[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Logs de nmap vers la machine chez tes parents


From "Jean-Baka Domelevo-Entfellner" <domelevo at gmail dot com>
Subject Logs de nmap vers la machine chez tes parents
Date Fri, 24 Mar 2006 00:54:47 +0100

Salut !
Voici ce que j'obtiens quand j'essaie à partir de chez moi qui suis
chez Free dégroupé total, à Rennes.
Le premier est un scan des ports choisis par défaut par nmap, et le
second est le log issu du scan des ports 0 à 65536, avec l'option -sS
(Stealth scan, en root).
Je suis sous Debian unstable, et il s'agit de nmap version 4.

Bon courage pour la suite !

JB
Starting Nmap 4.00 ( http://www.insecure.org/nmap/ ) at 2006-03-24 00:22 CET
DNS resolution of 1 IPs took 13.00s. Mode: Async [#: 2, OK: 0, NX: 0, DR: 1, SF: 0, TR: 4, CN: 0]
Initiating SYN Stealth Scan against 81.56.210.7 [1672 ports] at 00:22
Discovered open port 22/tcp on 81.56.210.7
Discovered open port 53/tcp on 81.56.210.7
The SYN Stealth Scan took 22.10s to scan 1672 total ports.
For OSScan assuming port 22 is open, 1 is closed, and neither are firewalled
For OSScan assuming port 22 is open, 1 is closed, and neither are firewalled
For OSScan assuming port 22 is open, 1 is closed, and neither are firewalled
Host 81.56.210.7 appears to be up ... good.
Interesting ports on 81.56.210.7:
(The 1669 ports scanned but not shown below are in state: closed)
PORT     STATE    SERVICE
22/tcp   open     ssh
53/tcp   open     domain
1720/tcp filtered H.323/Q.931
No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).
TCP/IP fingerprint:
SInfo(V=4.00%P=x86_64-unknown-linux-gnu%D=3/24%Tm=44232DCC%O=22%C=1)
TSeq(Class=RI%gcd=1%SI=2545BF%IPID=Z%TS=1000HZ)
TSeq(Class=RI%gcd=1%SI=254014%IPID=Z%TS=1000HZ)
TSeq(Class=RI%gcd=1%SI=251EE0%IPID=Z%TS=1000HZ)
T1(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW)
T2(Resp=N)
T3(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW)
T4(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=)
T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=)
T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=)
T7(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=)
PU(Resp=Y%DF=N%TOS=0%IPLEN=164%RIPTL=148%RID=E%RIPCK=E%UCK=E%ULEN=134%DAT=E)


Uptime 5.332 days (since Sat Mar 18 16:25:22 2006)
TCP Sequence Prediction: Class=random positive increments
                         Difficulty=2432736 (Good luck!)
IPID Sequence Generation: All zeros

Nmap finished: 1 IP address (1 host up) scanned in 50.217 seconds
               Raw packets sent: 1763 (72.2KB) | Rcvd: 1756 (71.7KB)
Starting Nmap 4.00 ( http://www.insecure.org/nmap/ ) at 2006-03-24 00:25 CET
DNS resolution of 1 IPs took 13.00s. Mode: Async [#: 2, OK: 0, NX: 0, DR: 1, SF: 0, TR: 4, CN: 0]
Initiating SYN Stealth Scan against 81.56.210.7 [65536 ports] at 00:25
Discovered open port 53/tcp on 81.56.210.7
Discovered open port 22/tcp on 81.56.210.7
SYN Stealth Scan Timing: About 2.46% done; ETC: 00:45 (0:19:55 remaining)
Increasing send delay for 81.56.210.7 from 0 to 5 due to 329 out of 1095 dropped probes since last increase.
SYN Stealth Scan Timing: About 88.53% done; ETC: 00:48 (0:02:38 remaining)
send_closedudp_probe: One or more of your parameters suck!
send_closedudp_probe: One or more of your parameters suck!
The SYN Stealth Scan took 1349.58s to scan 65536 total ports.
For OSScan assuming port 22 is open, 0 is closed, and neither are firewalled
Host 81.56.210.7 appears to be up ... good.
Interesting ports on 81.56.210.7:
(The 65533 ports scanned but not shown below are in state: closed)
PORT     STATE    SERVICE
22/tcp   open     ssh
53/tcp   open     domain
1720/tcp filtered H.323/Q.931
Device type: general purpose
Running: Linux 2.4.X|2.5.X|2.6.X
OS details: Linux 2.4.7 - 2.6.11, Linux 2.6.0 - 2.6.11
OS Fingerprint:
TSeq(Class=RI%gcd=1%SI=4615BF%IPID=Z%TS=1000HZ)
T1(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW)
T2(Resp=N)
T3(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW)
T4(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=)
T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=)
T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=)
T7(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=)
PU(Resp=N)

Uptime 5.349 days (since Sat Mar 18 16:25:21 2006)
TCP Sequence Prediction: Class=random positive increments
                         Difficulty=4593087 (Good luck!)
IPID Sequence Generation: All zeros

Nmap finished: 1 IP address (1 host up) scanned in 1365.549 seconds
               Raw packets sent: 70189 (2.81MB) | Rcvd: 67877 (2.72MB)