[prev in list] [next in list] [prev in thread] [next in thread] 

List:       nmap-dev
Subject:    =?utf-8?B?UmU6IEdvb2dsZSdzIENyLTQ4?=
From:       "=?utf-8?B?VmxhdGtvIEtvc3R1cmphaw==?=" <kost () linux ! hr>
Date:       2010-12-24 11:07:38
Message-ID: 20101224110743.ECA04BE046C () mail ! titan ! net
[Download RAW message or body]

I guess protocol scan would be useful too

Sent from my mobile

----- Reply message -----
From: "Chris Short" <chris@chrisshort.net>
Date: Fri, Dec 24, 2010 02:20
Subject: Google's Cr-48
To: "Toni Ruottu" <toni.ruottu@iki.fi>
Cc: <nmap-dev@insecure.org>


# Nmap 5.21 scan initiated Thu Dec 23 19:38:25 2010 as: nmap -v -v
-p0- -sU -PN -oN C:\Users\Chris\My Dropbox\nmap_cr-48_udp
192.168.1.101
Nmap scan report for 192.168.1.101
Host is up (0.032s latency).
All 65536 scanned ports on 192.168.1.101 are open|filtered
MAC Address: 00:25:D3:39:E7:91 (AzureWave Technologies)

Read data files from: C:\Program Files\Nmap
# Nmap done at Thu Dec 23 20:15:59 2010 -- 1 IP address (1 host up)
scanned in 2257.12 seconds

Thanks,
Chris Short




On Thu, Dec 23, 2010 at 6:37 PM, Toni Ruottu <toni.ruottu@iki.fi> wrote:

> You can scan all ports by saying -p 0- I think. It is shorter to write and
> includes port 0.
>
> You should also scan the udp ports. Use -sU to target udp ports.
> On 24 Dec 2010 00:12, "Chris Short" <chris@chrisshort.net> wrote:
> > I am a part of Google's pilot program and Fyodor suggested I post the
> nmap
> > run to this list. If you would like to run tests/experiments on the
> device
> > please don't hesitate to ask.
> >
> >
> > # Nmap 5.21 scan initiated Thu Dec 23 09:08:23 2010 as: nmap -v -v
> > -p1-65535 -A -PN -oN C:\Users\Chris\Desktop\nmap_cr-48.txt
> > 192.168.1.101
> > Initiating OS detection (try #1) against 192.168.1.101
> > Retrying OS detection (try #2) against 192.168.1.101
> > Nmap scan report for 192.168.1.101
> > Host is up (0.041s latency).
> > All 65535 scanned ports on 192.168.1.101 are filtered
> > MAC Address: 00:25:D3:39:E7:91 (AzureWave Technologies)
> > Too many fingerprints match this host to give specific OS details
> > TCP/IP fingerprint:
> >
> SCAN(V=5.21%D=12/23%OT=%CT=%CU=%PV=Y%DS=1%DC=D%G=N%M=0025D3%TM=4D1360AD%P=i686-pc-windows-windows)
> > SEQ(II=I)
> > U1(R=N)
> > IE(R=Y%DFI=N%TG=40%CD=S)
> >
> > Network Distance: 1 hop
> >
> > HOP RTT ADDRESS
> > 1 40.82 ms 192.168.1.101
> >
> > Read data files from: C:\Program Files\Nmap
> > OS and Service detection performed. Please report any incorrect
> > results at http://nmap.org/submit/ .
> > # Nmap done at Thu Dec 23 09:46:05 2010 -- 1 IP address (1 host up)
> > scanned in 2263.81 seconds
> >
> >
> > Thanks,
> > Chris Short
> > _______________________________________________
> > Sent through the nmap-dev mailing list
> > http://cgi.insecure.org/mailman/listinfo/nmap-dev
> > Archived at http://seclists.org/nmap-dev/
>
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic