CURRENT TARGET
DOMAIN NAME
Loading...
SYSTEM STATUS
ACTIVE PROCESSES
QUICK ACTIONS
TERMINAL OUTPUT
root@cybersec:~# nmap -sS -A -T4 target.com
Starting Nmap 7.92 ( https://nmap.org ) at 2023-07-15 14:30 UTC
Nmap scan report for target.com (192.168.1.1)
Host is up (0.045s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
443/tcp open ssl/http Apache httpd 2.4.41 ((Ubuntu))
3306/tcp open mysql MySQL 5.7.35-0ubuntu0.20.04.1
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.45 seconds
root@cybersec:~#
RECENT ACTIVITY
SQL injection attempt successful
2 minutes ago
Admin credentials captured
15 minutes ago
Firewall bypass in progress
32 minutes ago
Intrusion detection triggered
1 hour ago