Título: Interpretacion de nmap Publicado por: Flynker en 13 Junio 2010, 05:08 am hola, pues soy nuevo y bueno estoy apenas aprendiendo nmap
me gustari saber si alguien puede explicarme un poco mas es decir quiero saber como interpretarlo, por ejemplo he conseguido esta informacion pero no se bien que es lo que me quiere decir o bien que me puedan pasar alguna pagina que me explique ;D nmap -T4 -A -v -PE -PS22,25,80 -PA21,23,80,3389 148.213.1.12 Starting Nmap 5.30BETA1 ( http://nmap.org ) at 2010-06-12 21:55 Hora de verano central (México) NSE: Loaded 49 scripts for scanning. Initiating Ping Scan at 21:56 Scanning 148.213.1.12 [8 ports] Completed Ping Scan at 21:56, 0.30s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 21:56 Completed Parallel DNS resolution of 1 host. at 21:56, 0.22s elapsed Initiating SYN Stealth Scan at 21:56 Scanning mail.ucol.mx (148.213.1.12) [1000 ports] SYN Stealth Scan Timing: About 27.82% done; ETC: 21:57 (0:01:20 remaining) Completed SYN Stealth Scan at 21:57, 83.39s elapsed (1000 total ports) Initiating Service scan at 21:57 Initiating OS detection (try #1) against mail.ucol.mx (148.213.1.12) Retrying OS detection (try #2) against mail.ucol.mx (148.213.1.12) Initiating Traceroute at 21:57 Completed Traceroute at 21:57, 0.03s elapsed Initiating Parallel DNS resolution of 2 hosts. at 21:57 Completed Parallel DNS resolution of 2 hosts. at 21:57, 0.00s elapsed NSE: Script scanning 148.213.1.12. NSE: Script Scanning completed. Nmap scan report for mail.ucol.mx (148.213.1.12) Host is up (0.046s latency). Not shown: 980 closed ports PORT STATE SERVICE VERSION 20/tcp filtered ftp-data 21/tcp filtered ftp 22/tcp filtered ssh 23/tcp filtered telnet 25/tcp filtered smtp 53/tcp filtered domain 80/tcp filtered http 110/tcp filtered pop3 111/tcp filtered rpcbind 135/tcp filtered msrpc 143/tcp filtered imap 161/tcp filtered snmp 443/tcp filtered https 593/tcp filtered http-rpc-epmap 1026/tcp filtered LSA-or-nterm 1433/tcp filtered ms-sql-s 1434/tcp filtered ms-sql-m 4444/tcp filtered krb524 6101/tcp filtered backupexec 9898/tcp filtered unknown Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose|broadband router|specialized Running (JUST GUESSING) : Linux 2.6.X (89%), Billion embedded (86%), VMware ESX Server 3.X (85%) Aggressive OS guesses: Linux 2.6.18 (89%), Billion 7404VGP-M ADSL router (86%), Linux 2.6.11 (85%), Linux 2.6.18.8 (openSUSE 10.2) (85%), Linux 2.6.18.8 (openSUSE 10.2, SMP) (85%), Linux 2.6.20.6 (85%), Linux 2.6.23 (85%), VMware ESX Server 3.0.2 (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 2 hops TRACEROUTE (using port 21/tcp) HOP RTT ADDRESS 1 0.00 ms home (192.168.1.254) 2 0.00 ms mail.ucol.mx (148.213.1.12) Read data files from: C:\Archivos de programa\Nmap OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 93.66 seconds Raw packets sent: 1503 (67.944KB) | Rcvd: 1322 (54.574KB) Título: Re: Interpretacion de nmap Publicado por: peib0l en 13 Junio 2010, 11:45 am pues esa pregunta me da que pensar..
1- no tienes ni idea de el comando que has puesto 2- no te has molestado en mirar que hace cada uno de los modificadores.. para la interpretacion use: nmap o visite http://nmap.org/man/es/ Salu2 Título: Re: Interpretacion de nmap Publicado por: Flynker en 13 Junio 2010, 19:43 pm Gracias, solo un poco tenia idea, solo los copie del libro pero no es mucho lo que explica .. el DNS orion.ucol.mx si me aparecieron algunos puertos abiertos :-\ haber si aprendo ... gracias por la ayuda :)
|