Network Asset Management
===
[TOC]
## Logical topology diagram

## Asset list
| Device | IP | MAC | Hostname | OS | Open ports |
|:----------------:|:-------------:|:-----------------:|:---------------:|:---------------:|:------------------------------------------:|
| Telus WiFi | 192.168.1.41 | d4:86:60:35:9a:b9 | | Linux 3.2 - 4.9 | T:80,7547,45514,U:1900 |
| IP TV | 192.168.1.65 | fc:53:b0:a2:70:73 | | unknown | T:14035,36435,36993 |
| iPhone | 192.168.1.66 | 3a:78:c2:c6:0a:fe | Flycatcher | iOS 16 | T:49152,49158,62078,U:5353 |
| Kail(Virtualize) | 192.168.1.67 | da:f5:f7:01:90:1d | | Kali GNU/Linux | 65535 closed tcp ports (reset) |
| iPad | 192.168.1.73 | 7a:fe:83:d4:4b:70 | iPad | iPadOs 16 | Not booted while scan |
| Mac14,2 | 192.168.1.74 | 1c:57:dc:78:7b:81 | Furnace | macOS 14 | T:53,5000,7000,58725,U:137,5353 |
| Window Desktop | 192.168.1.75 | b0:7d:64:b2:9c:b0 | DESKTOP-9VKEPT2 | Windows10 22H2 | Not booted while scan |
| SteamDeck | 192.168.1.76 | 50:5a:65:24:1f:75 | steamdeck | SteamOS Holo | T:5355,8081,27036 |
| iPhone | 192.168.1.79 | e6:2b:49:f7:16:68 | iPhone | iOS 16 | T:49152,49153,62078,U:5353 |
| Telus NH20A | 192.168.1.254 | 60:8d:26:0f:49:48 | | Linux 3.2 - 4.9 | T:53,80,443,10053,45514,48657,U:53,67,1900 |
## Scans history
```
nmap -n -sn 192.168.1.0/24 -oG - \| awk '/Up$/{print $2}' >> hostlist.txt
```
:clock1: 2023-10-14 13:25
> Quick rundown of options and commands:
> - -n turns off reverse name resolution, since you just want IP addresses. On a local LAN this is probably the slowest step, too, so you get a good speed boost.
> - -sn means "Don't do a port scan." It's the same as the older, deprecated -sP with the mnemonic "ping scan."
> - -oG - sends "grepable" output to stdout, which gets piped to awk.
> - /Up$/ selects only lines which end with "Up", representing hosts that are online.
> - {print $2} prints the second whitespace-separated field, which is the IP address.
> [name=bonsaiviking@stackexchange.com]
Output:
```=
└─$ cat hostlist.txt
192.168.1.41
192.168.1.65
192.168.1.66
192.168.1.67
192.168.1.74
192.168.1.79
192.168.1.254
```
---
List MAC addresses by arp:
```=
└─$ arp
Address HWtype HWaddress Flags Mask Iface
192.168.1.65 ether fc:53:b0:a2:70:73 C eth0
192.168.1.41 ether d4:86:60:35:9a:b9 C eth0
192.168.1.66 ether 3a:78:c2:c6:0a:fe C eth0
192.168.1.73 ether 7a:fe:83:d4:4b:70 C eth0
192.168.1.75 ether b0:7d:64:b2:9c:b0 C eth0
192.168.1.74 ether 1c:57:dc:78:7b:81 C eth0
192.168.1.79 ether e6:2b:49:f7:16:68 C eth0
192.168.1.254 ether 60:8d:26:0f:49:48 C eth0
```
Somehow we got 2 IPs (`192.168.1.73` and `192.168.1.75`)that didn't been discover by previous scan. It might means they are not active active for now. I would guess they are iPad and my desktop. And notice ..67 doesn't appear in the ARP table, because `192.168.1.67` is kali itself.
---
```
sudo nmap -iL hostlist.txt -sS -p- -T4
```
:clock1: 2023-10-14 13:39
Output:
```=
Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-14 13:39 MDT
Stats: 0:07:26 elapsed; 1 hosts completed (5 up), 5 undergoing SYN Stealth Scan
SYN Stealth Scan Timing: About 92.38% done; ETC: 13:47 (0:00:37 remaining)
Nmap scan report for 192.168.1.41
Host is up (0.017s latency).
Not shown: 65532 closed tcp ports (reset)
PORT STATE SERVICE
80/tcp open http
7547/tcp open cwmp
45514/tcp open cloudcheck
MAC Address: D4:86:60:35:9A:B9 (Arcadyan)
Nmap scan report for 192.168.1.65
Host is up (0.028s latency).
Not shown: 65532 closed tcp ports (reset)
PORT STATE SERVICE
14035/tcp open unknown
36435/tcp open unknown
36993/tcp open unknown
MAC Address: FC:53:B0:A2:70:73 (Unknown)
Nmap scan report for 192.168.1.74
Host is up (0.00049s latency).
Not shown: 65477 closed tcp ports (reset), 54 filtered tcp ports (no-response)
PORT STATE SERVICE
53/tcp open domain
5000/tcp open upnp
7000/tcp open afs3-fileserver
58725/tcp open unknown
MAC Address: 1C:57:DC:78:7B:81 (Apple)
Nmap scan report for 192.168.1.79
Host is up (0.021s latency).
Not shown: 65532 closed tcp ports (reset)
PORT STATE SERVICE
49152/tcp open unknown
49153/tcp open unknown
62078/tcp open iphone-sync
MAC Address: E6:2B:49:F7:16:68 (Unknown)
Nmap scan report for 192.168.1.254
Host is up (0.0094s latency).
Not shown: 65529 closed tcp ports (reset)
PORT STATE SERVICE
53/tcp open domain
80/tcp open http
443/tcp open https
10053/tcp open unknown
45514/tcp open cloudcheck
48657/tcp open unknown
MAC Address: 60:8D:26:0F:49:48 (Arcadyan)
Nmap scan report for 192.168.1.67
Host is up (0.0000010s latency).
All 65535 scanned ports on 192.168.1.67 are in ignored states.
Not shown: 65535 closed tcp ports (reset)
Nmap done: 7 IP addresses (6 hosts up) scanned in 709.05 seconds
```
---
```
sudo nmap -iL hostlist.txt -sU -T4
```
:clock1: 2023-10-14 14:31
Output:
```=
Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-14 14:31 MDT
Stats: 0:00:05 elapsed; 0 hosts completed (6 up), 6 undergoing UDP Scan
UDP Scan Timing: About 34.49% done; ETC: 14:31 (0:00:09 remaining)
Warning: 192.168.1.41 giving up on port because retransmission cap hit (6).
Warning: 192.168.1.254 giving up on port because retransmission cap hit (6).
Stats: 0:08:40 elapsed; 0 hosts completed (6 up), 6 undergoing UDP Scan
UDP Scan Timing: About 63.22% done; ETC: 14:44 (0:05:02 remaining)
Stats: 0:14:42 elapsed; 0 hosts completed (6 up), 6 undergoing UDP Scan
UDP Scan Timing: About 81.56% done; ETC: 14:49 (0:03:19 remaining)
Stats: 0:22:48 elapsed; 0 hosts completed (6 up), 6 undergoing UDP Scan
UDP Scan Timing: About 90.98% done; ETC: 14:56 (0:02:16 remaining)
Warning: 192.168.1.66 giving up on port because retransmission cap hit (6).
Stats: 0:28:43 elapsed; 0 hosts completed (6 up), 6 undergoing UDP Scan
UDP Scan Timing: About 94.57% done; ETC: 15:01 (0:01:39 remaining)
Stats: 0:35:04 elapsed; 0 hosts completed (6 up), 6 undergoing UDP Scan
UDP Scan Timing: About 96.35% done; ETC: 15:07 (0:01:20 remaining)
Stats: 0:39:41 elapsed; 0 hosts completed (6 up), 6 undergoing UDP Scan
UDP Scan Timing: About 98.37% done; ETC: 15:11 (0:00:39 remaining)
Nmap scan report for 192.168.1.41
Host is up (0.0090s latency).
Not shown: 988 closed udp ports (port-unreach)
PORT STATE SERVICE
37/udp open|filtered time
68/udp open|filtered dhcpc
1900/udp open upnp
9199/udp open|filtered unknown
17638/udp open|filtered unknown
19047/udp open|filtered unknown
19605/udp open|filtered unknown
20019/udp open|filtered unknown
20518/udp open|filtered unknown
47808/udp open|filtered bacnet
49213/udp open|filtered unknown
61319/udp open|filtered unknown
MAC Address: D4:86:60:35:9A:B9 (Arcadyan)
Nmap scan report for 192.168.1.65
Host is up (0.11s latency).
All 1000 scanned ports on 192.168.1.65 are in ignored states.
Not shown: 1000 closed udp ports (port-unreach)
MAC Address: FC:53:B0:A2:70:73 (Unknown)
Nmap scan report for 192.168.1.66
Host is up (0.081s latency).
Not shown: 773 closed udp ports (port-unreach), 226 open|filtered udp ports (no-response)
PORT STATE SERVICE
5353/udp open zeroconf
MAC Address: 3A:78:C2:C6:0A:FE (Unknown)
Nmap scan report for 192.168.1.74
Host is up (0.00053s latency).
Not shown: 995 closed udp ports (port-unreach)
PORT STATE SERVICE
53/udp open|filtered domain
67/udp open|filtered dhcps
137/udp open netbios-ns
138/udp open|filtered netbios-dgm
5353/udp open zeroconf
MAC Address: 1C:57:DC:78:7B:81 (Apple)
Nmap scan report for 192.168.1.79
Host is up (0.070s latency).
Not shown: 999 closed udp ports (port-unreach)
PORT STATE SERVICE
5353/udp open zeroconf
MAC Address: E6:2B:49:F7:16:68 (Unknown)
Nmap scan report for 192.168.1.254
Host is up (0.011s latency).
Not shown: 990 closed udp ports (port-unreach)
PORT STATE SERVICE
37/udp open|filtered time
53/udp open domain
67/udp open|filtered dhcps
1900/udp open upnp
4000/udp open|filtered icq
5060/udp open|filtered sip
16816/udp open|filtered unknown
19503/udp open|filtered unknown
31625/udp open|filtered unknown
49213/udp open|filtered unknown
MAC Address: 60:8D:26:0F:49:48 (Arcadyan)
Nmap scan report for 192.168.1.67
Host is up (0.0000010s latency).
All 1000 scanned ports on 192.168.1.67 are in ignored states.
Not shown: 1000 closed udp ports (port-unreach)
Nmap done: 7 IP addresses (7 hosts up) scanned in 2896.06 seconds
```
It took 48 minutes to finish. Hopefully I won't need to redo the scan.
---
```
nmap -iL hostlist.txt -sV -O -v -T4
```
:clock1: 2023-10-14 15:54
Output:
```=
Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-14 15:54 MDT
Nmap scan report for 192.168.1.41
Host is up (0.0090s latency).
Not shown: 999 closed tcp ports (reset)
PORT STATE SERVICE VERSION
80/tcp open http
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.94%I=7%D=10/14%Time=652B0E02%P=aarch64-unknown-linux-gnu
SF:%r(GetRequest,DC,"HTTP/1\.1\x20302\x20Found\r\nPragma:\x20no-cache\r\nC
SF:ache-Control:\x20no-cache\r\nContent-length:\x200\r\nLocation:\x20/logi
SF:n\.htm\r\nX-Content-Type-Options:\x20nosniff\r\nX-XSS-Protection:\x201;
SF:\x20mode=block\r\nX-Frame-Options:\x20SAMEORIGIN\r\nConnection:\x20clos
SF:e\r\n\r\n")%r(HTTPOptions,DC,"HTTP/1\.1\x20302\x20Found\r\nPragma:\x20n
SF:o-cache\r\nCache-Control:\x20no-cache\r\nContent-length:\x200\r\nLocati
SF:on:\x20/login\.htm\r\nX-Content-Type-Options:\x20nosniff\r\nX-XSS-Prote
SF:ction:\x201;\x20mode=block\r\nX-Frame-Options:\x20SAMEORIGIN\r\nConnect
SF:ion:\x20close\r\n\r\n")%r(FourOhFourRequest,DC,"HTTP/1\.1\x20302\x20Fou
SF:nd\r\nPragma:\x20no-cache\r\nCache-Control:\x20no-cache\r\nContent-leng
SF:th:\x200\r\nLocation:\x20/login\.htm\r\nX-Content-Type-Options:\x20nosn
SF:iff\r\nX-XSS-Protection:\x201;\x20mode=block\r\nX-Frame-Options:\x20SAM
SF:EORIGIN\r\nConnection:\x20close\r\n\r\n");
MAC Address: D4:86:60:35:9A:B9 (Arcadyan)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.9
Network Distance: 1 hop
Nmap scan report for 192.168.1.65
Host is up (0.017s latency).
All 1000 scanned ports on 192.168.1.65 are in ignored states.
Not shown: 1000 closed tcp ports (reset)
MAC Address: FC:53:B0:A2:70:73 (Unknown)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: IBM InfoPrint 1754 printer (97%), Linux 2.6.38 (93%), Aerohive HiveOS 6.1 (93%), Arris cable modem (Linux 2.6.18) (93%), Arris TG862 WAP (93%), Aruba Instant AP (ArubaOS 6.4.2.6) (93%), Asus RT-AC66U router (Linux 2.6) (93%), AVM FRITZ!Box (FritzOS 6.20) (93%), AVM FRITZ!WLAN Repeater 450E (FritzOS 6.51) (93%), Avocent MergePoint Unity MPU2016DAC KVM switch (93%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 1 hop
Nmap scan report for 192.168.1.66
Host is up (0.022s latency).
Not shown: 997 closed tcp ports (reset)
PORT STATE SERVICE VERSION
49152/tcp open unknown
49158/tcp open unknown
62078/tcp open tcpwrapped
MAC Address: 3A:78:C2:C6:0A:FE (Unknown)
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.94%E=4%D=10/14%OT=49152%CT=1%CU=44579%PV=Y%DS=1%DC=D%G=Y%M=3A78
OS:C2%TM=652B0EB6%P=aarch64-unknown-linux-gnu)SEQ(SP=103%GCD=1%ISR=106%TI=Z
OS:%CI=RD%II=RI%TS=21)SEQ(SP=103%GCD=1%ISR=10D%TI=Z%CI=RD%II=RI%TS=21)SEQ(S
OS:P=105%GCD=1%ISR=10B%TI=Z%CI=RD%II=RI%TS=21)SEQ(SP=108%GCD=1%ISR=10B%TI=Z
OS:%CI=RD%II=I%TS=21)SEQ(SP=FE%GCD=1%ISR=10D%TI=Z%CI=RD%II=RI%TS=21)OPS(O1=
OS:M5B4NW5NNT11SLL%O2=M5B4NW5NNT11SLL%O3=M5B4NW5NNT11%O4=M5B4NW5NNT11SLL%O5
OS:=M5B4NW5NNT11SLL%O6=M5B4NNT11SLL)WIN(W1=FFFF%W2=FFFF%W3=FFFF%W4=FFFF%W5=
OS:FFFF%W6=FFFF)ECN(R=Y%DF=Y%T=40%W=FFFF%O=M5B4NW5SLL%CC=N%Q=)T1(R=Y%DF=Y%T
OS:=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R
OS:%O=%RD=0%Q=)T5(R=Y%DF=N%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=
OS:40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=N%T=40%W=0%S=Z%A=S%F=AR%O=%RD=0%
OS:Q=)U1(R=Y%DF=N%T=40%IPL=38%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=0%RUD=G)IE(R=Y
OS:%DFI=S%T=40%CD=S)
Network Distance: 1 hop
Nmap scan report for 192.168.1.74
Host is up (0.00096s latency).
Not shown: 997 closed tcp ports (reset)
PORT STATE SERVICE VERSION
53/tcp open domain?
5000/tcp open rtsp AirTunes rtspd 710.79.1
7000/tcp open rtsp AirTunes rtspd 710.79.1
MAC Address: 1C:57:DC:78:7B:81 (Apple)
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.94%E=4%D=10/14%OT=53%CT=1%CU=37988%PV=Y%DS=1%DC=D%G=Y%M=1C57DC%
OS:TM=652B0EB6%P=aarch64-unknown-linux-gnu)SEQ(SP=100%GCD=1%ISR=10F%TI=Z%CI
OS:=RI%II=RI%TS=21)SEQ(SP=101%GCD=1%ISR=10C%TI=Z%CI=RI%II=RI%TS=22)SEQ(SP=1
OS:03%GCD=1%ISR=10B%TI=Z%CI=RI%II=RI%TS=21)SEQ(SP=106%GCD=1%ISR=10A%TI=Z%CI
OS:=RI%II=RI%TS=21)SEQ(SP=107%GCD=1%ISR=10D%TI=Z%CI=RI%II=RI%TS=22)OPS(O1=M
OS:5B4NW6NNT11SLL%O2=M5B4NW6NNT11SLL%O3=M5B4NW6NNT11%O4=M5B4NW6NNT11SLL%O5=
OS:M5B4NW6NNT11SLL%O6=M5B4NNT11SLL)WIN(W1=FFFF%W2=FFFF%W3=FFFF%W4=FFFF%W5=F
OS:FFF%W6=FFFF)ECN(R=Y%DF=N%T=40%W=FFFF%O=M5B4NW6SLL%CC=N%Q=)T1(R=Y%DF=N%T=
OS:40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=N%T=40%W=0%S=A%A=Z%F=R%
OS:O=%RD=0%Q=)T5(R=Y%DF=N%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=N%T=4
OS:0%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=N)U1(R=Y%DF=N%T=40%IPL=38%UN=0%RIPL=G%
OS:RID=G%RIPCK=G%RUCK=0%RUD=G)IE(R=Y%DFI=N%T=40%CD=S)
Network Distance: 1 hop
Nmap scan report for 192.168.1.254
Host is up (0.0088s latency).
Not shown: 997 closed tcp ports (reset)
PORT STATE SERVICE VERSION
53/tcp open domain?
80/tcp open http
443/tcp open ssl/https
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.94%I=7%D=10/14%Time=652B0E02%P=aarch64-unknown-linux-gnu
SF:%r(GetRequest,9A,"HTTP/1\.1\x20302\x20Found\r\nPragma:\x20no-cache\r\nC
SF:ache-Control:\x20no-cache\r\nContent-length:\x200\r\nLocation:\x20/logi
SF:n\.htm\r\nX-Frame-Options:\x20SAMEORIGIN\r\nConnection:\x20close\r\n\r\
SF:n")%r(HTTPOptions,9A,"HTTP/1\.1\x20302\x20Found\r\nPragma:\x20no-cache\
SF:r\nCache-Control:\x20no-cache\r\nContent-length:\x200\r\nLocation:\x20/
SF:login\.htm\r\nX-Frame-Options:\x20SAMEORIGIN\r\nConnection:\x20close\r\
SF:n\r\n")%r(FourOhFourRequest,9A,"HTTP/1\.1\x20302\x20Found\r\nPragma:\x2
SF:0no-cache\r\nCache-Control:\x20no-cache\r\nContent-length:\x200\r\nLoca
SF:tion:\x20/login\.htm\r\nX-Frame-Options:\x20SAMEORIGIN\r\nConnection:\x
SF:20close\r\n\r\n");
MAC Address: 60:8D:26:0F:49:48 (Arcadyan)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.9
Network Distance: 1 hop
Nmap scan report for 192.168.1.67
Host is up (0.000092s latency).
All 1000 scanned ports on 192.168.1.67 are in ignored states.
Not shown: 1000 closed tcp ports (reset)
Too many fingerprints match this host to give specific OS details
Network Distance: 0 hops
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 7 IP addresses (6 hosts up) scanned in 189.97 seconds
```
Try to detect OS and version, but the result is not really useful.
---
```
nmap -n -sS -p- -T4 192.168.1.66
```
:clock1: 2023-10-14 16:25
Output:
```
Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-14 16:25 MDT
Nmap scan report for 192.168.1.66
Host is up (0.023s latency).
Not shown: 65532 closed tcp ports (reset)
PORT STATE SERVICE
49152/tcp open unknown
49158/tcp open unknown
62078/tcp open iphone-sync
MAC Address: 3A:78:C2:C6:0A:FE (Unknown)
Nmap done: 1 IP address (1 host up) scanned in 7.43 seconds
```
Just found in first scan, 192.168.1.66 wasn't up.
---
```
nmap -n -sU -sV -p U:37,68,1900,9199,17638,19047,19605,20019,20518,47808,49213,61319 192.168.1.41
```
:clock1: 2023-10-15 11:20
output:
```=
Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-15 11:20 MDT
Nmap scan report for 192.168.1.41
Host is up (0.010s latency).
PORT STATE SERVICE VERSION
37/udp closed time
68/udp open|filtered dhcpc
1900/udp open upnp?
9199/udp closed unknown
17638/udp closed unknown
19047/udp closed unknown
19605/udp closed unknown
20019/udp closed unknown
20518/udp closed unknown
47808/udp closed bacnet
49213/udp closed unknown
61319/udp closed unknown
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port1900-UDP:V=7.94%I=7%D=10/15%Time=652C1F5B%P=aarch64-unknown-linux-g
SF:nu%r(UPNP_MSEARCH,1EC,"HTTP/1\.1\x20200\x20OK\r\nCACHE-CONTROL:\x20max-
SF:age\x20=\x201800\r\nEXT:\r\nLOCATION:\x20http://192\.168\.1\.41:45514/a
SF:gent\.xml\r\nSERVER:\x20Linux/4\.1\.52\x20UPnP/1\.1\x20Cloudcheck_Agent
SF:/3\.2\.17\x20BS22130031694\r\nST:\x20upnp:rootdevice\r\nUSN:\x20uuid:f3
SF:702659-8fb1-4c54-af7a-00bf7d17dcd6::upnp:rootdevice\r\nBOOTID\.UPNP\.OR
SF:G:\x201\r\nBSSID_0\.assia-inc\.com:\x20D4:86:60:35:9A:BC\r\nBSSID_32\.a
SF:ssia-inc\.com:\x20D4:86:60:35:9A:BD\r\nBSSID_34\.assia-inc\.com:\x2062:
SF:86:60:35:9A:BF\r\nBSSID_40\.assia-inc\.com:\x20D4:86:60:35:9A:BE\r\nBSS
SF:ID_42\.assia-inc\.com:\x206A:86:60:35:9A:B8\r\n\r\n");
MAC Address: D4:86:60:35:9A:B9 (Arcadyan)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 108.56 seconds
```
---
```
nmap -n -sUV -p U:68 192.168.1.41
```
:clock1: 2023-10-15 11:26
output:
```=
Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-15 11:26 MDT
Nmap scan report for 192.168.1.41
Host is up (0.0071s latency).
PORT STATE SERVICE VERSION
68/udp open|filtered dhcpc
MAC Address: D4:86:60:35:9A:B9 (Arcadyan)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 99.20 seconds
```
---
```
nmap --script broadcast-dhcp-discover
```
:clock1: 2023-10-15 11:34
output:
```=
Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-15 11:34 MDT
Pre-scan script results:
| broadcast-dhcp-discover:
| Response 1 of 2:
| Interface: eth1
| IP Offered: 172.21.0.8
| DHCP Message Type: DHCPOFFER
| Server Identifier: 172.21.0.5
| IP Address Lease Time: 1d00h00m00s
| Subnet Mask: 255.255.0.0
| Domain Name Server: 8.8.8.8
| Response 2 of 2:
| Interface: eth0
| IP Offered: 192.168.1.68
| DHCP Message Type: DHCPOFFER
| Server Identifier: 192.168.1.254
| IP Address Lease Time: 1d00h00m00s
| Subnet Mask: 255.255.255.0
| Router: 192.168.1.254
| Domain Name Server: 192.168.1.254
| Vendor Specific Information: \x01\x15https://hdm.telus.com
| Renewal Time Value: 12h00m00s
| Rebinding Time Value: 21h00m00s
|_ Bootfile Name: CVT/2/239.192.10.200:16000+SA=239.192.10.200:16000
WARNING: No targets were specified, so 0 hosts scanned.
Nmap done: 0 IP addresses (0 hosts up) scanned in 10.22 seconds
```
---
```
nmap -n -sUV -p U:53,67,138 192.168.1.74
```
:clock1: 2023-10-15 11:39
output:
```=
Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-15 11:39 MDT
Nmap scan report for 192.168.1.74
Host is up (0.00026s latency).
PORT STATE SERVICE VERSION
53/udp open|filtered domain
67/udp open|filtered dhcps
138/udp open|filtered netbios-dgm
MAC Address: 1C:57:DC:78:7B:81 (Apple)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 105.19 seconds
```
---
```
nmap -n -sUV -p U:137,5353 -T4 192.168.1.74
```
:clock1: 2023-10-15 11:43
output:
```=
Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-15 11:43 MDT
Nmap scan report for 192.168.1.74
Host is up (0.00060s latency).
PORT STATE SERVICE VERSION
137/udp open netbios-ns Apple Mac OS X netbios-ns
5353/udp open mdns DNS-based service discovery
MAC Address: 1C:57:DC:78:7B:81 (Apple)
Service Info: Host: FURNACE; OS: Mac OS X; CPE: cpe:/o:apple:mac_os_x
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 0.29 seconds
```
---
```
nmap -n -sUV -p U:37,53,67,1900,4000,5060,16816,19503,31625,49213 -T4 192.168.1.254
```
:clock1: 2023-10-15 12:01
output:
```=
Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-15 12:01 MDT
Nmap scan report for 192.168.1.254
Host is up (0.012s latency).
PORT STATE SERVICE VERSION
37/udp closed time
53/udp open domain ISC BIND
67/udp open|filtered dhcps
1900/udp open upnp?
4000/udp closed icq
5060/udp open|filtered sip
16816/udp closed unknown
19503/udp closed unknown
31625/udp closed unknown
49213/udp closed unknown
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port1900-UDP:V=7.94%I=7%D=10/15%Time=652C291A%P=aarch64-unknown-linux-g
SF:nu%r(UPNP_MSEARCH,115,"HTTP/1\.1\x20200\x20OK\r\nCACHE-CONTROL:\x20max-
SF:age\x20=\x201800\r\nEXT:\r\nLOCATION:\x20http://192\.168\.1\.254:45514/
SF:agent\.xml\r\nSERVER:\x20Linux/4\.1\.52\x20UPnP/1\.1\x20Cloudcheck_Agen
SF:t/3\.1\.0\x20ARCB04502A00\r\nST:\x20upnp:rootdevice\r\nUSN:\x20uuid:f38
SF:921c0-4d18-4e8f-b847-780cf23a919f::upnp:rootdevice\r\nBOOTID\.UPNP\.ORG
SF::\x201\r\n\r\n");
MAC Address: 60:8D:26:0F:49:48 (Arcadyan)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 105.21 seconds
```
---
```
nmap -n -sS -sV -p- -T4 192.168.1.76
```
:clock1: 2023-10-15 12:49
output:
```=
Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-15 12:49 MDT
Nmap scan report for 192.168.1.76
Host is up (0.015s latency).
Not shown: 65532 closed tcp ports (reset)
PORT STATE SERVICE VERSION
5355/tcp open llmnr?
8081/tcp open tcpwrapped
27036/tcp open ssl/steam Valve Steam In-Home Streaming service (TLSv1.2 PSK)
MAC Address: 50:5A:65:24:1F:75 (AzureWave Technologies)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 165.65 seconds
```
---
```
nmap -n -sU -T4 192.168.1.76
```
:clock1: 2023-10-15 13:00
output:
```=
Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-15 13:00 MDT
Warning: 192.168.1.76 giving up on port because retransmission cap hit (6).
Nmap scan report for 192.168.1.76
Host is up (0.20s latency).
Not shown: 985 closed udp ports (port-unreach)
PORT STATE SERVICE
111/udp open|filtered rpcbind
989/udp open|filtered ftps-data
1040/udp open|filtered netarx
1056/udp open|filtered vfo
1090/udp open|filtered ff-fms
5355/udp open|filtered llmnr
19294/udp open|filtered unknown
22996/udp open|filtered unknown
25157/udp open|filtered unknown
36108/udp open|filtered unknown
42508/udp open|filtered candp
47915/udp open|filtered unknown
48189/udp open|filtered unknown
49165/udp open|filtered unknown
51717/udp open|filtered unknown
MAC Address: 50:5A:65:24:1F:75 (AzureWave Technologies)
Nmap done: 1 IP address (1 host up) scanned in 1072.14 seconds
```
---
```
nmap -n -sUV -p U:111,989,1040,1056,1090,5355,19294,22996,25157,36108,42508,47915,48189,49165,51717 -T4 192.168.1.76
```
:clock1: 2023-10-15 13:20
output:
```=
Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-15 13:20 MDT
Nmap scan report for 192.168.1.76
Host is up (0.14s latency).
PORT STATE SERVICE VERSION
111/udp open|filtered rpcbind
989/udp closed ftps-data
1040/udp closed netarx
1056/udp closed vfo
1090/udp closed ff-fms
5355/udp open|filtered llmnr
19294/udp closed unknown
22996/udp closed unknown
25157/udp closed unknown
36108/udp closed unknown
42508/udp open|filtered candp
47915/udp closed unknown
48189/udp closed unknown
49165/udp closed unknown
51717/udp closed unknown
MAC Address: 50:5A:65:24:1F:75 (AzureWave Technologies)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 107.18 seconds
```