Nmap scan using default script scan and version detection fail [duplicate]
I am running the following scan using -sC -sV on a target:
sudo nmap -sC -sV XX.XX.XX.XX
PORT STATE SERVICE VERSION
53/tcp open tcpwrapped
80/tcp open tcpwrapped
443/tcp open tcpwrapped
I understand this could be a firewall or … Continue reading Nmap scan using default script scan and version detection fail [duplicate]