adityakhare863
New Member
- Joined
- Mar 20, 2023
- Messages
- 5
- Thread Author
-
- #1
I use Zenmap on Windows 11 to detect open ports on Metasploitable2. The problem is that zenmap is not able to detect active hosts ( it does detect that there is a host, but it seems to be down to Zenmap). But, when run the Zenmap scan on the same target from Linux 6.0.0-kali3-amd64 then I am able to successfully run a scan and see the active ports.
Here is my command on Zenmap with profile set to Intense scan:
nmap -T4 -A -v 172.16.xxx.xx
Here is my command on Zenmap with profile set to Intense scan:
nmap -T4 -A -v 172.16.xxx.xx
The output of the Zenmap scan is as follows:
Starting Nmap 7.93 ( Nmap: the Network Mapper - Free Security Scanner ) at 2023-03-20 18:14 India Standard Time
NSOCK ERROR [0.2450s] ssl_init_helper(): OpenSSL legacy provider failed to load.
NSE: Loaded 155 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 18:14
Completed NSE at 18:14, 0.00s elapsed
Initiating NSE at 18:14
Completed NSE at 18:14, 0.00s elapsed
Initiating NSE at 18:14
Completed NSE at 18:14, 0.00s elapsed
Initiating ARP Ping Scan at 18:14
Scanning 172.16.xxx.xx [1 port]
Completed ARP Ping Scan at 18:14, 1.44s elapsed (1 total hosts)
Nmap scan report for 172.16.xxx.xx [host down]
NSE: Script Post-scanning.
Initiating NSE at 18:14
Completed NSE at 18:14, 0.00s elapsed
Initiating NSE at 18:14
Completed NSE at 18:14, 0.00s elapsed
Initiating NSE at 18:14
Completed NSE at 18:14, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 2.15 seconds
Raw packets sent: 2 (56B) | Rcvd: 0 (0B)
Solution
You can test with nmap scanme.nmap.org If it isn't returning anything open you may also have something locally blocking the scan or a security device (firewall etc) blocking on your network side
adityakhare863
New Member
- Joined
- Mar 20, 2023
- Messages
- 5
- Thread Author
-
- #3
As suggested, I ran a nmap scan on the target with -Pn, but it didn't work. Here I have attached the result of the scan.
Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times may be slower.
Starting Nmap 7.93 ( Nmap: the Network Mapper - Free Security Scanner ) at 2023-03-22 00:56 India Standard Time
NSOCK ERROR [0.2560s] ssl_init_helper(): OpenSSL legacy provider failed to load.
NSE: Loaded 155 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 00:56
Completed NSE at 00:56, 0.00s elapsed
Initiating NSE at 00:56
Completed NSE at 00:56, 0.00s elapsed
Initiating NSE at 00:56
Completed NSE at 00:56, 0.00s elapsed
Initiating ARP Ping Scan at 00:56
Scanning 172.16.161.93 [1 port]
Completed ARP Ping Scan at 00:56, 1.44s elapsed (1 total hosts)
Nmap scan report for 172.16.161.93 [host down]
NSE: Script Post-scanning.
Initiating NSE at 00:56
Completed NSE at 00:56, 0.00s elapsed
Initiating NSE at 00:56
Completed NSE at 00:56, 0.00s elapsed
Initiating NSE at 00:56
Completed NSE at 00:56, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
Nmap done: 1 IP address (0 hosts up) scanned in 3.68 seconds
Raw packets sent: 2 (56B) | Rcvd: 2 (56B)
Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times may be slower.
Starting Nmap 7.93 ( Nmap: the Network Mapper - Free Security Scanner ) at 2023-03-22 00:56 India Standard Time
NSOCK ERROR [0.2560s] ssl_init_helper(): OpenSSL legacy provider failed to load.
NSE: Loaded 155 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 00:56
Completed NSE at 00:56, 0.00s elapsed
Initiating NSE at 00:56
Completed NSE at 00:56, 0.00s elapsed
Initiating NSE at 00:56
Completed NSE at 00:56, 0.00s elapsed
Initiating ARP Ping Scan at 00:56
Scanning 172.16.161.93 [1 port]
Completed ARP Ping Scan at 00:56, 1.44s elapsed (1 total hosts)
Nmap scan report for 172.16.161.93 [host down]
NSE: Script Post-scanning.
Initiating NSE at 00:56
Completed NSE at 00:56, 0.00s elapsed
Initiating NSE at 00:56
Completed NSE at 00:56, 0.00s elapsed
Initiating NSE at 00:56
Completed NSE at 00:56, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
Nmap done: 1 IP address (0 hosts up) scanned in 3.68 seconds
Raw packets sent: 2 (56B) | Rcvd: 2 (56B)
adityakhare863
New Member
- Joined
- Mar 20, 2023
- Messages
- 5
- Thread Author
-
- #5
Thanks! But I installed 7.9.2 and it still doesn't find any active hosts. I can reference the output if you need it.
- Joined
- Jul 4, 2015
- Messages
- 8,998
You can test with nmap scanme.nmap.org If it isn't returning anything open you may also have something locally blocking the scan or a security device (firewall etc) blocking on your network side
adityakhare863
New Member
- Joined
- Mar 20, 2023
- Messages
- 5
- Thread Author
-
- #8
My target is metasploitable 2 which is hosted on Oracle VirtualBox, for which I don't think I have enabled any firewall.
adityakhare863
New Member
- Joined
- Mar 20, 2023
- Messages
- 5
- Thread Author
-
- #9
I tried nmap on the site you mentioned and it worked. Also, when I nmap my target machine (metasploitable 2) using Kali Linux it works. My Kali is also hosted on the same VirtualBox.
prateeek11
New Member
- Joined
- Apr 24, 2024
- Messages
- 2
same problem , please explain how u did it aditya
prateeek11
New Member
- Joined
- Apr 24, 2024
- Messages
- 2
help me also, I have same problem but I am unable to do it with website also give me a detailed solution pleaseeeYou can test with nmap scanme.nmap.org If it isn't returning anything open you may also have something locally blocking the scan or a security device (firewall etc) blocking on your network side
Similar threads
- Replies
- 2
- Views
- 2K
- Solved
- Replies
- 1
- Views
- 718
- Replies
- 5
- Views
- 7K
- Replies
- 60
- Views
- 76K
- Replies
- 27
- Views
- 119K