Kamis, 14 Januari 2010

nmap

Nmap merupakan salah satu perangkat lunak paling banyak digunakan untuk melakukan scanning di jaringan. Nmap terkenal sebagai tool yang multiplatform, cepat, dan ringan. Berikut adalah contoh hasil dari nmap .
nmap scan report - scan @ January 14, 2010 - 10:19
• scan summary |
• scan info |
• 10.14.202.2 |
• runstats
scan summary
nmap was initiated at January 14, 2010 - 10:19 with these arguments:
nmap -T4 -A -v -PE -PS22,25,80 -PA21,23,80,3389 10.14.202.2
The process stopped at . Debugging was disabled, the verbosity level was 1.
10.14.202.2(online)
ping results

address
• 10.14.202.2 (ipv4)
ports
The 994 ports scanned but not shown below are in state: closed
Port State Service Reason Product Version Extra info
22 tcp open ssh syn-ack OpenSSH 5.0 protocol 2.0
37 tcp open time syn-ack 32 bits
53 tcp open domain syn-ack dnsmasq 2.41
113 tcp open ident syn-ack
1720 tcp filtered H.323/Q.931 no-response
8080 tcp open http-proxy syn-ack Squid webproxy 3.0.STABLE9
remote operating system guess
• used port 22/tcp (open)
• used port 1/tcp (closed)
• used port 43887/udp (closed)
• os match: Linux 2.6.8 - 2.6.27
• accuracy: 100%
• reference fingerprint line number: 21604
tcpsequence
• index: 204
• difficulty: Good luck!
• values: 3CE7F7C0,3D0DAFA5,3DB7FB5E,3D0910A2,3DD120BB
ipidsequence
• class: All zeros
• values: 0,0,0,0,0
traceroute
• port: 23
• proto:
Hop Rtt IP Host
1 843.00 10.100.0.1
2 859.00 10.0.1.130
3 766.00 10.14.202.2
runstats
• 253 sec. scanned
• 1 host(s) scanned
• 1 host(s) online
• 0 host(s) offline
• nmap version: 5.00
• xml output version: 1.03
• nmap.xsl version: 0.9b

berkut adalah yang di blok

Tidak ada komentar:

Posting Komentar