.168.87.150. NSE: SMB: Login as WORKGROUP\guest failed, but was given guest access (username may be wrong, or system may only allow guest) NSE: Finished smb-check-vulns against 192.168.87.202. NSE: SMB: Login as \guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: Finished smb-check-vulns against 192.168.87.243. NSE: Finished smb-check-vulns against 192.168.87.244. NSE: SMB: Login as MSHOME\guest failed, but was given guest access (username may be wrong, or system may only allow guest) NSE: SMB: Login as \guest failed (NT_STATUS_LOGON_FAILURE) NSE: Finished smb-check-vulns against 192.168.87.241. NSE: Finished smb-check-vulns against 192.168.87.162. NSE: Finished smb-check-vulns against 192.168.87.161. NSE: Finished smb-check-vulns against 192.168.87.250. NSE: Finished smb-check-vulns against 192.168.87.251. Completed NSE at 10:25, 4.32s elapsed Nmap scan report for 192.168.87.102 Host is up, received arp-response (0.00013s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:0D:56:97:8B:5C (Dell Pcba Test) Final times for host: srtt: 125 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.106 Host is up, received arp-response (0.00025s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 7s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:14:22:4A:68:0B (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN; access was denied. | | If you have a login, try using --script-args=smbuser=xxx,smbpass=yyy | | (replace xxx and yyy with your username and password). Also try | |_ smbdomain=zzz if you know the domain. (Error NT_STATUS_ACCESS_DENIED) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 250 rttvar: 4250 to: 100000 Nmap scan report for 192.168.87.107 Host is up, received arp-response (0.00013s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 9s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:11:43:AE:EA:98 (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 125 rttvar: 4000 to: 100000 Nmap scan report for BCS-MAR012--01S.bcs.cmsu.edu (192.168.87.109) Host is up, received arp-response (0.0019s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 8s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:18:8B:19:70:5C (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN; access was denied. | | If you have a login, try using --script-args=smbuser=xxx,smbpass=yyy | | (replace xxx and yyy with your username and password). Also try | |_ smbdomain=zzz if you know the domain. (Error NT_STATUS_ACCESS_DENIED) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.112 Host is up, received arp-response (0.0020s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp filtered microsoft-ds no-response MAC Address: 00:11:43:A4:84:63 (Dell) Final times for host: srtt: 2000 rttvar: 5000 to: 100000 Nmap scan report for 192.168.87.115 Host is up, received arp-response (0.0019s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 8s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:1A:A0:E1:E3:E9 (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN; access was denied. | | If you have a login, try using --script-args=smbuser=xxx,smbpass=yyy | | (replace xxx and yyy with your username and password). Also try | |_ smbdomain=zzz if you know the domain. (Error NT_STATUS_ACCESS_DENIED) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.116 Host is up, received arp-response (0.0020s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp filtered microsoft-ds no-response MAC Address: 00:11:43:A6:20:BA (Dell) Final times for host: srtt: 2000 rttvar: 5000 to: 100000 Nmap scan report for ktbgRCS.bcs.cmsu.edu (192.168.87.117) Host is up, received arp-response (0.0019s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 8s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:18:8B:1D:EB:B3 (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.119 Host is up, received arp-response (0.0063s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:08:E1:00:DC:9B (Barix AG) Final times for host: srtt: 6250 rttvar: 6750 to: 100000 Nmap scan report for martin006-1.bcs.cmsu.edu (192.168.87.120) Host is up, received arp-response (0.021s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:08:E1:01:0F:40 (Barix AG) Final times for host: srtt: 21250 rttvar: 20750 to: 104250 Nmap scan report for 192.168.87.123 Host is up, received arp-response (0.00088s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:12:17:58:75:CA (Cisco-Linksys) Final times for host: srtt: 875 rttvar: 4000 to: 100000 Nmap scan report for ktbg-fm-xmitter.bcs.cmsu.edu (192.168.87.124) Host is up, received arp-response (0.025s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 11s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:C0:4F:0C:07:16 (Dell Computer) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 25125 rttvar: 26750 to: 132125 Nmap scan report for 192.168.87.127 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp filtered microsoft-ds no-response MAC Address: 00:E0:4C:EB:D2:DD (Realtek Semiconductor) Final times for host: srtt: 1000 rttvar: 5000 to: 100000 Nmap scan report for OUTREACHSPECIALIST.bcs.cmsu.edu (192.168.87.128) Host is up, received arp-response (0.0011s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 7s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:03:2D:16:FB:9D (Ibase Technology) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; not Windows, or Windows with disabled browser service (CLEAN); or Windows with crashed browser service (possibly INFECTED). | | If you know the remote system is Windows, try rebooting it and scanning | |_ again. (Error NT_STATUS_OBJECT_NAME_NOT_FOUND) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1125 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.129 Host is up, received arp-response (0.0011s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 7s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:03:2D:14:6B:31 (Ibase Technology) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; not Windows, or Windows with disabled browser service (CLEAN); or Windows with crashed browser service (possibly INFECTED). | | If you know the remote system is Windows, try rebooting it and scanning | |_ again. (Error NT_STATUS_OBJECT_NAME_NOT_FOUND) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1125 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.131 Host is up, received arp-response (0.0011s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 8s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:18:8B:19:6E:D9 (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1125 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.132 Host is up, received arp-response (0.0038s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 8s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:C0:4F:78:54:92 (Dell Computer) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 3750 rttvar: 4250 to: 100000 Nmap scan report for oldktbg.bcs.cmsu.edu (192.168.87.133) Host is up, received arp-response (0.20s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:11:43:AF:4C:EB (Dell) Final times for host: srtt: 199875 rttvar: 172250 to: 888875 Nmap scan report for 192.168.87.134 Host is up, received arp-response (0.31s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 5s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:11:43:AF:4C:EB (Dell) Final times for host: srtt: 310828 rttvar: 271406 to: 1396452 Nmap scan report for 192.168.87.135 Host is up, received arp-response (0.73s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 8s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:11:43:AF:4C:EB (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 728875 rttvar: 588250 to: 3081875 Nmap scan report for 192.168.87.136 Host is up, received arp-response (0.22s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 8s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:11:43:AF:4C:EB (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 219703 rttvar: 265906 to: 1283327 Nmap scan report for 192.168.87.137 Host is up, received arp-response (0.49s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 7s PORT STATE SERVICE REASON 445/tcp filtered microsoft-ds host-unreach from 10.1.1.1 MAC Address: 00:11:43:AF:4C:EB (Dell) Final times for host: srtt: 491875 rttvar: 430000 to: 2211875 Nmap scan report for 192.168.87.138 Host is up, received arp-response (0.0030s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp filtered microsoft-ds no-response MAC Address: 00:18:8B:F9:24:37 (Dell) Final times for host: srtt: 3000 rttvar: 5000 to: 100000 Nmap scan report for 192.168.87.139 Host is up, received arp-response (0.52s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:11:43:AF:4C:EB (Dell) Final times for host: srtt: 520250 rttvar: 573750 to: 2815250 Nmap scan report for martin-022-1.bcs.cmsu.edu (192.168.87.140) Host is up, received arp-response (0.0027s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 9s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:03:2D:16:FB:9D (Ibase Technology) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; not Windows, or Windows with disabled browser service (CLEAN); or Windows with crashed browser service (possibly INFECTED). | | If you know the remote system is Windows, try rebooting it and scanning | |_ again. (Error NT_STATUS_OBJECT_NAME_NOT_FOUND) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 2750 rttvar: 4250 to: 100000 Nmap scan report for TRANSMIT2.bcs.cmsu.edu (192.168.87.141) Host is up, received arp-response (0.0027s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 11s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:03:2D:14:6B:31 (Ibase Technology) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; not Windows, or Windows with disabled browser service (CLEAN); or Windows with crashed browser service (possibly INFECTED). | | If you know the remote system is Windows, try rebooting it and scanning | |_ again. (Error NT_STATUS_OBJECT_NAME_NOT_FOUND) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 2750 rttvar: 4250 to: 100000 Nmap scan report for 192.168.87.142 Host is up, received arp-response (0.0027s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 11s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:14:22:44:4B:D0 (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 2750 rttvar: 4250 to: 100000 Nmap scan report for WOOD11-2.bcs.cmsu.edu (192.168.87.143) Host is up, received arp-response (0.0027s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:1B:78:70:41:A9 (Hewlett-Packard Company) Final times for host: srtt: 2750 rttvar: 4250 to: 100000 Nmap scan report for 192.168.87.150 Host is up, received arp-response (0.0019s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 11s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:12:3F:31:51:05 (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1875 rttvar: 4000 to: 100000 Nmap scan report for UCM-WVSJ159BR55.bcs.cmsu.edu (192.168.87.152) Host is up, received arp-response (0.0020s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp filtered microsoft-ds no-response MAC Address: 00:12:3F:57:ED:BB (Dell) Final times for host: srtt: 2000 rttvar: 5000 to: 100000 Nmap scan report for UCM-WASZL4UMM1O.bcs.cmsu.edu (192.168.87.154) Host is up, received arp-response (0.0020s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp filtered microsoft-ds no-response MAC Address: BC:30:5B:D2:F2:CF (Dell) Final times for host: srtt: 2000 rttvar: 5000 to: 100000 Nmap scan report for HDHR-103066D7.bcs.cmsu.edu (192.168.87.156) Host is up, received arp-response (0.0021s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:18:DD:03:06:6D (Silicondust Engineering) Final times for host: srtt: 2125 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.161 Host is up, received arp-response (0.0020s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 12s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:11:43:AE:E8:AF (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 2000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.162 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 12s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:15:60:10:10:B2 (Hewlett-Packard Company) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN; access was denied. | | If you have a login, try using --script-args=smbuser=xxx,smbpass=yyy | | (replace xxx and yyy with your username and password). Also try | |_ smbdomain=zzz if you know the domain. (Error NT_STATUS_ACCESS_DENIED) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.164 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp filtered microsoft-ds no-response MAC Address: 2C:27:D7:EE:9A:B1 (Hewlett-Packard Company) Final times for host: srtt: 1000 rttvar: 5000 to: 100000 Nmap scan report for 192.168.87.166 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp filtered microsoft-ds no-response MAC Address: 00:30:8C:39:71:A0 (Quantum) Final times for host: srtt: 1000 rttvar: 5000 to: 100000 Nmap scan report for 192.168.87.167 Host is up, received arp-response (0.0054s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: B4:99:BA:86:24:C0 (Hewlett-Packard Company) Final times for host: srtt: 5375 rttvar: 5750 to: 100000 Nmap scan report for 192.168.87.168 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 7s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: D0:67:E5:FA:54:D1 (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN; access was denied. | | If you have a login, try using --script-args=smbuser=xxx,smbpass=yyy | | (replace xxx and yyy with your username and password). Also try | |_ smbdomain=zzz if you know the domain. (Error NT_STATUS_ACCESS_DENIED) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.169 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 7s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:60:DD:45:4A:FE (Myricom) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; not Windows, or Windows with disabled browser service (CLEAN); or Windows with crashed browser service (possibly INFECTED). | | If you know the remote system is Windows, try rebooting it and scanning | |_ again. (Error NT_STATUS_OBJECT_NAME_NOT_FOUND) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.170 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 7s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:60:DD:45:74:73 (Myricom) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; not Windows, or Windows with disabled browser service (CLEAN); or Windows with crashed browser service (possibly INFECTED). | | If you know the remote system is Windows, try rebooting it and scanning | |_ again. (Error NT_STATUS_OBJECT_NAME_NOT_FOUND) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 Nmap scan report for HDHR-1030790B.bcs.cmsu.edu (192.168.87.173) Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:18:DD:03:07:90 (Silicondust Engineering) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.175 Host is up, received arp-response (0.065s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:D0:69:07:98:72 (Technologic Systems) Final times for host: srtt: 65250 rttvar: 70250 to: 346250 Nmap scan report for 192.168.87.182 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp filtered microsoft-ds no-response MAC Address: D0:67:E5:FA:54:D2 (Dell) Final times for host: srtt: 1000 rttvar: 5000 to: 100000 Nmap scan report for 192.168.87.184 Host is up, received arp-response (0.0027s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:20:4A:E9:52:6D (Pronet Gmbh) Final times for host: srtt: 2750 rttvar: 4250 to: 100000 Nmap scan report for 192.168.87.186 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:02:C5:10:24:85 (Evertz Microsystems) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.187 Host is up, received arp-response (0.0034s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:02:C5:10:22:77 (Evertz Microsystems) Final times for host: srtt: 3421 rttvar: 3781 to: 100000 Nmap scan report for 192.168.87.188 Host is up, received arp-response (0.0020s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp filtered microsoft-ds no-response MAC Address: 00:14:D1:19:1B:01 (Trendnet) Final times for host: srtt: 2000 rttvar: 5000 to: 100000 Nmap scan report for BCS-MAR023--01S.bcs.cmsu.edu (192.168.87.189) Host is up, received arp-response (0.0020s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 8s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:08:74:A3:24:ED (Dell Computer) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 2000 rttvar: 3750 to: 100000 Nmap scan report for kmos-mcsrv.bcs.cmsu.edu (192.168.87.190) Host is up, received arp-response (0.0020s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 8s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:08:74:37:A5:EA (Dell Computer) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 2000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.191 Host is up, received arp-response (0.0019s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 8s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:19:D1:33:CC:7F (Intel) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; got error NT_STATUS_WERR_INVALID_PARAMETER (srvsvc.netpathcanonicalize) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.192 Host is up, received arp-response (0.0019s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 8s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:16:76:A1:38:44 (Intel) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; got error NT_STATUS_WERR_INVALID_PARAMETER (srvsvc.netpathcanonicalize) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.193 Host is up, received arp-response (0.0019s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 8s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:16:76:A1:41:43 (Intel) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; got error NT_STATUS_WERR_INVALID_PARAMETER (srvsvc.netpathcanonicalize) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.194 Host is up, received arp-response (0.0019s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 8s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:16:76:A1:41:56 (Intel) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; got error NT_STATUS_WERR_INVALID_PARAMETER (srvsvc.netpathcanonicalize) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.195 Host is up, received arp-response (0.0019s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:1F:29:21:40:A7 (Hewlett-Packard Company) Final times for host: srtt: 1875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.196 Host is up, received arp-response (0.0019s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 8s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:16:76:A1:41:61 (Intel) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; got error NT_STATUS_WERR_INVALID_PARAMETER (srvsvc.netpathcanonicalize) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.197 Host is up, received arp-response (0.0019s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 8s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:16:76:A1:41:6F (Intel) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; got error NT_STATUS_WERR_INVALID_PARAMETER (srvsvc.netpathcanonicalize) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.198 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 11s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:18:8B:19:6F:CD (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN; access was denied. | | If you have a login, try using --script-args=smbuser=xxx,smbpass=yyy | | (replace xxx and yyy with your username and password). Also try | |_ smbdomain=zzz if you know the domain. (Error NT_STATUS_ACCESS_DENIED) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.199 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 9s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:16:76:A1:41:79 (Intel) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; got error NT_STATUS_WERR_INVALID_PARAMETER (srvsvc.netpathcanonicalize) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.200 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 11s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:08:74:12:33:38 (Dell Computer) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 Nmap scan report for ktbgonair.bcs.cmsu.edu (192.168.87.201) Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 11s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:C0:9F:20:05:B2 (Quanta Computer) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; got error NT_STATUS_WERR_INVALID_PARAMETER (srvsvc.netpathcanonicalize) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 Nmap scan report for KTBG-SIMIAN-SRV.bcs.cmsu.edu (192.168.87.202) Host is up, received arp-response (0.00088s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 11s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:18:8B:27:FC:05 (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.204 Host is up, received arp-response (0.00088s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:E0:4C:77:8B:93 (Realtek Semiconductor) Final times for host: srtt: 875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.209 Host is up, received arp-response (0.00088s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:02:92:00:11:18 (Logic Innovations) Final times for host: srtt: 875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.210 Host is up, received arp-response (0.00013s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:E0:81:25:BD:08 (Tyan Computer) Final times for host: srtt: 125 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.211 Host is up, received arp-response (0.00013s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:E0:81:25:BD:08 (Tyan Computer) Final times for host: srtt: 125 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.212 Host is up, received arp-response (0.00050s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:06:4D:00:85:58 (Sencore) Final times for host: srtt: 500 rttvar: 4750 to: 100000 Nmap scan report for 192.168.87.213 Host is up, received arp-response (0.00050s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:06:4D:00:85:C0 (Sencore) Final times for host: srtt: 500 rttvar: 4750 to: 100000 Nmap scan report for 192.168.87.214 Host is up, received arp-response (0.0022s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:06:4D:00:85:BE (Sencore) Final times for host: srtt: 2250 rttvar: 4250 to: 100000 Nmap scan report for 192.168.87.217 Host is up, received arp-response (0.0022s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:06:4D:01:58:88 (Sencore) Final times for host: srtt: 2250 rttvar: 4250 to: 100000 Nmap scan report for DATA-HUB.bcs.cmsu.edu (192.168.87.218) Host is up, received arp-response (0.0021s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:06:4D:01:58:4C (Sencore) Final times for host: srtt: 2125 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.219 Host is up, received arp-response (0.0021s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:06:4D:01:4E:2D (Sencore) Final times for host: srtt: 2125 rttvar: 4000 to: 100000 Nmap scan report for VR400-1NXVTS.bcs.cmsu.edu (192.168.87.220) Host is up, received arp-response (0.0021s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:06:4D:01:4E:3E (Sencore) Final times for host: srtt: 2125 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.221 Host is up, received arp-response (0.0021s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:90:64:8F:09:5A (Thomson) Final times for host: srtt: 2125 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.223 Host is up, received arp-response (0.0013s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:0D:5D:03:B0:5A (Raritan Computer) Final times for host: srtt: 1250 rttvar: 4250 to: 100000 Nmap scan report for 192.168.87.224 Host is up, received arp-response (0.097s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:02:D1:00:01:7B (Vivotek) Final times for host: srtt: 96500 rttvar: 106750 to: 523500 Nmap scan report for 192.168.87.227 Host is up, received arp-response (0.0013s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:10:DE:00:40:60 (International Datacasting) Final times for host: srtt: 1250 rttvar: 4250 to: 100000 Nmap scan report for 192.168.87.228 Host is up, received arp-response (0.0013s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:10:DE:00:42:89 (International Datacasting) Final times for host: srtt: 1250 rttvar: 4250 to: 100000 Nmap scan report for 192.168.87.229 Host is up, received arp-response (0.0013s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 7s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:21:9B:FB:1C:47 (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; got error NT_STATUS_WERR_INVALID_PARAMETER (srvsvc.netpathcanonicalize) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1250 rttvar: 4250 to: 100000 Nmap scan report for KMOSMAR17--02S.bcs.cmsu.edu (192.168.87.230) Host is up, received arp-response (0.0029s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:20:AA:0F:96:BF (Digimedia Vision) Final times for host: srtt: 2875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.231 Host is up, received arp-response (0.0020s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:20:AA:0F:43:8B (Digimedia Vision) Final times for host: srtt: 2000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.232 Host is up, received arp-response (0.0020s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:20:AA:0F:42:70 (Digimedia Vision) Final times for host: srtt: 2000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.235 Host is up, received arp-response (0.00025s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 9s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:30:48:68:E9:56 (Supermicro Computer) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 250 rttvar: 4250 to: 100000 Nmap scan report for 192.168.87.236 Host is up, received arp-response (0.18s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:02:C5:FE:79:01 (Evertz Microsystems) Final times for host: srtt: 181375 rttvar: 206500 to: 1007375 Nmap scan report for 192.168.87.237 Host is up, received arp-response (0.17s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:02:C5:00:36:13 (Evertz Microsystems) Final times for host: srtt: 171375 rttvar: 193500 to: 945375 Nmap scan report for 192.168.87.238 Host is up, received arp-response (0.069s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:02:C5:10:28:9B (Evertz Microsystems) Final times for host: srtt: 68500 rttvar: 77500 to: 378500 Nmap scan report for 192.168.87.239 Host is up, received arp-response (0.0099s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:90:C2:DD:D2:17 (JK microsystems) Final times for host: srtt: 9875 rttvar: 10500 to: 100000 Nmap scan report for 192.168.87.240 Host is up, received arp-response (0.0020s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 9s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:16:76:45:5E:E2 (Intel) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; got error NT_STATUS_WERR_INVALID_PARAMETER (srvsvc.netpathcanonicalize) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 2000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.241 Host is up, received arp-response (0.0011s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 12s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:16:76:45:5F:0D (Intel) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; got error NT_STATUS_WERR_INVALID_PARAMETER (srvsvc.netpathcanonicalize) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1125 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.242 Host is up, received arp-response (0.0011s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 11s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:16:76:45:5D:06 (Intel) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; got error NT_STATUS_WERR_INVALID_PARAMETER (srvsvc.netpathcanonicalize) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1125 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.243 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 11s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:1C:C0:16:72:26 (Intel Corporate) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN; access was denied. | | If you have a login, try using --script-args=smbuser=xxx,smbpass=yyy | | (replace xxx and yyy with your username and password). Also try | |_ smbdomain=zzz if you know the domain. (Error NT_STATUS_ACCESS_DENIED) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.244 Host is up, received arp-response (0.00013s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 12s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:18:8B:48:1B:0B (Dell) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; got error NT_STATUS_WERR_INVALID_PARAMETER (srvsvc.netpathcanonicalize) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 125 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.245 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 08:00:5B:00:17:0E (VTA Technologies) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.246 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 08:00:5B:00:15:C7 (VTA Technologies) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.247 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 08:00:5B:00:19:5C (VTA Technologies) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.248 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 08:00:5B:00:19:75 (VTA Technologies) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.249 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 08:00:5B:00:15:E4 (VTA Technologies) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.250 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 12s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:B0:D0:82:73:74 (Dell Computer) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: Likely CLEAN | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.251 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 12s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack MAC Address: 00:11:11:84:8E:C9 (Intel) Host script results: | smb-check-vulns: | MS08-067: CHECK DISABLED (remove 'safe=1' argument to run) | Conficker: UNKNOWN; got error NT_STATUS_WERR_INVALID_PARAMETER (srvsvc.netpathcanonicalize) | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run) | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add '--script-args=unsafe=1' to run) | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run) |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 Nmap scan report for 192.168.87.252 Host is up, received arp-response (0.00088s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 08:00:5B:00:24:66 (VTA Technologies) Final times for host: srtt: 875 rttvar: 4000 to: 100000 Nmap scan report for 192.168.87.254 Host is up, received arp-response (0.0010s latency). Scanned at 2012-10-17 10:25:32 Central Daylight Time for 4s PORT STATE SERVICE REASON 445/tcp closed microsoft-ds reset MAC Address: 00:26:B9:35:05:49 (Dell) Final times for host: srtt: 1000 rttvar: 3750 to: 100000 NSE: Script Post-scanning. NSE: Starting runlevel 1 (of 1) scan. Read from C:\Program Files (x86)\Nmap: nmap-mac-prefixes nmap-payloads nmap-services. Nmap done: 256 IP addresses (125 hosts up) scanned in 17.15 seconds Raw packets sent: 534 (17.176KB) | Rcvd: 473 (15.932KB)