(base) ┌──(root㉿zss)-[/home/zss/桌面]
└─# nmap -p- --open -Pn -n --min-rate 10000 192.168.56.144 -oN ports.txt
Starting Nmap 7.98 ( https://nmap.org ) at 2026-01-13 15:14 +0800
Nmap scan report for 192.168.56.144
Host is up (0.00044s latency).
Not shown: 65532 closed tcp ports (reset)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
3000/tcp open ppp
MAC Address: 08:00:27:93:0D:E5 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 2.56 seconds
(base) ┌──(root㉿zss)-[/home/zss/桌面]
└─# nmap -p 22,80,3000 -sCV -Pn -n 192.168.56.144
Starting Nmap 7.98 ( https://nmap.org ) at 2026-01-13 15:14 +0800
Nmap scan report for 192.168.56.144
Host is up (0.00047s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 9.2p1 Debian 2+deb12u6 (protocol 2.0)
| ssh-hostkey:
| 256 c0:14:af:ad:a9:67:50:e3:9a:23:d9:29:2e:14:ec:42 (ECDSA)
|_ 256 fa:a3:d3:9b:df:ba:58:49:9e:5d:54:d4:fa:e8:36:bf (ED25519)
80/tcp open http Apache httpd 2.4.62 ((Debian))
|_http-title: SECURITRONA - Hacker Cibern\xC3\xA9tica
|_http-server-header: Apache/2.4.62 (Debian)
3000/tcp open ppp?
| fingerprint-strings:
| GetRequest:
| HTTP/1.1 200 OK
| X-Content-Type-Options: nosniff
| X-Frame-Options: DENY
| X-XSS-Protection: 1; mode=block
| Referrer-Policy: strict-origin-when-cross-origin
| Accept-Ranges: bytes
| Cache-Control: public, max-age=0
| Last-Modified: Thu, 26 Jun 2025 23:03:48 GMT
| ETag: W/"fa7-197ae7ba420"
| Content-Type: text/html; charset=UTF-8
| Content-Length: 4007
| Date: Tue, 13 Jan 2026 07:15:03 GMT
| Connection: close
| <!DOCTYPE html>
| <html lang="es">
| <head>
| <meta charset="UTF-8">
| <meta name="viewport" content="width=device-width, initial-scale=1.0">
| <title>Securitrona - Black Hacker Peligrosa</title>
| <link rel="stylesheet" href="styles.css">
| <link href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.0.0/css/all.min.css" rel="stylesheet">
| <script src="/socket.io/socket.io.js"></script>
| <script src="https://cdn.jsdelivr.net/npm/marked/marked.min.js"></script>
| </head>
| <bod
| HTTPOptions, RTSPRequest:
| HTTP/1.1 404 Not Found
| X-Content-Type-Options: nosniff
| X-Frame-Options: DENY
| X-XSS-Protection: 1; mode=block
| Referrer-Policy: strict-origin-when-cross-origin
| Content-Type: application/json; charset=utf-8
| Content-Length: 30
| ETag: W/"1e-vhoou9sM6XmJtOZWC9/edTTWHh8"
| Date: Tue, 13 Jan 2026 07:15:04 GMT
| Connection: close
| {"error":"Ruta no encontrada"}
| Help, NCP:
| HTTP/1.1 400 Bad Request
|_ Connection: close
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port3000-TCP:V=7.98%I=7%D=1/13%Time=6965F0FD%P=x86_64-pc-linux-gnu%r(Ge
SF:tRequest,113C,"HTTP/1\.1\x20200\x20OK\r\nX-Content-Type-Options:\x20nos
SF:niff\r\nX-Frame-Options:\x20DENY\r\nX-XSS-Protection:\x201;\x20mode=blo
SF:ck\r\nReferrer-Policy:\x20strict-origin-when-cross-origin\r\nAccept-Ran
SF:ges:\x20bytes\r\nCache-Control:\x20public,\x20max-age=0\r\nLast-Modifie
SF:d:\x20Thu,\x2026\x20Jun\x202025\x2023:03:48\x20GMT\r\nETag:\x20W/\"fa7-
SF:197ae7ba420\"\r\nContent-Type:\x20text/html;\x20charset=UTF-8\r\nConten
SF:t-Length:\x204007\r\nDate:\x20Tue,\x2013\x20Jan\x202026\x2007:15:03\x20
SF:GMT\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20html>\n<html\x20lang=\"
SF:es\">\n<head>\n\x20\x20\x20\x20<meta\x20charset=\"UTF-8\">\n\x20\x20\x2
SF:0\x20<meta\x20name=\"viewport\"\x20content=\"width=device-width,\x20ini
SF:tial-scale=1\.0\">\n\x20\x20\x20\x20<title>Securitrona\x20-\x20Black\x2
SF:0Hacker\x20Peligrosa</title>\n\x20\x20\x20\x20<link\x20rel=\"stylesheet
SF:\"\x20href=\"styles\.css\">\n\x20\x20\x20\x20<link\x20href=\"https://cd
SF:njs\.cloudflare\.com/ajax/libs/font-awesome/6\.0\.0/css/all\.min\.css\"
SF:\x20rel=\"stylesheet\">\n\x20\x20\x20\x20<script\x20src=\"/socket\.io/s
SF:ocket\.io\.js\"></script>\n\x20\x20\x20\x20<script\x20src=\"https://cdn
SF:\.jsdelivr\.net/npm/marked/marked\.min\.js\"></script>\n</head>\n<bod")
SF:%r(Help,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\
SF:r\n\r\n")%r(NCP,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x
SF:20close\r\n\r\n")%r(HTTPOptions,168,"HTTP/1\.1\x20404\x20Not\x20Found\r
SF:\nX-Content-Type-Options:\x20nosniff\r\nX-Frame-Options:\x20DENY\r\nX-X
SF:SS-Protection:\x201;\x20mode=block\r\nReferrer-Policy:\x20strict-origin
SF:-when-cross-origin\r\nContent-Type:\x20application/json;\x20charset=utf
SF:-8\r\nContent-Length:\x2030\r\nETag:\x20W/\"1e-vhoou9sM6XmJtOZWC9/edTTW
SF:Hh8\"\r\nDate:\x20Tue,\x2013\x20Jan\x202026\x2007:15:04\x20GMT\r\nConne
SF:ction:\x20close\r\n\r\n{\"error\":\"Ruta\x20no\x20encontrada\"}")%r(RTS
SF:PRequest,168,"HTTP/1\.1\x20404\x20Not\x20Found\r\nX-Content-Type-Option
SF:s:\x20nosniff\r\nX-Frame-Options:\x20DENY\r\nX-XSS-Protection:\x201;\x2
SF:0mode=block\r\nReferrer-Policy:\x20strict-origin-when-cross-origin\r\nC
SF:ontent-Type:\x20application/json;\x20charset=utf-8\r\nContent-Length:\x
SF:2030\r\nETag:\x20W/\"1e-vhoou9sM6XmJtOZWC9/edTTWHh8\"\r\nDate:\x20Tue,\
SF:x2013\x20Jan\x202026\x2007:15:04\x20GMT\r\nConnection:\x20close\r\n\r\n
SF:{\"error\":\"Ruta\x20no\x20encontrada\"}");
MAC Address: 08:00:27:93:0D:E5 (Oracle VirtualBox virtual NIC)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.42 seconds