Home > Argomenti vari > Test-Security

Test-Security

14 Giugno 2007

————————————————————————————————————————————————————
————————————————————————————————————————————————————
nmap -P0 83.211.145.43

Starting Nmap 4.20 ( http://insecure.org ) at 2007-06-13 18:58 CEST
Interesting ports on ip-145-43.sn2.eutelia.it (83.211.145.43):
Not shown: 1696 filtered ports
PORT STATE SERVICE
113/tcp closed auth

Nmap finished: 1 IP address (1 host up) scanned in 419.897 seconds
————————————————————————————————————————————————————
————————————————————————————————————————————————————

nmap -P0 83.211.147.193

Starting Nmap 4.20 ( http://insecure.org ) at 2007-06-13 18:57 CEST
All 1697 scanned ports on ip-147-193.sn2.eutelia.it (83.211.147.193) are filtered

Nmap finished: 1 IP address (1 host up) scanned in 341.950 seconds

————————————————————————-
——————————————————————————————————————–
nmap -A -T4 -P0 83.211.145.43
Starting Nmap 4.20 ( http://insecure.org ) at 2007-06-14 10:51 CEST
Warning: OS detection for 83.211.145.43 will be MUCH less reliable because we did not find at least 1 open and 1 closed TCP port
Interesting ports on ip-145-43.sn2.eutelia.it (83.211.145.43):
Not shown: 1696 filtered ports
PORT STATE SERVICE VERSION
113/tcp closed auth
Device type: firewall
Running: IPCop Linux 2.4.X
OS details: Ipcop V1.4.11 firewall (Linux 2.4.31)

OS and Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .
Nmap finished: 1 IP address (1 host up) scanned in 39.467 seconds

———————————————————————–
———————————————————————–
nmap -A -T4 -P0 83.211.147.193
Starting Nmap 4.20 ( http://insecure.org ) at 2007-06-14 10:52 CEST
Interesting ports on ip-147-193.sn2.eutelia.it (83.211.147.193):
Not shown: 1694 filtered ports
PORT STATE SERVICE VERSION
23/tcp open telnet ActionTec DSL router
53/tcp open domain
80/tcp open http?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port80-TCP:V=4.20%I=7%D=6/14%Time=46710206%P=i586-mandriva-linux-gnu%r(
SF:GetRequest,31B,”HTTP/1.1x20200x20OKrnServer:x20Virata-EmWeb/R5_3_
SF:2rnContent-Type:x20text/htmlrnExpires:x20Thu,x2001x20Janx20197
SF:0×2000:00:00x20GMTrnCache-Control:x20no-cachernPragma:x20no-cac
SF:hernrnnnnnx20n
SF:x20nx20nx20nx20nnnnn”)%r(HTTPO
SF:ptions,5E,”HTTP/1.1x20200x20OKrnServer:x20Virata-EmWeb/R5_3_2rn
SF:Content-Length:x200rnAllow:x20HEAD,x20GET,x20OPTIONSrnrn”)%r(
SF:RTSPRequest,5D,”HTTP/1.1x20400x20Badx20RequestrnServer:x20Virata
SF:-EmWeb/R5_3_2rnContent-Length:x200rnrn400x20Badx20Requestrn”
SF:)%r(FourOhFourRequest,46,”HTTP/1.1x20404x20Notx20FoundrnServer:x
SF:20Virata-EmWeb/R5_3_2rnrn404x20Notx20Foundrn”)%r(Help,4A,”HTTP/
SF:1.1x20400x20Badx20RequestrnServer:x20Virata-EmWeb/R5_3_2rnrn
SF:400x20Badx20Requestrn”)%r(SSLSessionReq,4A,”HTTP/1.1x20400x20Bad
SF:x20RequestrnServer:x20Virata-EmWeb/R5_3_2rnrn400x20Badx20Requ
SF:estrn”)%r(SMBProgNeg,4A,”HTTP/1.1x20400x20Badx20RequestrnServer
SF::x20Virata-EmWeb/R5_3_2rnrn400x20Badx20Requestrn”)%r(LPDString
SF:,4A,”HTTP/1.1x20400x20Badx20RequestrnServer:x20Virata-EmWeb/R5_3
SF:_2rnrn400x20Badx20Requestrn”)%r(NessusTPv10,4A,”HTTP/1.1×2040
SF:0x20Badx20RequestrnServer:x20Virata-EmWeb/R5_3_2rnrn400x20Bad
SF:x20Requestrn”);
Service Info: Device: broadband router

Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .
Nmap finished: 1 IP address (1 host up) scanned in 91.494 seconds
Riferimenti: Test-Security

  1. algieri.gianca
    14 Giugno 2007 a 22:54 | #1

    Host ip-145-43.sn2.eutelia.it (83.211.145.43) appears to be up … good.
    All 1704 scanned ports on ip-145-43.sn2.eutelia.it (83.211.145.43) are filtered
    OS details: 2Wire Shasta wireless broadband router, Cisco DOCSIS cable modem termination server running IOS 12.1, Cisco Catalyst 6500-series switch running IOS 12.1, D-Link DI-824VUP Wireless VPN Router, Dedicated Micros Digital Sprite 2 multi-channel DVR, Ember InSight Adapter for programming EM2XX-family embedded devices, IBM 6400 Printer (software version 7.0.9.6), Kyocera FS-3800 network printer, Lexmark T522 printer, Lexmark T632/C750 printer, Linux 2.6.9-022stab078.19-enterprise (CentOS 4.2 x86), Minix 3.1.2a, Modtronix single-board computer SBC65EC v3.03, MOXA NPort 5110 serial device server, MOXA NPort 5210 serial device server, Nokia IPSO 4.1Build19 firewall, NTI EnviroMux-Mini Environmental Monitoring System, RCA DCM425C cable modem, Sagem F@st 3302 dsl router, Sharp AR-M351N Printer, Tandberg 990 MXP Video Conferencing Unit, TRENDnet TEW-431BRP wireless broadband router, WatchGuard FireBox 700, Xavi 7001 DSL modem
    OS Fingerprint:
    OS:SCAN(V=4.21ALPHA4%D=6/14%OT=%CT=%CU=%PV=N%G=N%TM=46718D51%P=i686-pc-linu
    OS:x-gnu)U1(R=N)IE(R=N)

    Final times for host: srtt: 38882 rttvar: 1159 to: 100000

    OS and Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .
    Nmap finished: 1 IP address (1 host up) scanned in 1303.001 seconds
    Raw packets sent: 15540 (414.856KB) | Rcvd: 8052 (445.594KB)

  2. oseido
    15 Giugno 2007 a 16:47 | #2

    [root@dhcppc1 oseido0]# nmap -A -T4 -P0 83.211.147.193

    Starting Nmap 4.21ALPHA4 ( http://insecure.org ) at 2007-06-15 14:14 CEST
    Warning: OS detection for 83.211.147.193 will be MUCH less reliable because we did not find at least 1 open and 1 closed TCP port
    All 1704 scanned ports on ip-147-193.sn2.eutelia.it (83.211.147.193) are filtered
    Too many fingerprints match this host to give specific OS details

    OS and Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .
    Nmap finished: 1 IP address (1 host up) scanned in 175.081 seconds
    [root@dhcppc1 oseido0]# nmap -A -T4 -P0 83.211.145.43

    Starting Nmap 4.21ALPHA4 ( http://insecure.org ) at 2007-06-15 14:19 CEST
    Warning: OS detection for 83.211.145.43 will be MUCH less reliable because we did not find at least 1 open and 1 closed TCP port
    Interesting ports on 83.211.145.43:
    Not shown: 1703 filtered ports
    PORT STATE SERVICE VERSION
    113/tcp closed auth
    Device type: firewall
    Running: IPCop Linux 2.4.X
    OS details: Ipcop V1.4.11 firewall (Linux 2.4.31)

    OS and Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .
    Nmap finished: 1 IP address (1 host up) scanned in 289.116 seconds

  3. test porte firewall
    18 Giugno 2007 a 19:58 | #3

    [root@localhost poggibonsi3]# nmap -A -T4 -P0 192.168.1.150

    Starting Nmap 4.20 ( http://insecure.org ) at 2007-06-18 17:45 CEST
    Interesting ports on 192.168.1.150:
    Not shown: 1693 closed ports
    PORT STATE SERVICE VERSION
    53/tcp open domain ISC Bind dnsmasq-2.38
    81/tcp open http Apache httpd
    222/tcp open ssh OpenSSH 4.5 (protocol 2.0)
    445/tcp open http Apache httpd
    MAC Address: 00:10:DC:CB:8C:59 (Micro-star International CO.)
    Device type: firewall
    Running: IPCop Linux 2.4.X
    OS details: Ipcop V1.4.11 firewall (Linux 2.4.31)
    Network Distance: 1 hop

    OS and Service detection performed. Please report any incorrect results at http: //insecure.org/nmap/submit/ .
    Nmap finished: 1 IP address (1 host up) scanned in 13.108 seconds

I commenti sono chiusi.