掃描目標主機使用的操作系統。
root@bt:~# nmap -sT -O -A 192.168.1.133 Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-08-31 02:28 EDT Nmap scan report for 192.168.1.133 Host is up (0.090s latency). Not shown: 986 closed ports PORT STATE SERVICE VERSION 80/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-methods: No Allow or Public header in OPTIONS response (status code 404) |_http-title: Not Found 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn 445/tcp open netbios-ssn 514/tcp filtered shell 902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP) 912/tcp open vmware-auth VMware Authentication Daemon 1.0 (Uses VNC, SOAP) 1025/tcp open msrpc Microsoft Windows RPC 1026/tcp open msrpc Microsoft Windows RPC 1027/tcp open msrpc Microsoft Windows RPC 1029/tcp open msrpc Microsoft Windows RPC 1030/tcp open msrpc Microsoft Windows RPC 1433/tcp open ms-sql-s Microsoft SQL Server 2008 R2 10.50.1600.00; Pre-RTM 2383/tcp open ms-olap4? Device type: general purpose Running: Microsoft Windows 7(這里是目標使用的操作系統) OS CPE: cpe:/o:microsoft:windows_7:::enterprise OS details: Microsoft Windows 7 Enterprise(操作系統的版本) Network Distance: 2 hops Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows Host script results: |_nbstat: NetBIOS name: TKE-PC(這里是計算機名稱), NetBIOS user: <unknown>, NetBIOS MAC: 70:71:bc:79:fa:54 (Pegatron) (網卡mac地址) | smb-security-mode: | Account that was used for smb scripts: guest | User-level authentication | SMB Security: Challenge/response passwords supported |_ Message signing disabled (dangerous, but default) |_smbv2-enabled: Server supports SMBv2 protocol | smb-os-discovery: | OS: Windows 7 Ultimate 7600 (Windows 7 Ultimate 6.1) | NetBIOS computer name: TKE-PC | Workgroup: WORKGROUP |_ System time: 2012-08-31 02:31:37 UTC+8 | ms-sql-info: | [192.168.1.133:1433] | Version: Microsoft SQL Server 2008 R2 Pre-RTM | Version number: 10.50.1600.00 | Product: Microsoft SQL Server 2008 R2 | Service pack level: Pre-RTM |_ TCP port: 1433 TRACEROUTE (using proto 1/icmp) HOP RTT ADDRESS 1 0.13 ms 192.168.129.2 2 0.75 ms 192.168.1.133 OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 188.80 seconds
這樣,就探測出了主機系統為win7,同時還可以看出使用的數據庫時SQL server 2008 R2。
不過掃描使用的時間就稍微長了一點,188秒,也就是3分鍾左右。
通過QQ的IP探測,我找了一個IP來進行測試,結果發現是這樣的
root@bt:~# nmap -sT -O -A 223.67.165.180 Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-08-31 02:47 EDT Nmap scan report for 223.67.165.180 Host is up (0.00051s latency). All 1000 scanned ports on 223.67.165.180 are filtered Too many fingerprints match this host to give specific OS details TRACEROUTE (using proto 1/icmp) HOP RTT ADDRESS 1 ... 30 OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 33.84 seconds
原來是對方使用了路由器,掃描變成了對路由器的掃描了。