PORT – Testing TCP Sequence Prediction: Difficulty=196 (Good luck!)


Total Port saat ini 65532 wew.. :d
http://nmap.org/svn/nmap-services

Scan via NMAP Opsus - remote putty via windows (server to simple dns)
# nmap -O -v 118.137.xx.xx
Starting Nmap 5.00 ( http://nmap.org ) at 2010-06-17 20:01 WIT
Warning: File ./nmap-services exists, but Nmap is using /usr/share/nmap/nmap-services for security and consistency reasons.  set NMAPDIR=. to give priority to files in your local directory (may affect the other data files too).
NSE: Loaded 0 scripts for scanning.
Initiating Parallel DNS resolution of 1 host. at 20:01
Completed Parallel DNS resolution of 1 host. at 20:01, 5.59s elapsed
Initiating SYN Stealth Scan at 20:01
Scanning fm-ip-118.137.xx.xx.fast.net.id (118.137.xx.xx) [1000 ports]
Discovered open port 445/tcp on 118.137.xx.xx
Discovered open port 139/tcp on 118.137.xx.xx
Discovered open port 111/tcp on 118.137.xx.xx
Discovered open port 3128/tcp on 118.137.xx.xx
Discovered open port 5903/tcp on 118.137.xx.xx
Discovered open port 5901/tcp on 118.137.xx.xx
Discovered open port 5902/tcp on 118.137.xx.xx
Discovered open port 5801/tcp on 118.137.xx.xx
Discovered open port 5904/tcp on 118.137.xx.xx
Discovered open port 10000/tcp on 118.137.xx.xx
Completed SYN Stealth Scan at 20:01, 0.03s elapsed (1000 total ports)
Initiating OS detection (try #1) against fm-ip-118.137.xx.xx.fast.net.id (118.137.xx.xx)
Host fm-ip-118.137.xx.xx.fast.net.id (118.137.xx.xx) is up (0.000029s latency).
Interesting ports on fm-ip-118.137.xx.xx.fast.net.id (118.137.xx.xx):
Not shown: 990 closed ports
PORT      STATE SERVICE
111/tcp   open  rpcbind
139/tcp   open  netbios-ssn
445/tcp   open  microsoft-ds
3128/tcp  open  squid-http
5801/tcp  open  vnc-http-1
5901/tcp  open  vnc-1
5902/tcp  open  vnc-2
5903/tcp  open  vnc-3
5904/tcp  open  unknown
10000/tcp open  snet-sensor-mgmt
Device type: general purpose
Running: Linux 2.6.X
OS details: Linux 2.6.15 - 2.6.27
Uptime guess: 0.718 days (since Thu Jun 17 02:48:18 2010)
Network Distance: 0 hops
TCP Sequence Prediction: Difficulty=196 (Good luck!)
IP ID Sequence Generation: All zeros

Scan via NMAP Opsus - remote putty via windows (server to simple dns)
#nmap -sV -O -v 118.137.xx.xx
Starting Nmap 5.00 ( http://nmap.org ) at 2010-06-17 20:13 WIT
Warning: File ./nmap-services exists, but Nmap is using /usr/share/nmap/nmap-services for security and consistency reasons.  set NMAPDIR=. to give priority to files in your local directory (may affect the other data files too).
NSE: Loaded 3 scripts for scanning.
Initiating Parallel DNS resolution of 1 host. at 20:13
Completed Parallel DNS resolution of 1 host. at 20:13, 5.63s elapsed
Initiating SYN Stealth Scan at 20:13
Scanning fm-ip-118.137.xx.xx.fast.net.id (118.137.xx.xx) [1000 ports]
Discovered open port 111/tcp on 118.137.xx.xx
Discovered open port 445/tcp on 118.137.xx.xx
Discovered open port 139/tcp on 118.137.xx.xx
Discovered open port 5902/tcp on 118.137.xx.xx
Discovered open port 3128/tcp on 118.137.xx.xx
Discovered open port 10000/tcp on 118.137.xx.xx
Discovered open port 5801/tcp on 118.137.xx.xx
Discovered open port 5903/tcp on 118.137.xx.xx
Discovered open port 5901/tcp on 118.137.xx.xx
Discovered open port 5904/tcp on 118.137.xx.xx
Completed SYN Stealth Scan at 20:13, 0.03s elapsed (1000 total ports)
Initiating Service scan at 20:13
Scanning 10 services on fm-ip-118.137.xx.xx.fast.net.id (118.137.xx.xx)
Completed Service scan at 20:13, 29.57s elapsed (10 services on 1 host)
Initiating OS detection (try #1) against fm-ip-118.137.xx.xx.fast.net.id (118.137.xx.xx)
NSE: Script scanning 118.137.xx.xx.
NSE: Script Scanning completed.
Host fm-ip-118.137.xx.xx.fast.net.id (118.137.xx.xx) is up (0.000027s latency).
Interesting ports on fm-ip-118.137.xx.xx.fast.net.id (118.137.xx.xx):
Not shown: 990 closed ports
PORT      STATE SERVICE     VERSION
111/tcp   open  rpcbind
139/tcp   open  netbios-ssn Samba smbd 3.X (workgroup: COM)
445/tcp   open  netbios-ssn Samba smbd 3.X (workgroup: COM)
3128/tcp  open  http-proxy  Squid webproxy 2.7.STABLE6
5801/tcp  open  vnc-http    TightVNC 1.2.9 (Resolution 1024x788; VNC TCP port 5901)
5901/tcp  open  vnc         VNC (protocol 3.7)
5902/tcp  open  ssh         OpenSSH 5.2 (protocol 1.99)
5903/tcp  open  http        Apache httpd 2.2.13 ((Linux/SUSE))
5904/tcp  open  ssl/http    Apache httpd 2.2.13 ((Linux/SUSE))
10000/tcp open  http        Webmin httpd
Device type: general purpose
Running: Linux 2.6.X
OS details: Linux 2.6.15 - 2.6.27
Uptime guess: 0.726 days (since Thu Jun 17 02:48:18 2010)
Network Distance: 0 hops
TCP Sequence Prediction: Difficulty=194 (Good luck!)
IP ID Sequence Generation: All zeros

Scan via NMAP Windows (localhost to server)
nmap -sV -O -v 192.168.0.1
Starting Nmap 5.21 ( http://nmap.org ) at 2010-06-17 20:31 SE Asia Standard Time
NSE: Loaded 4 scripts for scanning.
Initiating ARP Ping Scan at 20:31
Scanning 192.168.0.1 [1 port]
Completed ARP Ping Scan at 20:31, 0.15s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 20:31
Completed Parallel DNS resolution of 1 host. at 20:31, 0.02s elapsed
Initiating SYN Stealth Scan at 20:31
Scanning 192.168.0.1 [1000 ports]
Discovered open port 139/tcp on 192.168.0.1
Discovered open port 80/tcp on 192.168.0.1
Discovered open port 111/tcp on 192.168.0.1
Discovered open port 445/tcp on 192.168.0.1
Discovered open port 5904/tcp on 192.168.0.1
Discovered open port 5901/tcp on 192.168.0.1
Discovered open port 10000/tcp on 192.168.0.1
Discovered open port 3128/tcp on 192.168.0.1
Discovered open port 5903/tcp on 192.168.0.1
Discovered open port 5801/tcp on 192.168.0.1
Discovered open port 5902/tcp on 192.168.0.1
Completed SYN Stealth Scan at 20:31, 0.07s elapsed (1000 total ports)
Initiating Service scan at 20:31
Scanning 11 services on 192.168.0.1
Completed Service scan at 20:31, 29.58s elapsed (11 services on 1 host)
Initiating RPCGrind Scan against 192.168.0.1 at 20:31
Completed RPCGrind Scan against 192.168.0.1 at 20:31, 0.01s elapsed (1 port)
Initiating OS detection (try #1) against 192.168.0.1
Retrying OS detection (try #2) against 192.168.0.1
Retrying OS detection (try #3) against 192.168.0.1
Retrying OS detection (try #4) against 192.168.0.1
Retrying OS detection (try #5) against 192.168.0.1
NSE: Script scanning 192.168.0.1.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 20:32
Completed NSE at 20:32, 0.01s elapsed
NSE: Script Scanning completed.
Nmap scan report for 192.168.0.1
Host is up (0.00s latency).
Not shown: 989 closed ports
PORT      STATE SERVICE     VERSION
80/tcp    open  http-proxy  Squid webproxy 2.7.STABLE6
111/tcp   open  rpcbind
139/tcp   open  netbios-ssn Samba smbd 3.X (workgroup: COM)
445/tcp   open  netbios-ssn Samba smbd 3.X (workgroup: COM)
3128/tcp  open  http-proxy  Squid webproxy 2.7.STABLE6
x30x/tcp  open  vnc-http    TightVNC 1.2.9 (Resolution 1024x788; VNC TCP port 5901)
x10x/tcp  open  vnc         VNC (protocol 3.7)
x70x/tcp  open  ssh         OpenSSH 5.2 (protocol 1.99)
x303/tcp  open  http        Apache httpd 2.2.13 ((Linux/SUSE))
x504/tcp  open  ssl/http    Apache httpd 2.2.13 ((Linux/SUSE))
99560/tcp open  http        MiniServ 0.01 (Webmin httpd)
MAC Address: 00:24:01:D1:54:FB (D-Link)
No exact OS matches for host (If you know what OS is running on it, see http://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=5.21%D=6/17%OT=80%CT=1%CU=34213%PV=Y%DS=1%DC=D%G=Y%M=002401%TM=4C
OS:1A23D8%P=i686-pc-windows-windows)SEQ(SP=BE%GCD=1%ISR=D2%TI=Z%CI=Z%II=I%T
OS:S=A)OPS(O1=M5B4ST11NW7%O2=M5B4ST11NW7%O3=M5B4NNT11NW7%O4=M5B4ST11NW7%O5=
OS:M5B4ST11NW7%O6=M5B4ST11)WIN(W1=16A0%W2=16A0%W3=16A0%W4=16A0%W5=16A0%W6=1
OS:6A0)ECN(R=Y%DF=Y%T=40%W=16D0%O=M5B4NNSNW7%CC=N%Q=)T1(R=Y%DF=Y%T=40%S=O%A
OS:=S+%F=AS%RD=0%Q=)T2(R=Y%DF=Y%T=40%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)T3(R=Y%DF=
OS:Y%T=40%W=0%S=Z%A=O%F=AR%O=%RD=0%Q=)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%R
OS:D=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=
OS:0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U
OS:1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DF
OS:I=N%T=40%CD=S)
Uptime guess: 0.739 days (since Thu Jun 17 02:48:03 2010)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=190 (Good luck!)
IP ID Sequence Generation: All zeros
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 41.52 seconds
 Raw packets sent: 1081 (51.132KB) | Rcvd: 1083 (47.888KB)

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: