View Issue Details

IDProjectCategoryView StatusLast Update
0005744Kali Linux[All Projects] Kali Package Bugpublic2020-12-01 10:42
Reporterirongeeks Assigned To 
PriorityhighSeveritycrashReproducibilityalways
Status closedResolutionopen 
Product Version2019.3 
Target VersionFixed in Version 
Summary0005744: Nmap broken
DescriptionHello, after a clean install of Kali Linux 2019.3 version as of this day: 10.17.2019. It appears that nmap is not working/broken repositories.
Steps To ReproduceI performed updates, upgrade, and full-upgrade, then autoremove, to no avail. I also tried reinstalling nmap, nothing happened. I attached screnshot for your convenience. I researched on Github, looks like others having same problem.

Source: https://github.com/nmap/nmap/issues/1734

Activities

irongeeks

2019-10-17 20:25

reporter  

kali.PNG (16,853 bytes)
kali.PNG (16,853 bytes)

g0tmi1k

2019-10-18 10:19

administrator   ~0011200

```

root@kali:~# dpkg -l | grep nmap
ii nmap 7.80+dfsg1-1kali1 amd64 The Network Mapper
ii nmap-common 7.80+dfsg1-1kali1 all Architecture independent files for nmap
root@kali:~#
root@kali:~# nmap -V -sV -sC -oN output scanme.nmap.org
Nmap version 7.80 ( https://nmap.org )
Platform: x86_64-pc-linux-gnu
Compiled with: liblua-5.3.3 openssl-1.1.1c libssh2-1.8.0 libz-1.2.11 libpcre-8.39 nmap-libpcap-1.7.3 nmap-libdnet-1.12 ipv6
Compiled without:
Available nsock engines: epoll poll select
root@kali:~#
root@kali:~# nmap -v -sV -sC -oN output scanme.nmap.org
Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-18 10:20 BST
NSE: Loaded 151 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 10:20
Completed NSE at 10:20, 0.00s elapsed
Initiating NSE at 10:20
Completed NSE at 10:20, 0.00s elapsed
Initiating NSE at 10:20
Completed NSE at 10:20, 0.00s elapsed
Initiating Ping Scan at 10:20
Scanning scanme.nmap.org (45.33.32.156) [4 ports]
Completed Ping Scan at 10:20, 0.03s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 10:20
Completed Parallel DNS resolution of 1 host. at 10:20, 0.14s elapsed
Initiating SYN Stealth Scan at 10:20
Scanning scanme.nmap.org (45.33.32.156) [1000 ports]
Discovered open port 80/tcp on 45.33.32.156
Discovered open port 22/tcp on 45.33.32.156
Discovered open port 31337/tcp on 45.33.32.156
Discovered open port 9929/tcp on 45.33.32.156
Completed SYN Stealth Scan at 10:20, 2.07s elapsed (1000 total ports)
Initiating Service scan at 10:20
Scanning 4 services on scanme.nmap.org (45.33.32.156)
Completed Service scan at 10:20, 6.30s elapsed (4 services on 1 host)
NSE: Script scanning 45.33.32.156.
Initiating NSE at 10:20
Completed NSE at 10:20, 5.37s elapsed
Initiating NSE at 10:20
Completed NSE at 10:20, 0.62s elapsed
Initiating NSE at 10:20
Completed NSE at 10:20, 0.00s elapsed
Nmap scan report for scanme.nmap.org (45.33.32.156)
Host is up (0.16s latency).
Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f
Not shown: 996 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.13 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 1024 ac:00:a0:1a:82:ff:cc:55:99:dc:67:2b:34:97:6b:75 (DSA)
| 2048 20:3d:2d:44:62:2a:b0:5a:9d:b5:b3:05:14:c2:a6:b2 (RSA)
| 256 96:02:bb:5e:57:54:1c:4e:45:2f:56:4c:4a:24:b2:57 (ECDSA)
|_ 256 33:fa:91:0f:e0:e1:7b:1f:6d:05:a2:b0:f1:54:41:56 (ED25519)
80/tcp open http Apache httpd 2.4.7 ((Ubuntu))
|_http-favicon: Unknown favicon MD5: 156515DA3C0F7DC6B2493BD5CE43F795
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: Apache/2.4.7 (Ubuntu)
|_http-title: Go ahead and ScanMe!
9929/tcp open nping-echo Nping echo
31337/tcp open tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

NSE: Script Post-scanning.
Initiating NSE at 10:20
Completed NSE at 10:20, 0.00s elapsed
Initiating NSE at 10:20
Completed NSE at 10:20, 0.00s elapsed
Initiating NSE at 10:20
Completed NSE at 10:20, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 15.15 seconds
           Raw packets sent: 1135 (49.916KB) | Rcvd: 1091 (43.664KB)
root@kali:~#

```

g0tmi1k

2019-10-18 10:54

administrator   ~0011201

```
root@kali:~# nmap -sV -sC -oN output 38.100.193.66-90
Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-18 11:25 BST
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
Stats: 0:15:21 elapsed; 0 hosts completed (25 up), 25 undergoing SYN Stealth Scan
SYN Stealth Scan Timing: About 98.36% done; ETC: 11:41 (0:00:15 remaining)
Stats: 0:26:30 elapsed; 0 hosts completed (25 up), 25 undergoing Script Scan
NSE Timing: About 98.75% done; ETC: 11:52 (0:00:03 remaining)
Nmap scan report for 38.100.193.66
Host is up (3.1s latency).
Not shown: 999 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
| ssh-hostkey:
| 1024 84:b9:9f:90:27:6a:f7:fa:8f:e1:90:73:36:26:1a:96 (DSA)
|_ 2048 38:1e:e7:95:b9:ab:4f:fa:b2:64:8c:9f:09:da:ba:74 (RSA)

Nmap scan report for 38.100.193.67
Host is up (0.28s latency).
Not shown: 996 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.0p1 Debian 3ubuntu1.2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 1024 29:91:b5:6f:19:5c:2e:cf:e7:4c:b4:60:22:71:b6:f0 (DSA)
| 2048 b7:a6:72:41:d9:ee:e9:25:ac:ad:19:47:8f:56:a8:d5 (RSA)
|_ 256 80:5a:8e:eb:fc:af:c3:c4:3f:61:9b:97:aa:2f:8e:47 (ECDSA)
25/tcp open smtp Postfix smtpd
|_smtp-commands: test.megacorpone.com, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
|_ssl-date: 2019-10-18T10:48:14+00:00; 0s from scanner time.
443/tcp open ssl/https?
|_ssl-date: 2019-10-18T10:48:14+00:00; 0s from scanner time.
8080/tcp open http Apache Tomcat/Coyote JSP engine 1.1
|_http-server-header: Apache-Coyote/1.1
|_http-title: Apache Tomcat
Service Info: Host: test.megacorpone.com; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Nmap scan report for 38.100.193.68
Host is up (0.082s latency).
Not shown: 992 filtered ports
PORT STATE SERVICE VERSION
340/tcp closed unknown
911/tcp closed xact-backup
1782/tcp closed hp-hcip
2007/tcp closed dectalk
2702/tcp closed sms-xfer
3690/tcp closed svn
9081/tcp closed cisco-aqos
9917/tcp closed unknown

Nmap scan report for 38.100.193.69
Host is up (0.074s latency).
All 1000 scanned ports on 38.100.193.69 are filtered (963) or closed (37)

Nmap scan report for 38.100.193.70
Host is up (4.1s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
| ssh-hostkey:
| 1024 84:b9:9f:90:27:6a:f7:fa:8f:e1:90:73:36:26:1a:96 (DSA)
|_ 2048 38:1e:e7:95:b9:ab:4f:fa:b2:64:8c:9f:09:da:ba:74 (RSA)
53/tcp open domain ISC BIND 9.8.2rc1 (RedHat Enterprise Linux 6)
| dns-nsid:
|_ bind.version: 9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.4
Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:6

Nmap scan report for 38.100.193.71
Host is up (0.072s latency).
Not shown: 988 filtered ports
PORT STATE SERVICE VERSION
88/tcp closed kerberos-sec
340/tcp closed unknown
911/tcp closed xact-backup
1104/tcp closed xrl
1782/tcp closed hp-hcip
2007/tcp closed dectalk
2702/tcp closed sms-xfer
3690/tcp closed svn
6100/tcp closed synchronet-db
9081/tcp closed cisco-aqos
9917/tcp closed unknown
10566/tcp closed unknown

Nmap scan report for 38.100.193.72
Host is up (0.089s latency).
Not shown: 984 filtered ports
PORT STATE SERVICE VERSION
88/tcp closed kerberos-sec
340/tcp closed unknown
911/tcp closed xact-backup
1104/tcp closed xrl
1583/tcp closed simbaexpress
1782/tcp closed hp-hcip
2007/tcp closed dectalk
2702/tcp closed sms-xfer
3690/tcp closed svn
6100/tcp closed synchronet-db
8086/tcp closed d-s-n
9081/tcp closed cisco-aqos
9917/tcp closed unknown
10566/tcp closed unknown
30000/tcp closed ndmps
63331/tcp closed unknown

Nmap scan report for 38.100.193.73
Host is up (0.28s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.0p1 Debian 3ubuntu1.2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 1024 29:91:b5:6f:19:5c:2e:cf:e7:4c:b4:60:22:71:b6:f0 (DSA)
| 2048 b7:a6:72:41:d9:ee:e9:25:ac:ad:19:47:8f:56:a8:d5 (RSA)
|_ 256 80:5a:8e:eb:fc:af:c3:c4:3f:61:9b:97:aa:2f:8e:47 (ECDSA)
25/tcp open smtp SLmail smtpd 5.5.0.4433
|_smtp-commands: mail.megacorpone.com, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
|_ssl-date: 2019-10-18T10:48:14+00:00; 0s from scanner time.
Service Info: Host: mail.megacorpone.com; OSs: Linux, Windows; CPE: cpe:/o:linux:linux_kernel, cpe:/o:microsoft:windows

Nmap scan report for 38.100.193.74
Host is up (0.10s latency).
Not shown: 988 filtered ports
PORT STATE SERVICE VERSION
88/tcp closed kerberos-sec
340/tcp closed unknown
911/tcp closed xact-backup
1104/tcp closed xrl
1782/tcp closed hp-hcip
2007/tcp closed dectalk
2702/tcp closed sms-xfer
3690/tcp closed svn
6100/tcp closed synchronet-db
9081/tcp closed cisco-aqos
9917/tcp closed unknown
10566/tcp closed unknown

Nmap scan report for 38.100.193.75
Host is up (0.10s latency).
All 1000 scanned ports on 38.100.193.75 are filtered (973) or closed (27)

Nmap scan report for 38.100.193.76
Host is up (0.33s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.0p1 Debian 3ubuntu1.2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 1024 29:91:b5:6f:19:5c:2e:cf:e7:4c:b4:60:22:71:b6:f0 (DSA)
| 2048 b7:a6:72:41:d9:ee:e9:25:ac:ad:19:47:8f:56:a8:d5 (RSA)
|_ 256 80:5a:8e:eb:fc:af:c3:c4:3f:61:9b:97:aa:2f:8e:47 (ECDSA)
80/tcp open http Apache httpd 2.2.22 ((Ubuntu))
|_http-server-header: Apache/2.2.22 (Ubuntu)
|_http-title: MegaCorp One - Nanotechnology Is the Future
443/tcp open ssl/https?
|_ssl-date: TLS randomness does not represent time
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Nmap scan report for 38.100.193.77
Host is up (0.28s latency).
Not shown: 996 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.0p1 Debian 3ubuntu1.2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 1024 29:91:b5:6f:19:5c:2e:cf:e7:4c:b4:60:22:71:b6:f0 (DSA)
| 2048 b7:a6:72:41:d9:ee:e9:25:ac:ad:19:47:8f:56:a8:d5 (RSA)
|_ 256 80:5a:8e:eb:fc:af:c3:c4:3f:61:9b:97:aa:2f:8e:47 (ECDSA)
25/tcp open smtp Postfix smtpd
|_smtp-commands: vpn.megacorpone.com, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
|_ssl-date: 2019-10-18T10:48:14+00:00; 0s from scanner time.
80/tcp open http Apache httpd
|_http-server-header: Apache
|_http-title: Did not follow redirect to http://vpn.megacorpone.com/admin/
443/tcp open ssl/https?
|_ssl-date: 2019-10-18T10:48:13+00:00; 0s from scanner time.
Service Info: Host: vpn.megacorpone.com; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Nmap scan report for 38.100.193.78
Host is up (0.10s latency).
Not shown: 982 filtered ports
PORT STATE SERVICE VERSION
88/tcp closed kerberos-sec
340/tcp closed unknown
911/tcp closed xact-backup
1104/tcp closed xrl
1192/tcp closed caids-sensor
1583/tcp closed simbaexpress
1666/tcp closed netview-aix-6
1782/tcp closed hp-hcip
2007/tcp closed dectalk
2702/tcp closed sms-xfer
3690/tcp closed svn
6100/tcp closed synchronet-db
8086/tcp closed d-s-n
9081/tcp closed cisco-aqos
9917/tcp closed unknown
10566/tcp closed unknown
30000/tcp closed ndmps
63331/tcp closed unknown

Nmap scan report for 38.100.193.79
Host is up (0.29s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.0p1 Debian 3ubuntu1.2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 1024 29:91:b5:6f:19:5c:2e:cf:e7:4c:b4:60:22:71:b6:f0 (DSA)
| 2048 b7:a6:72:41:d9:ee:e9:25:ac:ad:19:47:8f:56:a8:d5 (RSA)
|_ 256 80:5a:8e:eb:fc:af:c3:c4:3f:61:9b:97:aa:2f:8e:47 (ECDSA)
80/tcp open http Apache httpd 2.2.22
| http-ls: Volume /
| SIZE TIME FILENAME
| 5.2M 13-Apr-2013 08:40 latest.zip
| - 08-Jan-2012 12:01 wordpress/
|_
|_http-server-header: Apache/2.2.22 (Ubuntu)
|_http-title: Index of /
Service Info: Host: www2.megacorpone.com; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Nmap scan report for ns2.megacorpone.com (38.100.193.80)
Host is up (0.32s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.0p1 Debian 3ubuntu1 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 1024 29:91:b5:6f:19:5c:2e:cf:e7:4c:b4:60:22:71:b6:f0 (DSA)
| 2048 b7:a6:72:41:d9:ee:e9:25:ac:ad:19:47:8f:56:a8:d5 (RSA)
|_ 256 80:5a:8e:eb:fc:af:c3:c4:3f:61:9b:97:aa:2f:8e:47 (ECDSA)
53/tcp open domain ISC BIND 9.8.1-P1
| dns-nsid:
|_ bind.version: 9.8.1-P1
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Nmap scan report for 38.100.193.81
Host is up (0.063s latency).
All 1000 scanned ports on 38.100.193.81 are filtered (953) or closed (47)

Nmap scan report for 38.100.193.82
Host is up (0.086s latency).
Not shown: 992 filtered ports
PORT STATE SERVICE VERSION
340/tcp closed unknown
911/tcp closed xact-backup
1782/tcp closed hp-hcip
2007/tcp closed dectalk
2702/tcp closed sms-xfer
3690/tcp closed svn
9081/tcp closed cisco-aqos
9917/tcp closed unknown

Nmap scan report for 38.100.193.83
Host is up (0.089s latency).
Not shown: 986 filtered ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 5.8p1 Debian 7ubuntu1 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 1024 3f:60:ca:c4:8e:59:42:c7:e1:bc:a5:5a:62:7c:1b:61 (DSA)
| 2048 23:70:1b:d5:0e:2e:67:d2:93:88:0e:19:8a:6d:50:ec (RSA)
|_ 256 5a:8a:3f:2a:67:80:50:36:d5:cf:05:2c:fb:55:a9:37 (ECDSA)
81/tcp open http Apache httpd 2.2.20 ((Ubuntu))
|_http-server-header: Apache/2.2.20 (Ubuntu)
|_http-title: Site doesn't have a title (text/html).
88/tcp closed kerberos-sec
340/tcp closed unknown
911/tcp closed xact-backup
1104/tcp closed xrl
1782/tcp closed hp-hcip
2007/tcp closed dectalk
2702/tcp closed sms-xfer
3690/tcp closed svn
6100/tcp closed synchronet-db
9081/tcp closed cisco-aqos
9917/tcp closed unknown
10566/tcp closed unknown
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Nmap scan report for 38.100.193.84
Host is up (0.28s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.0p1 Debian 3ubuntu1.2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 1024 29:91:b5:6f:19:5c:2e:cf:e7:4c:b4:60:22:71:b6:f0 (DSA)
| 2048 b7:a6:72:41:d9:ee:e9:25:ac:ad:19:47:8f:56:a8:d5 (RSA)
|_ 256 80:5a:8e:eb:fc:af:c3:c4:3f:61:9b:97:aa:2f:8e:47 (ECDSA)
80/tcp open http Microsoft IIS httpd 7.5
|_http-server-header: Microsoft-IIS/7.5
|_http-title: Did not follow redirect to http://mail.megacorpone.com/owa/auth/logon.aspx
Service Info: OSs: Linux, Windows; CPE: cpe:/o:linux:linux_kernel, cpe:/o:microsoft:windows

Nmap scan report for 38.100.193.85
Host is up (0.10s latency).
Not shown: 990 filtered ports
PORT STATE SERVICE VERSION
340/tcp closed unknown
911/tcp closed xact-backup
1104/tcp closed xrl
1782/tcp closed hp-hcip
2007/tcp closed dectalk
2702/tcp closed sms-xfer
3690/tcp closed svn
6100/tcp closed synchronet-db
9081/tcp closed cisco-aqos
9917/tcp closed unknown

Nmap scan report for 38.100.193.86
Host is up (0.094s latency).
Not shown: 988 filtered ports
PORT STATE SERVICE VERSION
88/tcp closed kerberos-sec
340/tcp closed unknown
911/tcp closed xact-backup
1104/tcp closed xrl
1782/tcp closed hp-hcip
2007/tcp closed dectalk
2702/tcp closed sms-xfer
3690/tcp closed svn
6100/tcp closed synchronet-db
9081/tcp closed cisco-aqos
9917/tcp closed unknown
10566/tcp closed unknown

Nmap scan report for 38.100.193.87
Host is up (0.089s latency).
Not shown: 987 filtered ports
PORT STATE SERVICE VERSION
88/tcp closed kerberos-sec
340/tcp closed unknown
911/tcp closed xact-backup
1104/tcp closed xrl
1782/tcp closed hp-hcip
2007/tcp closed dectalk
2702/tcp closed sms-xfer
3690/tcp closed svn
6100/tcp closed synchronet-db
9081/tcp closed cisco-aqos
9917/tcp closed unknown
10566/tcp closed unknown
63331/tcp closed unknown

Nmap scan report for 38.100.193.88
Host is up (0.088s latency).
Not shown: 985 filtered ports
PORT STATE SERVICE VERSION
88/tcp closed kerberos-sec
340/tcp closed unknown
911/tcp closed xact-backup
1104/tcp closed xrl
1583/tcp closed simbaexpress
1782/tcp closed hp-hcip
2007/tcp closed dectalk
2702/tcp closed sms-xfer
3690/tcp closed svn
6100/tcp closed synchronet-db
8086/tcp closed d-s-n
9081/tcp closed cisco-aqos
9917/tcp closed unknown
10566/tcp closed unknown
63331/tcp closed unknown

Nmap scan report for 38.100.193.89
Host is up (0.31s latency).
Not shown: 996 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.0p1 Debian 3ubuntu1.2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 1024 29:91:b5:6f:19:5c:2e:cf:e7:4c:b4:60:22:71:b6:f0 (DSA)
| 2048 b7:a6:72:41:d9:ee:e9:25:ac:ad:19:47:8f:56:a8:d5 (RSA)
|_ 256 80:5a:8e:eb:fc:af:c3:c4:3f:61:9b:97:aa:2f:8e:47 (ECDSA)
25/tcp open smtp Postfix smtpd
|_smtp-commands: siem.megacorpone.com, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
|_ssl-date: 2019-10-18T10:48:13+00:00; 0s from scanner time.
80/tcp open http Apache httpd
|_http-server-header: Apache
|_http-title: Did not follow redirect to http://siem.megacorpone.com/ossim/session/login.php
443/tcp open ssl/https?
|_ssl-date: 2019-10-18T10:48:12+00:00; 0s from scanner time.
Service Info: Host: siem.megacorpone.com; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Nmap scan report for 38.100.193.90
Host is up (0.34s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.0p1 Debian 3ubuntu1 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 1024 29:91:b5:6f:19:5c:2e:cf:e7:4c:b4:60:22:71:b6:f0 (DSA)
| 2048 b7:a6:72:41:d9:ee:e9:25:ac:ad:19:47:8f:56:a8:d5 (RSA)
|_ 256 80:5a:8e:eb:fc:af:c3:c4:3f:61:9b:97:aa:2f:8e:47 (ECDSA)
53/tcp open domain ISC BIND 9.8.1-P1
| dns-nsid:
|_ bind.version: 9.8.1-P1
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Post-scan script results:
| clock-skew:
| 0s:
| 38.100.193.67
| 38.100.193.77
| 38.100.193.89
|_ 38.100.193.73
| ssh-hostkey: Possible duplicate hosts
| Key 2048 38:1e:e7:95:b9:ab:4f:fa:b2:64:8c:9f:09:da:ba:74 (RSA) used by:
| 38.100.193.66
| 38.100.193.70
| Key 2048 b7:a6:72:41:d9:ee:e9:25:ac:ad:19:47:8f:56:a8:d5 (RSA) used by:
| 38.100.193.67
| 38.100.193.73
| 38.100.193.76
| 38.100.193.77
| 38.100.193.79
| 38.100.193.80
| 38.100.193.84
| 38.100.193.89
| 38.100.193.90
| Key 256 80:5a:8e:eb:fc:af:c3:c4:3f:61:9b:97:aa:2f:8e:47 (ECDSA) used by:
| 38.100.193.67
| 38.100.193.73
| 38.100.193.76
| 38.100.193.77
| 38.100.193.79
| 38.100.193.80
| 38.100.193.84
| 38.100.193.89
| 38.100.193.90
| Key 1024 84:b9:9f:90:27:6a:f7:fa:8f:e1:90:73:36:26:1a:96 (DSA) used by:
| 38.100.193.66
| 38.100.193.70
| Key 1024 29:91:b5:6f:19:5c:2e:cf:e7:4c:b4:60:22:71:b6:f0 (DSA) used by:
| 38.100.193.67
| 38.100.193.73
| 38.100.193.76
| 38.100.193.77
| 38.100.193.79
| 38.100.193.80
| 38.100.193.84
| 38.100.193.89
|_ 38.100.193.90
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 25 IP addresses (25 hosts up) scanned in 1633.91 seconds
root@kali:~#
```

g0tmi1k

2019-10-18 10:55

administrator   ~0011202

I also did my local LAN

```
root@kali:~# nmap -sV -sC -oN output 192.168.1.0/24
```

No issues

irongeeks

2019-10-18 12:09

reporter   ~0011203

I figured it out what was the problem.. it looks like my combination syntax -V is the one that doesn't work, but when I change it to lower case -v for verbosity, but -V is for versioning which is, I believe is equally the same as -sV.

sbrun

2019-10-18 12:37

manager   ~0011204

FTR: a similar bug report has been done in Debian:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935098

irongeeks

2019-10-18 12:42

reporter   ~0011205

@sbrun, that's what I figured.. there had to be something buggy going on. Thanks for the heads up.

irongeeks

2019-10-18 14:20

reporter   ~0011206

Now, I got the "Segmentation fault" message after doing nmap again... this release seem to be buggy for sure.

g0tmi1k

2020-12-01 10:42

administrator   ~0013909

This report has been filed against an old version of Kali. We will be closing this ticket due to inactivity.
Please could you see if you are able to replicate this issue with the latest version of Kali Linux (https://www.kali.org/downloads/)?
If you are still facing the same problem, feel free to re-open the ticket. If you choose to do this, could you provide more information to the issue you are facing, and also give information about your setup?
For more information, please read: https://kali.training/topic/filing-a-good-bug-report/

Issue History

Date Modified Username Field Change
2019-10-17 20:25 irongeeks New Issue
2019-10-17 20:25 irongeeks File Added: kali.PNG
2019-10-18 09:21 g0tmi1k View Status private => public
2019-10-18 10:19 g0tmi1k Note Added: 0011200
2019-10-18 10:54 g0tmi1k Note Added: 0011201
2019-10-18 10:55 g0tmi1k Note Added: 0011202
2019-10-18 12:09 irongeeks Note Added: 0011203
2019-10-18 12:37 sbrun Note Added: 0011204
2019-10-18 12:42 irongeeks Note Added: 0011205
2019-10-18 14:20 irongeeks Note Added: 0011206
2020-12-01 10:42 g0tmi1k Note Added: 0013909
2020-12-01 10:42 g0tmi1k Status new => closed