nmap使用記錄


掃描目標主機使用的操作系統。

root@bt:~# nmap -sT -O -A 192.168.1.133

Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-08-31 02:28 EDT
Nmap scan report for 192.168.1.133
Host is up (0.090s latency).
Not shown: 986 closed ports
PORT     STATE    SERVICE         VERSION
80/tcp   open     http            Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-methods: No Allow or Public header in OPTIONS response (status code 404)
|_http-title: Not Found
135/tcp  open     msrpc           Microsoft Windows RPC
139/tcp  open     netbios-ssn
445/tcp  open     netbios-ssn
514/tcp  filtered shell
902/tcp  open     ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP)
912/tcp  open     vmware-auth     VMware Authentication Daemon 1.0 (Uses VNC, SOAP)
1025/tcp open     msrpc           Microsoft Windows RPC
1026/tcp open     msrpc           Microsoft Windows RPC
1027/tcp open     msrpc           Microsoft Windows RPC
1029/tcp open     msrpc           Microsoft Windows RPC
1030/tcp open     msrpc           Microsoft Windows RPC
1433/tcp open     ms-sql-s        Microsoft SQL Server 2008 R2 10.50.1600.00; Pre-RTM
2383/tcp open     ms-olap4?
Device type: general purpose
Running: Microsoft Windows 7(這里是目標使用的操作系統)
OS CPE: cpe:/o:microsoft:windows_7:::enterprise
OS details: Microsoft Windows 7 Enterprise(操作系統的版本)
Network Distance: 2 hops
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_nbstat: NetBIOS name: TKE-PC(這里是計算機名稱), NetBIOS user: <unknown>, NetBIOS MAC: 70:71:bc:79:fa:54 (Pegatron)   (網卡mac地址)
| smb-security-mode: 
|   Account that was used for smb scripts: guest
|   User-level authentication
|   SMB Security: Challenge/response passwords supported
|_  Message signing disabled (dangerous, but default)
|_smbv2-enabled: Server supports SMBv2 protocol
| smb-os-discovery: 
|   OS: Windows 7 Ultimate 7600 (Windows 7 Ultimate 6.1)
|   NetBIOS computer name: TKE-PC
|   Workgroup: WORKGROUP
|_  System time: 2012-08-31 02:31:37 UTC+8
| ms-sql-info: 
|   [192.168.1.133:1433]
|     Version: Microsoft SQL Server 2008 R2 Pre-RTM
|       Version number: 10.50.1600.00
|       Product: Microsoft SQL Server 2008 R2
|       Service pack level: Pre-RTM
|_    TCP port: 1433

TRACEROUTE (using proto 1/icmp)
HOP RTT     ADDRESS
1   0.13 ms 192.168.129.2
2   0.75 ms 192.168.1.133

OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 188.80 seconds

 這樣,就探測出了主機系統為win7,同時還可以看出使用的數據庫時SQL server 2008 R2。

不過掃描使用的時間就稍微長了一點,188秒,也就是3分鍾左右。

通過QQ的IP探測,我找了一個IP來進行測試,結果發現是這樣的

root@bt:~# nmap -sT -O -A 223.67.165.180

Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-08-31 02:47 EDT
Nmap scan report for 223.67.165.180
Host is up (0.00051s latency).
All 1000 scanned ports on 223.67.165.180 are filtered
Too many fingerprints match this host to give specific OS details

TRACEROUTE (using proto 1/icmp)
HOP RTT    ADDRESS
1   ... 30

OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 33.84 seconds

原來是對方使用了路由器,掃描變成了對路由器的掃描了。


免責聲明!

本站轉載的文章為個人學習借鑒使用,本站對版權不負任何法律責任。如果侵犯了您的隱私權益,請聯系本站郵箱yoyou2525@163.com刪除。



 
粵ICP備18138465號   © 2018-2025 CODEPRJ.COM