nmap

Ejemplo.

-A: verbose
-O: Operating system detection

-sV: Version de los servicios

roby@roby-desktop:~$ sudo nmap -O -A -sV 192.168.0.24

Starting Nmap 5.00 ( http://nmap.org ) at 2010-02-24 12:13 ART
NSE: Loaded 0 scripts for scanning.
Initiating ARP Ping Scan at 12:13
Scanning 192.168.0.24 [1 port]
Completed ARP Ping Scan at 12:13, 0.00s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 12:13
Completed Parallel DNS resolution of 1 host. at 12:13, 0.00s elapsed
Initiating SYN Stealth Scan at 12:13
Scanning 192.168.0.24 [1000 ports]
Discovered open port 445/tcp on 192.168.0.24
Discovered open port 81/tcp on 192.168.0.24
Completed SYN Stealth Scan at 12:13, 0.09s elapsed (1000 total ports)
Initiating OS detection (try #1) against 192.168.0.24
Host 192.168.0.24 is up (0.00052s latency).
Interesting ports on 192.168.0.24:
Not shown: 998 closed ports
PORT    STATE SERVICE
81/tcp  open  hosts2-ns
445/tcp open  microsoft-ds
MAC Address: 00:50:DA:2C:AF:9F (3com)
Device type: firewall
Running: IPCop Linux 2.4.X
OS details: IPCop firewall 1.4.10 – 1.4.18 (Linux 2.4.31 – 2.4.34)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=192 (Good luck!)
IP ID Sequence Generation: All zeros

Read data files from: /usr/share/nmap
OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 1.86 seconds
Raw packets sent: 1032 (46.360KB) | Rcvd: 1012 (41.080KB)



Responder

Introduce tus datos o haz clic en un icono para iniciar sesión:

Logo de WordPress.com

Estás comentando usando tu cuenta de WordPress.com. Cerrar sesión / Cambiar )

Imagen de Twitter

Estás comentando usando tu cuenta de Twitter. Cerrar sesión / Cambiar )

Foto de Facebook

Estás comentando usando tu cuenta de Facebook. Cerrar sesión / Cambiar )

Google+ photo

Estás comentando usando tu cuenta de Google+. Cerrar sesión / Cambiar )

Conectando a %s

A %d blogueros les gusta esto: