nmap Weirdness Question

nmap -dd -p 80 10.11.1.8

Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-22 00:59 EDT Fetchfile found /usr/bin/../share/nmap/nmap-services Fetchfile found /usr/bin/../share/nmap/nmap.xsl The max # of sockets we are using is: 0 --------------- Timing report --------------- hostgroups: min 1, max 100000 rtt-timeouts: init 1000, min 100, max 10000 max-scan-delay: TCP 1000, UDP 1000, SCTP 1000 parallelism: min 0, max 0 max-retries: 10, host-timeout: 0

min-rate: 0, max-rate: 0

Fetchfile found /usr/bin/../share/nmap/nmap-payloads Initiating ARP Ping Scan at 00:59 Scanning 10.11.1.8 [1 port] Packet capture filter (device tap0): arp and arp[18:4] = 0x22C9818F and arp[22:2] = 0x84BB ultrascan_host_probe_update called for machine 10.11.1.8 state UNKNOWN -> HOST_UP (trynum 1 time: 167900) Ultrascan DROPPED probe packet to 10.11.1.8 detected Changing ping technique for 10.11.1.8 to ARP Changing global ping host to 10.11.1.8. Completed ARP Ping Scan at 00:59, 0.42s elapsed (1 total hosts) Overall sending rates: 4.73 packets / s, 198.82 bytes / s. mass_rdns: Using DNS server 192.168.136.2 NSOCK INFO [0.4860s] nsock_iod_new2(): nsock_iod_new (IOD #1) NSOCK INFO [0.4860s] nsock_connect_udp(): UDP connection requested to 192.168.136.2:53 (IOD #1) EID 8 NSOCK INFO [0.4860s] nsock_read(): Read request from IOD #1 [192.168.136.2:53] (timeout: -1ms) EID 18 Initiating Parallel DNS resolution of 1 host. at 00:59 NSOCK INFO [0.4860s] nsock_write(): Write request for 40 bytes to IOD #1 EID 27 [192.168.136.2:53] NSOCK INFO [0.4860s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 8 [192.168.136.2:53] NSOCK INFO [0.4860s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 27 [192.168.136.2:53] NSOCK INFO [0.4910s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 18 [192.168.136.2:53] (99 bytes) NSOCK INFO [0.4910s] nsock_read(): Read request from IOD #1 [192.168.136.2:53] (timeout: -1ms) EID 34 NSOCK INFO [4.4860s] nsock_write(): Write request for 40 bytes to IOD #1 EID 43 [192.168.136.2:53] NSOCK INFO [4.4860s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 43 [192.168.136.2:53] NSOCK INFO [4.4910s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 34 [192.168.136.2:53] (99 bytes) NSOCK INFO [4.4910s] nsock_read(): Read request from IOD #1 [192.168.136.2:53] (timeout: -1ms) EID 50 NSOCK INFO [8.4860s] nsock_write(): Write request for 40 bytes to IOD #1 EID 59 [192.168.136.2:53] NSOCK INFO [8.4860s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 59 [192.168.136.2:53] NSOCK INFO [8.4910s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 50 [192.168.136.2:53] (99 bytes) NSOCK INFO [8.4910s] nsock_read(): Read request from IOD #1 [192.168.136.2:53] (timeout: -1ms) EID 66 mass_rdns: 13.00s 0/1 [#: 1, OK: 0, NX: 0, DR: 0, SF: 0, TR: 3] Completed Parallel DNS resolution of 1 host. at 01:00, 13.00s elapsed NSOCK INFO [13.4870s] nsock_iod_delete(): nsock_iod_delete (IOD #1) NSOCK INFO [13.4870s] nevent_delete(): nevent_delete on event #66 (type READ) DNS resolution of 1 IPs took 13.00s. Mode: Async [#: 1, OK: 0, NX: 0, DR: 1, SF: 0, TR: 3, CN: 0] Initiating SYN Stealth Scan at 01:00 10.11.1.8 pingprobe type ARP is inappropriate for this scan type; resetting. Scanning 10.11.1.8 [1 port] Packet capture filter (device tap0): dst host 10.11.0.71 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 10.11.1.8))) Completed SYN Stealth Scan at 01:00, 0.25s elapsed (1 total ports) Overall sending rates: 7.99 packets / s, 351.61 bytes / s. Nmap scan report for 10.11.1.8 Fetchfile found /usr/bin/../share/nmap/nmap-mac-prefixes MAC prefix 0001C8 is duplicated in /usr/bin/../share/nmap/nmap-mac-prefixes; ignoring duplicates. MAC prefix 080030 is duplicated in /usr/bin/../share/nmap/nmap-mac-prefixes; ignoring duplicates. MAC prefix 080030 is duplicated in /usr/bin/../share/nmap/nmap-mac-prefixes; ignoring duplicates. Host is up, received arp-response (0.013s latency). Scanned at 2017-08-22 00:59:50 EDT for 14s

PORT STATE SERVICE REASON 80/tcp filtered http no-response MAC Address: 00:50:56:B8:D0:7F (VMware) Final times for host: srtt: 12550 rttvar: 12550 to: 100000

Read from /usr/bin/../share/nmap: nmap-mac-prefixes nmap-payloads nmap-services. Nmap done: 1 IP address (1 host up) scanned in 13.80 seconds Raw packets sent: 4 (144B) | Rcvd: 1 (28B)

/r/HowToHack Thread Parent