Nie jesteś zalogowany.
Jeśli nie posiadasz konta, zarejestruj je już teraz! Pozwoli Ci ono w pełni korzystać z naszego serwisu. Spamerom dziękujemy!
Prosimy o pomoc dla małej Julki — przekaż 1% podatku na Fundacji Dzieciom zdazyć z Pomocą.
Więcej informacji na dug.net.pl/pomagamy/.
Witam.
Mam pytanie a właściwie prośbę, przeskanowałem nmap bramę domyślną i mi wyskoczyło to i nie wiem co to oznacza czy to nie jest router skonfigurowany do wysyłania wiadomości do hmurki i jeszcze co to jest icloud czy to jest oprogramowanie zainstalowane na kompie do przechwytywania danych z telefonu (where is my iphon ?) a i jeszcze raw packet sent co oznaczają ?
Starting Nmap 6.40 ( http://nmap.org ) at 2014-01-31 22:34 W. Europe Standard Time NSE: Loaded 227 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 22:34 NSE: mtrace: A source IP must be provided through fromip argument. Completed NSE at 22:34, 10.78s elapsed Pre-scan script results: | broadcast-eigrp-discovery: |_ ERROR: Couldn't get an A.S value. | broadcast-igmp-discovery: | 192.168.1.100 | Interface: eth1 | Version: 2 | Group: 224.0.0.252 | Description: Link-local Multicast Name Resolution (rfc4795) | 192.168.1.100 | Interface: eth1 | Version: 2 | Group: 224.0.0.253 | Description: Teredo (rfc4380) | 192.168.1.100 | Interface: eth1 | Version: 2 | Group: 239.255.255.250 | Description: Organization-Local Scope (rfc2365) |_ Use the newtargets script-arg to add the results as targets | http-icloud-findmyiphone: |_ ERROR: No username or password was supplied | http-icloud-sendmsg: |_ ERROR: No username or password was supplied | targets-asn: |_ targets-asn.asn is a mandatory parameter Initiating Ping Scan at 22:34 Scanning 255.255.255.0 [7 ports] Completed Ping Scan at 22:34, 2.19s elapsed (1 total hosts) Nmap scan report for 255.255.255.0 [host down] get_srcaddr: can't connect socket: The requested address is not valid in its context. NSE: Script Post-scanning. Read data files from: C:\Program Files\Nmap Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 21.45 seconds Raw packets sent: 14 (552B) | Rcvd: 1 (96B)
Offline
nmap -p 80 192.168.0.0./16 -sV
Poszuka wszystkich hostów z otwartym hostem 80, i wywali listę.
Przykład:
.... Nmap scan report for lan7 (192.168.7.1) Host is up (0.00062s latency). PORT STATE SERVICE VERSION 80/tcp open http lighttpd Nmap scan report for zyxel (192.168.7.5) Host is up (0.0016s latency). PORT STATE SERVICE VERSION 80/tcp open http Allegro RomPager 4.07 UPnP/1.0 (ZyXEL ZyWALL 2) .....
Offline
Witam wszystkich
Mam pytanie a mianowicie prośbę przeskanowałem nmap bramę domyślną i chodzi mi o znaczenie, | http-icloud-findmyiphone: ? i te errory jak również Raw packets sent: 14 (552B) | Rcvd: 1 (96B)
Co oznaczają skanowania z nmap? za udzielenie pomocy z góry Dziękuję.
Starting Nmap 6.40 ( http://nmap.org ) at 2014-01-31 22:34 W. Europe Standard Time NSE: Loaded 227 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 22:34 NSE: mtrace: A source IP must be provided through fromip argument. Completed NSE at 22:34, 10.78s elapsed Pre-scan script results: | broadcast-eigrp-discovery: |_ ERROR: Couldn't get an A.S value. | broadcast-igmp-discovery: | 192.168.1.100 | Interface: eth1 | Version: 2 | Group: 224.0.0.252 | Description: Link-local Multicast Name Resolution (rfc4795) | 192.168.1.100 | Interface: eth1 | Version: 2 | Group: 224.0.0.253 | Description: Teredo (rfc4380) | 192.168.1.100 | Interface: eth1 | Version: 2 | Group: 239.255.255.250 | Description: Organization-Local Scope (rfc2365) |_ Use the newtargets script-arg to add the results as targets | http-icloud-findmyiphone: |_ ERROR: No username or password was supplied | http-icloud-sendmsg: |_ ERROR: No username or password was supplied | targets-asn: |_ targets-asn.asn is a mandatory parameter Initiating Ping Scan at 22:34 Scanning 255.255.255.0 [7 ports] Completed Ping Scan at 22:34, 2.19s elapsed (1 total hosts) Nmap scan report for 255.255.255.0 [host down] get_srcaddr: can't connect socket: The requested address is not valid in its context. NSE: Script Post-scanning. Read data files from: C:\Program Files\Nmap Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 21.45 seconds Raw packets sent: 14 (552B) | Rcvd: 1 (96B)
i kolejny ip adresu
Offline
Witam wszystkich
Mam pytanie a mianowicie prośbę przeskanowałem nmap bramę domyślną i chodzi mi o znaczenie, | http-icloud-findmyiphone: ? i te errory jak również Raw packets sent: 14 (552B) | Rcvd: 1 (96B)
Co oznaczają skanowania z nmap? wybaczcie za laictwo i za udzielenie pomocy z góry Dziękuję.
Offline
Wynik z nmapa jest tajny?
Offline
sorki
Starting Nmap 6.40 ( http://nmap.org ) at 2014-01-31 22:34 W. Europe Standard Time NSE: Loaded 227 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 22:34 NSE: mtrace: A source IP must be provided through fromip argument. Completed NSE at 22:34, 10.78s elapsed Pre-scan script results: | broadcast-eigrp-discovery: |_ ERROR: Couldn't get an A.S value. | broadcast-igmp-discovery: | 192.168.1.100 | Interface: eth1 | Version: 2 | Group: 224.0.0.252 | Description: Link-local Multicast Name Resolution (rfc4795) | 192.168.1.100 | Interface: eth1 | Version: 2 | Group: 224.0.0.253 | Description: Teredo (rfc4380) | 192.168.1.100 | Interface: eth1 | Version: 2 | Group: 239.255.255.250 | Description: Organization-Local Scope (rfc2365) |_ Use the newtargets script-arg to add the results as targets | http-icloud-findmyiphone: |_ ERROR: No username or password was supplied | http-icloud-sendmsg: |_ ERROR: No username or password was supplied | targets-asn: |_ targets-asn.asn is a mandatory parameter Initiating Ping Scan at 22:34 Scanning 255.255.255.0 [7 ports] Completed Ping Scan at 22:34, 2.19s elapsed (1 total hosts) Nmap scan report for 255.255.255.0 [host down] get_srcaddr: can't connect socket: The requested address is not valid in its context. NSE: Script Post-scanning. Read data files from: C:\Program Files\Nmap Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 21.45 seconds Raw packets sent: 14 (552B) | Rcvd: 1 (96B)
Offline
wkleiłem to
nmap -p 80 192.168.0.0./16 -sV
przeskanowałem Slow comprehensive scan i mi wyskoczyło .... co to może oznaczac?
Starting Nmap 6.40 ( http://nmap.org ) at 2014-02-01 00:11 W. Europe Standard Time NSE: Loaded 227 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 00:11 NSE: mtrace: A source IP must be provided through fromip argument. Completed NSE at 00:11, 10.56s elapsed Pre-scan script results: | broadcast-eigrp-discovery: |_ ERROR: Couldn't get an A.S value. | broadcast-igmp-discovery: | 192.168.1.102 | Interface: eth1 | Version: 2 | Group: 239.255.255.250 | Description: Organization-Local Scope (rfc2365) |_ Use the newtargets script-arg to add the results as targets | http-icloud-findmyiphone: |_ ERROR: No username or password was supplied | http-icloud-sendmsg: |_ ERROR: No username or password was supplied | targets-asn: |_ targets-asn.asn is a mandatory parameter Initiating Ping Scan at 00:11 Scanning 256 hosts [7 ports/host] Ping Scan Timing: About 16.77% done; ETC: 00:14 (0:02:34 remaining) Ping Scan Timing: About 32.95% done; ETC: 00:14 (0:02:04 remaining) Ping Scan Timing: About 49.14% done; ETC: 00:14 (0:01:34 remaining) Ping Scan Timing: About 65.68% done; ETC: 00:14 (0:01:03 remaining) Ping Scan Timing: About 81.86% done; ETC: 00:14 (0:00:33 remaining) Completed Ping Scan at 00:14, 186.20s elapsed (256 total hosts) Nmap scan report for 192.168.0.0. (192.168.0.0) [host down] Failed to resolve "nmap". get_srcaddr: can't connect socket: The requested address is not valid in its context. Nmap scan report for 192.168.0.1 [host down] Nmap scan report for 192.168.0.2 [host down] Nmap scan report for 192.168.0.3 [host down] Nmap scan report for 192.168.0.4 [host down] Nmap scan report for 192.168.0.5 [host down] Nmap scan report for 192.168.0.6 [host down] Nmap scan report for 192.168.0.7 [host down] Nmap scan report for 192.168.0.8 [host down] Nmap scan report for 192.168.0.9 [host down] Nmap scan report for 192.168.0.10 [host down] Nmap scan report for 192.168.0.11 [host down] Nmap scan report for 192.168.0.12 [host down] Nmap scan report for 192.168.0.13 [host down] Nmap scan report for 192.168.0.14 [host down] Nmap scan report for 192.168.0.15 [host down] Nmap scan report for 192.168.0.16 [host down] Nmap scan report for 192.168.0.17 [host down] Nmap scan report for 192.168.0.18 [host down] Nmap scan report for 192.168.0.19 [host down] Nmap scan report for 192.168.0.20 [host down] Nmap scan report for 192.168.0.21 [host down] Nmap scan report for 192.168.0.22 [host down] Nmap scan report for 192.168.0.23 [host down] Nmap scan report for 192.168.0.24 [host down] Nmap scan report for 192.168.0.25 [host down] Nmap scan report for 192.168.0.26 [host down] Nmap scan report for 192.168.0.27 [host down] Nmap scan report for 192.168.0.28 [host down] Nmap scan report for 192.168.0.29 [host down] Nmap scan report for 192.168.0.30 [host down] Nmap scan report for 192.168.0.31 [host down] Nmap scan report for 192.168.0.32 [host down] Nmap scan report for 192.168.0.33 [host down] Nmap scan report for 192.168.0.34 [host down] Nmap scan report for 192.168.0.35 [host down] Nmap scan report for 192.168.0.36 [host down] Nmap scan report for 192.168.0.37 [host down] Nmap scan report for 192.168.0.38 [host down] Nmap scan report for 192.168.0.39 [host down] Nmap scan report for 192.168.0.40 [host down] Nmap scan report for 192.168.0.41 [host down] Nmap scan report for 192.168.0.42 [host down] Nmap scan report for 192.168.0.43 [host down] Nmap scan report for 192.168.0.44 [host down] Nmap scan report for 192.168.0.45 [host down] Nmap scan report for 192.168.0.46 [host down] Nmap scan report for 192.168.0.47 [host down] Nmap scan report for 192.168.0.48 [host down] Nmap scan report for 192.168.0.49 [host down] Nmap scan report for 192.168.0.50 [host down] Nmap scan report for 192.168.0.51 [host down] Nmap scan report for 192.168.0.52 [host down] Nmap scan report for 192.168.0.53 [host down] Nmap scan report for 192.168.0.54 [host down] Nmap scan report for 192.168.0.55 [host down] Nmap scan report for 192.168.0.56 [host down] Nmap scan report for 192.168.0.57 [host down] Nmap scan report for 192.168.0.58 [host down] Nmap scan report for 192.168.0.59 [host down] Nmap scan report for 192.168.0.60 [host down] Nmap scan report for 192.168.0.61 [host down] Nmap scan report for 192.168.0.62 [host down] Nmap scan report for 192.168.0.63 [host down] Nmap scan report for 192.168.0.64 [host down] Nmap scan report for 192.168.0.65 [host down] Nmap scan report for 192.168.0.66 [host down] Nmap scan report for 192.168.0.67 [host down] Nmap scan report for 192.168.0.68 [host down] Nmap scan report for 192.168.0.69 [host down] Nmap scan report for 192.168.0.70 [host down] Nmap scan report for 192.168.0.71 [host down] Nmap scan report for 192.168.0.72 [host down] Nmap scan report for 192.168.0.73 [host down] Nmap scan report for 192.168.0.74 [host down] Nmap scan report for 192.168.0.75 [host down] Nmap scan report for 192.168.0.76 [host down] Nmap scan report for 192.168.0.77 [host down] Nmap scan report for 192.168.0.78 [host down] Nmap scan report for 192.168.0.79 [host down] Nmap scan report for 192.168.0.80 [host down] Nmap scan report for 192.168.0.81 [host down] Nmap scan report for 192.168.0.82 [host down] Nmap scan report for 192.168.0.83 [host down] Nmap scan report for 192.168.0.84 [host down] Nmap scan report for 192.168.0.85 [host down] Nmap scan report for 192.168.0.86 [host down] Nmap scan report for 192.168.0.87 [host down] Nmap scan report for 192.168.0.88 [host down] Nmap scan report for 192.168.0.89 [host down] Nmap scan report for 192.168.0.90 [host down] Nmap scan report for 192.168.0.91 [host down] Nmap scan report for 192.168.0.92 [host down] Nmap scan report for 192.168.0.93 [host down] Nmap scan report for 192.168.0.94 [host down] Nmap scan report for 192.168.0.95 [host down] Nmap scan report for 192.168.0.96 [host down] Nmap scan report for 192.168.0.97 [host down] Nmap scan report for 192.168.0.98 [host down] Nmap scan report for 192.168.0.99 [host down] Nmap scan report for 192.168.0.100 [host down] Nmap scan report for 192.168.0.101 [host down] Nmap scan report for 192.168.0.102 [host down] Nmap scan report for 192.168.0.103 [host down] Nmap scan report for 192.168.0.104 [host down] Nmap scan report for 192.168.0.105 [host down] Nmap scan report for 192.168.0.106 [host down] Nmap scan report for 192.168.0.107 [host down] Nmap scan report for 192.168.0.108 [host down] Nmap scan report for 192.168.0.109 [host down] Nmap scan report for 192.168.0.110 [host down] Nmap scan report for 192.168.0.111 [host down] Nmap scan report for 192.168.0.112 [host down] Nmap scan report for 192.168.0.113 [host down] Nmap scan report for 192.168.0.114 [host down] Nmap scan report for 192.168.0.115 [host down] Nmap scan report for 192.168.0.116 [host down] Nmap scan report for 192.168.0.117 [host down] Nmap scan report for 192.168.0.118 [host down] Nmap scan report for 192.168.0.119 [host down] Nmap scan report for 192.168.0.120 [host down] Nmap scan report for 192.168.0.121 [host down] Nmap scan report for 192.168.0.122 [host down] Nmap scan report for 192.168.0.123 [host down] Nmap scan report for 192.168.0.124 [host down] Nmap scan report for 192.168.0.125 [host down] Nmap scan report for 192.168.0.126 [host down] Nmap scan report for 192.168.0.127 [host down] Nmap scan report for 192.168.0.128 [host down] Nmap scan report for 192.168.0.129 [host down] Nmap scan report for 192.168.0.130 [host down] Nmap scan report for 192.168.0.131 [host down] Nmap scan report for 192.168.0.132 [host down] Nmap scan report for 192.168.0.133 [host down] Nmap scan report for 192.168.0.134 [host down] Nmap scan report for 192.168.0.135 [host down] Nmap scan report for 192.168.0.136 [host down] Nmap scan report for 192.168.0.137 [host down] Nmap scan report for 192.168.0.138 [host down] Nmap scan report for 192.168.0.139 [host down] Nmap scan report for 192.168.0.140 [host down] Nmap scan report for 192.168.0.141 [host down] Nmap scan report for 192.168.0.142 [host down] Nmap scan report for 192.168.0.143 [host down] Nmap scan report for 192.168.0.144 [host down] Nmap scan report for 192.168.0.145 [host down] Nmap scan report for 192.168.0.146 [host down] Nmap scan report for 192.168.0.147 [host down] Nmap scan report for 192.168.0.148 [host down] Nmap scan report for 192.168.0.149 [host down] Nmap scan report for 192.168.0.150 [host down] Nmap scan report for 192.168.0.151 [host down] Nmap scan report for 192.168.0.152 [host down] Nmap scan report for 192.168.0.153 [host down] Nmap scan report for 192.168.0.154 [host down] Nmap scan report for 192.168.0.155 [host down] Nmap scan report for 192.168.0.156 [host down] Nmap scan report for 192.168.0.157 [host down] Nmap scan report for 192.168.0.158 [host down] Nmap scan report for 192.168.0.159 [host down] Nmap scan report for 192.168.0.160 [host down] Nmap scan report for 192.168.0.161 [host down] Nmap scan report for 192.168.0.162 [host down] Nmap scan report for 192.168.0.163 [host down] Nmap scan report for 192.168.0.164 [host down] Nmap scan report for 192.168.0.165 [host down] Nmap scan report for 192.168.0.166 [host down] Nmap scan report for 192.168.0.167 [host down] Nmap scan report for 192.168.0.168 [host down] Nmap scan report for 192.168.0.169 [host down] Nmap scan report for 192.168.0.170 [host down] Nmap scan report for 192.168.0.171 [host down] Nmap scan report for 192.168.0.172 [host down] Nmap scan report for 192.168.0.173 [host down] Nmap scan report for 192.168.0.174 [host down] Nmap scan report for 192.168.0.175 [host down] Nmap scan report for 192.168.0.176 [host down] Nmap scan report for 192.168.0.177 [host down] Nmap scan report for 192.168.0.178 [host down] Nmap scan report for 192.168.0.179 [host down] Nmap scan report for 192.168.0.180 [host down] Nmap scan report for 192.168.0.181 [host down] Nmap scan report for 192.168.0.182 [host down] Nmap scan report for 192.168.0.183 [host down] Nmap scan report for 192.168.0.184 [host down] Nmap scan report for 192.168.0.185 [host down] Nmap scan report for 192.168.0.186 [host down] Nmap scan report for 192.168.0.187 [host down] Nmap scan report for 192.168.0.188 [host down] Nmap scan report for 192.168.0.189 [host down] Nmap scan report for 192.168.0.190 [host down] Nmap scan report for 192.168.0.191 [host down] Nmap scan report for 192.168.0.192 [host down] Nmap scan report for 192.168.0.193 [host down] Nmap scan report for 192.168.0.194 [host down] Nmap scan report for 192.168.0.195 [host down] Nmap scan report for 192.168.0.196 [host down] Nmap scan report for 192.168.0.197 [host down] Nmap scan report for 192.168.0.198 [host down] Nmap scan report for 192.168.0.199 [host down] Nmap scan report for 192.168.0.200 [host down] Nmap scan report for 192.168.0.201 [host down] Nmap scan report for 192.168.0.202 [host down] Nmap scan report for 192.168.0.203 [host down] Nmap scan report for 192.168.0.204 [host down] Nmap scan report for 192.168.0.205 [host down] Nmap scan report for 192.168.0.206 [host down] Nmap scan report for 192.168.0.207 [host down] Nmap scan report for 192.168.0.208 [host down] Nmap scan report for 192.168.0.209 [host down] Nmap scan report for 192.168.0.210 [host down] Nmap scan report for 192.168.0.211 [host down] Nmap scan report for 192.168.0.212 [host down] Nmap scan report for 192.168.0.213 [host down] Nmap scan report for 192.168.0.214 [host down] Nmap scan report for 192.168.0.215 [host down] Nmap scan report for 192.168.0.216 [host down] Nmap scan report for 192.168.0.217 [host down] Nmap scan report for 192.168.0.218 [host down] Nmap scan report for 192.168.0.219 [host down] Nmap scan report for 192.168.0.220 [host down] Nmap scan report for 192.168.0.221 [host down] Nmap scan report for 192.168.0.222 [host down] Nmap scan report for 192.168.0.223 [host down] Nmap scan report for 192.168.0.224 [host down] Nmap scan report for 192.168.0.225 [host down] Nmap scan report for 192.168.0.226 [host down] Nmap scan report for 192.168.0.227 [host down] Nmap scan report for 192.168.0.228 [host down] Nmap scan report for 192.168.0.229 [host down] Nmap scan report for 192.168.0.230 [host down] Nmap scan report for 192.168.0.231 [host down] Nmap scan report for 192.168.0.232 [host down] Nmap scan report for 192.168.0.233 [host down] Nmap scan report for 192.168.0.234 [host down] Nmap scan report for 192.168.0.235 [host down] Nmap scan report for 192.168.0.236 [host down] Nmap scan report for 192.168.0.237 [host down] Nmap scan report for 192.168.0.238 [host down] Nmap scan report for 192.168.0.239 [host down] Nmap scan report for 192.168.0.240 [host down] Nmap scan report for 192.168.0.241 [host down] Nmap scan report for 192.168.0.242 [host down] Nmap scan report for 192.168.0.243 [host down] Nmap scan report for 192.168.0.244 [host down] Nmap scan report for 192.168.0.245 [host down] Nmap scan report for 192.168.0.246 [host down] Nmap scan report for 192.168.0.247 [host down] Nmap scan report for 192.168.0.248 [host down] Nmap scan report for 192.168.0.249 [host down] Nmap scan report for 192.168.0.250 [host down] Nmap scan report for 192.168.0.251 [host down] Nmap scan report for 192.168.0.252 [host down] Nmap scan report for 192.168.0.253 [host down] Nmap scan report for 192.168.0.254 [host down] Nmap scan report for 192.168.0.255 [host down] Initiating ARP Ping Scan at 00:14 Scanning 255 hosts [1 port/host] Completed ARP Ping Scan at 00:14, 2.95s elapsed (255 total hosts) Initiating Parallel DNS resolution of 255 hosts. at 00:14 Completed Parallel DNS resolution of 255 hosts. at 00:14, 0.03s elapsed Nmap scan report for 192.168.1.0 [host down] Nmap scan report for 192.168.1.2 [host down] Nmap scan report for 192.168.1.3 [host down] Nmap scan report for 192.168.1.4 [host down] Nmap scan report for 192.168.1.5 [host down] Nmap scan report for 192.168.1.6 [host down] Nmap scan report for 192.168.1.7 [host down] Nmap scan report for 192.168.1.8 [host down] Nmap scan report for 192.168.1.9 [host down] Nmap scan report for 192.168.1.10 [host down] Nmap scan report for 192.168.1.11 [host down] Nmap scan report for 192.168.1.12 [host down] Nmap scan report for 192.168.1.13 [host down] Nmap scan report for 192.168.1.14 [host down] Nmap scan report for 192.168.1.15 [host down] Nmap scan report for 192.168.1.16 [host down] Nmap scan report for 192.168.1.17 [host down] Nmap scan report for 192.168.1.18 [host down] Nmap scan report for 192.168.1.19 [host down] Nmap scan report for 192.168.1.20 [host down] Nmap scan report for 192.168.1.21 [host down] Nmap scan report for 192.168.1.22 [host down] Nmap scan report for 192.168.1.23 [host down] Nmap scan report for 192.168.1.24 [host down] Nmap scan report for 192.168.1.25 [host down] Nmap scan report for 192.168.1.26 [host down] Nmap scan report for 192.168.1.27 [host down] Nmap scan report for 192.168.1.28 [host down] Nmap scan report for 192.168.1.29 [host down] Nmap scan report for 192.168.1.30 [host down] Nmap scan report for 192.168.1.31 [host down] Nmap scan report for 192.168.1.32 [host down] Nmap scan report for 192.168.1.33 [host down] Nmap scan report for 192.168.1.34 [host down] Nmap scan report for 192.168.1.35 [host down] Nmap scan report for 192.168.1.36 [host down] Nmap scan report for 192.168.1.37 [host down] Nmap scan report for 192.168.1.38 [host down] Nmap scan report for 192.168.1.39 [host down] Nmap scan report for 192.168.1.40 [host down] Nmap scan report for 192.168.1.41 [host down] Nmap scan report for 192.168.1.42 [host down] Nmap scan report for 192.168.1.43 [host down] Nmap scan report for 192.168.1.44 [host down] Nmap scan report for 192.168.1.45 [host down] Nmap scan report for 192.168.1.46 [host down] Nmap scan report for 192.168.1.47 [host down] Nmap scan report for 192.168.1.48 [host down] Nmap scan report for 192.168.1.49 [host down] Nmap scan report for 192.168.1.50 [host down] Nmap scan report for 192.168.1.51 [host down] Nmap scan report for 192.168.1.52 [host down] Nmap scan report for 192.168.1.53 [host down] Nmap scan report for 192.168.1.54 [host down] Nmap scan report for 192.168.1.55 [host down] Nmap scan report for 192.168.1.56 [host down] Nmap scan report for 192.168.1.57 [host down] Nmap scan report for 192.168.1.58 [host down] Nmap scan report for 192.168.1.59 [host down] Nmap scan report for 192.168.1.60 [host down] Nmap scan report for 192.168.1.61 [host down] Nmap scan report for 192.168.1.62 [host down] Nmap scan report for 192.168.1.63 [host down] Nmap scan report for 192.168.1.64 [host down] Nmap scan report for 192.168.1.65 [host down] Nmap scan report for 192.168.1.66 [host down] Nmap scan report for 192.168.1.67 [host down] Nmap scan report for 192.168.1.68 [host down] Nmap scan report for 192.168.1.69 [host down] Nmap scan report for 192.168.1.70 [host down] Nmap scan report for 192.168.1.71 [host down] Nmap scan report for 192.168.1.72 [host down] Nmap scan report for 192.168.1.73 [host down] Nmap scan report for 192.168.1.74 [host down] Nmap scan report for 192.168.1.75 [host down] Nmap scan report for 192.168.1.76 [host down] Nmap scan report for 192.168.1.77 [host down] Nmap scan report for 192.168.1.78 [host down] Nmap scan report for 192.168.1.79 [host down] Nmap scan report for 192.168.1.80 [host down] Nmap scan report for 192.168.1.81 [host down] Nmap scan report for 192.168.1.82 [host down] Nmap scan report for 192.168.1.83 [host down] Nmap scan report for 192.168.1.84 [host down] Nmap scan report for 192.168.1.85 [host down] Nmap scan report for 192.168.1.86 [host down] Nmap scan report for 192.168.1.87 [host down] Nmap scan report for 192.168.1.88 [host down] Nmap scan report for 192.168.1.89 [host down] Nmap scan report for 192.168.1.90 [host down] Nmap scan report for 192.168.1.91 [host down] Nmap scan report for 192.168.1.92 [host down] Nmap scan report for 192.168.1.93 [host down] Nmap scan report for 192.168.1.94 [host down] Nmap scan report for 192.168.1.95 [host down] Nmap scan report for 192.168.1.96 [host down] Nmap scan report for 192.168.1.97 [host down] Nmap scan report for 192.168.1.98 [host down] Nmap scan report for 192.168.1.99 [host down] Nmap scan report for 192.168.1.100 [host down] Nmap scan report for 192.168.1.101 [host down] Nmap scan report for 192.168.1.103 [host down] Nmap scan report for 192.168.1.104 [host down] Nmap scan report for 192.168.1.105 [host down] Nmap scan report for 192.168.1.106 [host down] Nmap scan report for 192.168.1.107 [host down] Nmap scan report for 192.168.1.108 [host down] Nmap scan report for 192.168.1.109 [host down] Nmap scan report for 192.168.1.110 [host down] Nmap scan report for 192.168.1.111 [host down] Nmap scan report for 192.168.1.112 [host down] Nmap scan report for 192.168.1.113 [host down] Nmap scan report for 192.168.1.114 [host down] Nmap scan report for 192.168.1.115 [host down] Nmap scan report for 192.168.1.116 [host down] Nmap scan report for 192.168.1.117 [host down] Nmap scan report for 192.168.1.118 [host down] Nmap scan report for 192.168.1.119 [host down] Nmap scan report for 192.168.1.120 [host down] Nmap scan report for 192.168.1.121 [host down] Nmap scan report for 192.168.1.122 [host down] Nmap scan report for 192.168.1.123 [host down] Nmap scan report for 192.168.1.124 [host down] Nmap scan report for 192.168.1.125 [host down] Nmap scan report for 192.168.1.126 [host down] Nmap scan report for 192.168.1.127 [host down] Nmap scan report for 192.168.1.128 [host down] Nmap scan report for 192.168.1.129 [host down] Nmap scan report for 192.168.1.130 [host down] Nmap scan report for 192.168.1.131 [host down] Nmap scan report for 192.168.1.132 [host down] Nmap scan report for 192.168.1.133 [host down] Nmap scan report for 192.168.1.134 [host down] Nmap scan report for 192.168.1.135 [host down] Nmap scan report for 192.168.1.136 [host down] Nmap scan report for 192.168.1.137 [host down] Nmap scan report for 192.168.1.138 [host down] Nmap scan report for 192.168.1.139 [host down] Nmap scan report for 192.168.1.140 [host down] Nmap scan report for 192.168.1.141 [host down] Nmap scan report for 192.168.1.142 [host down] Nmap scan report for 192.168.1.143 [host down] Nmap scan report for 192.168.1.144 [host down] Nmap scan report for 192.168.1.145 [host down] Nmap scan report for 192.168.1.146 [host down] Nmap scan report for 192.168.1.147 [host down] Nmap scan report for 192.168.1.148 [host down] Nmap scan report for 192.168.1.149 [host down] Nmap scan report for 192.168.1.150 [host down] Nmap scan report for 192.168.1.151 [host down] Nmap scan report for 192.168.1.152 [host down] Nmap scan report for 192.168.1.153 [host down] Nmap scan report for 192.168.1.154 [host down] Nmap scan report for 192.168.1.155 [host down] Nmap scan report for 192.168.1.156 [host down] Nmap scan report for 192.168.1.157 [host down] Nmap scan report for 192.168.1.158 [host down] Nmap scan report for 192.168.1.159 [host down] Nmap scan report for 192.168.1.160 [host down] Nmap scan report for 192.168.1.161 [host down] Nmap scan report for 192.168.1.162 [host down] Nmap scan report for 192.168.1.163 [host down] Nmap scan report for 192.168.1.164 [host down] Nmap scan report for 192.168.1.165 [host down] Nmap scan report for 192.168.1.166 [host down] Nmap scan report for 192.168.1.167 [host down] Nmap scan report for 192.168.1.168 [host down] Nmap scan report for 192.168.1.169 [host down] Nmap scan report for 192.168.1.170 [host down] Nmap scan report for 192.168.1.171 [host down] Nmap scan report for 192.168.1.172 [host down] Nmap scan report for 192.168.1.173 [host down] Nmap scan report for 192.168.1.174 [host down] Nmap scan report for 192.168.1.175 [host down] Nmap scan report for 192.168.1.176 [host down] Nmap scan report for 192.168.1.177 [host down] Nmap scan report for 192.168.1.178 [host down] Nmap scan report for 192.168.1.179 [host down] Nmap scan report for 192.168.1.180 [host down] Nmap scan report for 192.168.1.181 [host down] Nmap scan report for 192.168.1.182 [host down] Nmap scan report for 192.168.1.183 [host down] Nmap scan report for 192.168.1.184 [host down] Nmap scan report for 192.168.1.185 [host down] Nmap scan report for 192.168.1.186 [host down] Nmap scan report for 192.168.1.187 [host down] Nmap scan report for 192.168.1.188 [host down] Nmap scan report for 192.168.1.189 [host down] Nmap scan report for 192.168.1.190 [host down] Nmap scan report for 192.168.1.191 [host down] Nmap scan report for 192.168.1.192 [host down] Nmap scan report for 192.168.1.193 [host down] Nmap scan report for 192.168.1.194 [host down] Nmap scan report for 192.168.1.195 [host down] Nmap scan report for 192.168.1.196 [host down] Nmap scan report for 192.168.1.197 [host down] Nmap scan report for 192.168.1.198 [host down] Nmap scan report for 192.168.1.199 [host down] Nmap scan report for 192.168.1.200 [host down] Nmap scan report for 192.168.1.201 [host down] Nmap scan report for 192.168.1.202 [host down] Nmap scan report for 192.168.1.203 [host down] Nmap scan report for 192.168.1.204 [host down] Nmap scan report for 192.168.1.205 [host down] Nmap scan report for 192.168.1.206 [host down] Nmap scan report for 192.168.1.207 [host down] Nmap scan report for 192.168.1.208 [host down] Nmap scan report for 192.168.1.209 [host down] Nmap scan report for 192.168.1.210 [host down] Nmap scan report for 192.168.1.211 [host down] Nmap scan report for 192.168.1.212 [host down] Nmap scan report for 192.168.1.213 [host down] Nmap scan report for 192.168.1.214 [host down] Nmap scan report for 192.168.1.215 [host down] Nmap scan report for 192.168.1.216 [host down] Nmap scan report for 192.168.1.217 [host down] Nmap scan report for 192.168.1.218 [host down] Nmap scan report for 192.168.1.219 [host down] Nmap scan report for 192.168.1.220 [host down] Nmap scan report for 192.168.1.221 [host down] Nmap scan report for 192.168.1.222 [host down] Nmap scan report for 192.168.1.223 [host down] Nmap scan report for 192.168.1.224 [host down] Nmap scan report for 192.168.1.225 [host down] Nmap scan report for 192.168.1.226 [host down] Nmap scan report for 192.168.1.227 [host down] Nmap scan report for 192.168.1.228 [host down] Nmap scan report for 192.168.1.229 [host down] Nmap scan report for 192.168.1.230 [host down] Nmap scan report for 192.168.1.231 [host down] Nmap scan report for 192.168.1.232 [host down] Nmap scan report for 192.168.1.233 [host down] Nmap scan report for 192.168.1.234 [host down] Nmap scan report for 192.168.1.235 [host down] Nmap scan report for 192.168.1.236 [host down] Nmap scan report for 192.168.1.237 [host down] Nmap scan report for 192.168.1.238 [host down] Nmap scan report for 192.168.1.239 [host down] Nmap scan report for 192.168.1.240 [host down] Nmap scan report for 192.168.1.241 [host down] Nmap scan report for 192.168.1.242 [host down] Nmap scan report for 192.168.1.243 [host down] Nmap scan report for 192.168.1.244 [host down] Nmap scan report for 192.168.1.245 [host down] Nmap scan report for 192.168.1.246 [host down] Nmap scan report for 192.168.1.247 [host down] Nmap scan report for 192.168.1.248 [host down] Nmap scan report for 192.168.1.249 [host down] Nmap scan report for 192.168.1.250 [host down] Nmap scan report for 192.168.1.251 [host down] Nmap scan report for 192.168.1.252 [host down] Nmap scan report for 192.168.1.253 [host down] Nmap scan report for 192.168.1.254 [host down] Nmap scan report for 192.168.1.255 [host down] Initiating Parallel DNS resolution of 1 host. at 00:14 Completed Parallel DNS resolution of 1 host. at 00:14, 0.03s elapsed Initiating SYN Stealth Scan at 00:14 Scanning 192.168.1.1 [1 port] Discovered open port 80/tcp on 192.168.1.1 Completed SYN Stealth Scan at 00:14, 0.01s elapsed (1 total ports) Initiating UDP Scan at 00:14 Scanning 192.168.1.1 [1 port] Completed UDP Scan at 00:14, 0.23s elapsed (1 total ports) Initiating Service scan at 00:14 Scanning 2 services on 192.168.1.1 Completed Service scan at 00:16, 82.50s elapsed (2 services on 1 host) Initiating OS detection (try #1) against 192.168.1.1 NSE: Script scanning 192.168.1.1. Initiating NSE at 00:16
Offline
wkleiłem to
nmap -p 80 192.168.0.0./16 -sV
przeskanowałem Slow comprehensive scan i mi wyskoczyło .... co to może oznaczac?
Starting Nmap 6.40 ( http://nmap.org ) at 2014-02-01 00:11 W. Europe Standard Time NSE: Loaded 227 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 00:11 NSE: mtrace: A source IP must be provided through fromip argument. Completed NSE at 00:11, 10.56s elapsed Pre-scan script results: | broadcast-eigrp-discovery: |_ ERROR: Couldn't get an A.S value. | broadcast-igmp-discovery: | 192.168.1.102 | Interface: eth1 | Version: 2 | Group: 239.255.255.250 | Description: Organization-Local Scope (rfc2365) |_ Use the newtargets script-arg to add the results as targets | http-icloud-findmyiphone: |_ ERROR: No username or password was supplied | http-icloud-sendmsg: |_ ERROR: No username or password was supplied | targets-asn: |_ targets-asn.asn is a mandatory parameter Initiating Ping Scan at 00:11 Scanning 256 hosts [7 ports/host] Ping Scan Timing: About 16.77% done; ETC: 00:14 (0:02:34 remaining) Ping Scan Timing: About 32.95% done; ETC: 00:14 (0:02:04 remaining) Ping Scan Timing: About 49.14% done; ETC: 00:14 (0:01:34 remaining) Ping Scan Timing: About 65.68% done; ETC: 00:14 (0:01:03 remaining) Ping Scan Timing: About 81.86% done; ETC: 00:14 (0:00:33 remaining) Completed Ping Scan at 00:14, 186.20s elapsed (256 total hosts) Nmap scan report for 192.168.0.0. (192.168.0.0) [host down] Failed to resolve "nmap". get_srcaddr: can't connect socket: The requested address is not valid in its context. Nmap scan report for 192.168.0.1 [host down] Nmap scan report for 192.168.0.2 [host down] Nmap scan report for 192.168.0.3 [host down] Nmap scan report for 192.168.0.4 [host down] Nmap scan report for 192.168.0.5 [host down] Nmap scan report for 192.168.0.6 [host down] Nmap scan report for 192.168.0.7 [host down] Nmap scan report for 192.168.0.8 [host down] Nmap scan report for 192.168.0.9 [host down] Nmap scan report for 192.168.0.10 [host down] Nmap scan report for 192.168.0.11 [host down] Nmap scan report for 192.168.0.12 [host down] Nmap scan report for 192.168.0.13 [host down] Nmap scan report for 192.168.0.14 [host down] Nmap scan report for 192.168.0.15 [host down] Nmap scan report for 192.168.0.16 [host down] Nmap scan report for 192.168.0.17 [host down] Nmap scan report for 192.168.0.18 [host down] Nmap scan report for 192.168.0.19 [host down] Nmap scan report for 192.168.0.20 [host down] Nmap scan report for 192.168.0.21 [host down] Nmap scan report for 192.168.0.22 [host down] Nmap scan report for 192.168.0.23 [host down] Nmap scan report for 192.168.0.24 [host down] Nmap scan report for 192.168.0.25 [host down] Nmap scan report for 192.168.0.26 [host down] Nmap scan report for 192.168.0.27 [host down] Nmap scan report for 192.168.0.28 [host down] Nmap scan report for 192.168.0.29 [host down] Nmap scan report for 192.168.0.30 [host down] Nmap scan report for 192.168.0.31 [host down] Nmap scan report for 192.168.0.32 [host down] Nmap scan report for 192.168.0.33 [host down] Nmap scan report for 192.168.0.34 [host down] Nmap scan report for 192.168.0.35 [host down] Nmap scan report for 192.168.0.36 [host down] Nmap scan report for 192.168.0.37 [host down] Nmap scan report for 192.168.0.38 [host down] Nmap scan report for 192.168.0.39 [host down] Nmap scan report for 192.168.0.40 [host down] Nmap scan report for 192.168.0.41 [host down] Nmap scan report for 192.168.0.42 [host down] Nmap scan report for 192.168.0.43 [host down] Nmap scan report for 192.168.0.44 [host down] Nmap scan report for 192.168.0.45 [host down] Nmap scan report for 192.168.0.46 [host down] Nmap scan report for 192.168.0.47 [host down] Nmap scan report for 192.168.0.48 [host down] Nmap scan report for 192.168.0.49 [host down] Nmap scan report for 192.168.0.50 [host down] Nmap scan report for 192.168.0.51 [host down] Nmap scan report for 192.168.0.52 [host down] Nmap scan report for 192.168.0.53 [host down] Nmap scan report for 192.168.0.54 [host down] Nmap scan report for 192.168.0.55 [host down] Nmap scan report for 192.168.0.56 [host down] Nmap scan report for 192.168.0.57 [host down] Nmap scan report for 192.168.0.58 [host down] Nmap scan report for 192.168.0.59 [host down] Nmap scan report for 192.168.0.60 [host down] Nmap scan report for 192.168.0.61 [host down] Nmap scan report for 192.168.0.62 [host down] Nmap scan report for 192.168.0.63 [host down] Nmap scan report for 192.168.0.64 [host down] Nmap scan report for 192.168.0.65 [host down] Nmap scan report for 192.168.0.66 [host down] Nmap scan report for 192.168.0.67 [host down] Nmap scan report for 192.168.0.68 [host down] Nmap scan report for 192.168.0.69 [host down] Nmap scan report for 192.168.0.70 [host down] Nmap scan report for 192.168.0.71 [host down] Nmap scan report for 192.168.0.72 [host down] Nmap scan report for 192.168.0.73 [host down] Nmap scan report for 192.168.0.74 [host down] Nmap scan report for 192.168.0.75 [host down] Nmap scan report for 192.168.0.76 [host down] Nmap scan report for 192.168.0.77 [host down] Nmap scan report for 192.168.0.78 [host down] Nmap scan report for 192.168.0.79 [host down] Nmap scan report for 192.168.0.80 [host down] Nmap scan report for 192.168.0.81 [host down] Nmap scan report for 192.168.0.82 [host down] Nmap scan report for 192.168.0.83 [host down] Nmap scan report for 192.168.0.84 [host down] Nmap scan report for 192.168.0.85 [host down] Nmap scan report for 192.168.0.86 [host down] Nmap scan report for 192.168.0.87 [host down] Nmap scan report for 192.168.0.88 [host down] Nmap scan report for 192.168.0.89 [host down] Nmap scan report for 192.168.0.90 [host down] Nmap scan report for 192.168.0.91 [host down] Nmap scan report for 192.168.0.92 [host down] Nmap scan report for 192.168.0.93 [host down] Nmap scan report for 192.168.0.94 [host down] Nmap scan report for 192.168.0.95 [host down] Nmap scan report for 192.168.0.96 [host down] Nmap scan report for 192.168.0.97 [host down] Nmap scan report for 192.168.0.98 [host down] Nmap scan report for 192.168.0.99 [host down] Nmap scan report for 192.168.0.100 [host down] Nmap scan report for 192.168.0.101 [host down] Nmap scan report for 192.168.0.102 [host down] Nmap scan report for 192.168.0.103 [host down] Nmap scan report for 192.168.0.104 [host down] Nmap scan report for 192.168.0.105 [host down] Nmap scan report for 192.168.0.106 [host down] Nmap scan report for 192.168.0.107 [host down] Nmap scan report for 192.168.0.108 [host down] Nmap scan report for 192.168.0.109 [host down] Nmap scan report for 192.168.0.110 [host down] Nmap scan report for 192.168.0.111 [host down] Nmap scan report for 192.168.0.112 [host down] Nmap scan report for 192.168.0.113 [host down] Nmap scan report for 192.168.0.114 [host down] Nmap scan report for 192.168.0.115 [host down] Nmap scan report for 192.168.0.116 [host down] Nmap scan report for 192.168.0.117 [host down] Nmap scan report for 192.168.0.118 [host down] Nmap scan report for 192.168.0.119 [host down] Nmap scan report for 192.168.0.120 [host down] Nmap scan report for 192.168.0.121 [host down] Nmap scan report for 192.168.0.122 [host down] Nmap scan report for 192.168.0.123 [host down] Nmap scan report for 192.168.0.124 [host down] Nmap scan report for 192.168.0.125 [host down] Nmap scan report for 192.168.0.126 [host down] Nmap scan report for 192.168.0.127 [host down] Nmap scan report for 192.168.0.128 [host down] Nmap scan report for 192.168.0.129 [host down] Nmap scan report for 192.168.0.130 [host down] Nmap scan report for 192.168.0.131 [host down] Nmap scan report for 192.168.0.132 [host down] Nmap scan report for 192.168.0.133 [host down] Nmap scan report for 192.168.0.134 [host down] Nmap scan report for 192.168.0.135 [host down] Nmap scan report for 192.168.0.136 [host down] Nmap scan report for 192.168.0.137 [host down] Nmap scan report for 192.168.0.138 [host down] Nmap scan report for 192.168.0.139 [host down] Nmap scan report for 192.168.0.140 [host down] Nmap scan report for 192.168.0.141 [host down] Nmap scan report for 192.168.0.142 [host down] Nmap scan report for 192.168.0.143 [host down] Nmap scan report for 192.168.0.144 [host down] Nmap scan report for 192.168.0.145 [host down] Nmap scan report for 192.168.0.146 [host down] Nmap scan report for 192.168.0.147 [host down] Nmap scan report for 192.168.0.148 [host down] Nmap scan report for 192.168.0.149 [host down] Nmap scan report for 192.168.0.150 [host down] Nmap scan report for 192.168.0.151 [host down] Nmap scan report for 192.168.0.152 [host down] Nmap scan report for 192.168.0.153 [host down] Nmap scan report for 192.168.0.154 [host down] Nmap scan report for 192.168.0.155 [host down] Nmap scan report for 192.168.0.156 [host down] Nmap scan report for 192.168.0.157 [host down] Nmap scan report for 192.168.0.158 [host down] Nmap scan report for 192.168.0.159 [host down] Nmap scan report for 192.168.0.160 [host down] Nmap scan report for 192.168.0.161 [host down] Nmap scan report for 192.168.0.162 [host down] Nmap scan report for 192.168.0.163 [host down] Nmap scan report for 192.168.0.164 [host down] Nmap scan report for 192.168.0.165 [host down] Nmap scan report for 192.168.0.166 [host down] Nmap scan report for 192.168.0.167 [host down] Nmap scan report for 192.168.0.168 [host down] Nmap scan report for 192.168.0.169 [host down] Nmap scan report for 192.168.0.170 [host down] Nmap scan report for 192.168.0.171 [host down] Nmap scan report for 192.168.0.172 [host down] Nmap scan report for 192.168.0.173 [host down] Nmap scan report for 192.168.0.174 [host down] Nmap scan report for 192.168.0.175 [host down] Nmap scan report for 192.168.0.176 [host down] Nmap scan report for 192.168.0.177 [host down] Nmap scan report for 192.168.0.178 [host down] Nmap scan report for 192.168.0.179 [host down] Nmap scan report for 192.168.0.180 [host down] Nmap scan report for 192.168.0.181 [host down] Nmap scan report for 192.168.0.182 [host down] Nmap scan report for 192.168.0.183 [host down] Nmap scan report for 192.168.0.184 [host down] Nmap scan report for 192.168.0.185 [host down] Nmap scan report for 192.168.0.186 [host down] Nmap scan report for 192.168.0.187 [host down] Nmap scan report for 192.168.0.188 [host down] Nmap scan report for 192.168.0.189 [host down] Nmap scan report for 192.168.0.190 [host down] Nmap scan report for 192.168.0.191 [host down] Nmap scan report for 192.168.0.192 [host down] Nmap scan report for 192.168.0.193 [host down] Nmap scan report for 192.168.0.194 [host down] Nmap scan report for 192.168.0.195 [host down] Nmap scan report for 192.168.0.196 [host down] Nmap scan report for 192.168.0.197 [host down] Nmap scan report for 192.168.0.198 [host down] Nmap scan report for 192.168.0.199 [host down] Nmap scan report for 192.168.0.200 [host down] Nmap scan report for 192.168.0.201 [host down] Nmap scan report for 192.168.0.202 [host down] Nmap scan report for 192.168.0.203 [host down] Nmap scan report for 192.168.0.204 [host down] Nmap scan report for 192.168.0.205 [host down] Nmap scan report for 192.168.0.206 [host down] Nmap scan report for 192.168.0.207 [host down] Nmap scan report for 192.168.0.208 [host down] Nmap scan report for 192.168.0.209 [host down] Nmap scan report for 192.168.0.210 [host down] Nmap scan report for 192.168.0.211 [host down] Nmap scan report for 192.168.0.212 [host down] Nmap scan report for 192.168.0.213 [host down] Nmap scan report for 192.168.0.214 [host down] Nmap scan report for 192.168.0.215 [host down] Nmap scan report for 192.168.0.216 [host down] Nmap scan report for 192.168.0.217 [host down] Nmap scan report for 192.168.0.218 [host down] Nmap scan report for 192.168.0.219 [host down] Nmap scan report for 192.168.0.220 [host down] Nmap scan report for 192.168.0.221 [host down] Nmap scan report for 192.168.0.222 [host down] Nmap scan report for 192.168.0.223 [host down] Nmap scan report for 192.168.0.224 [host down] Nmap scan report for 192.168.0.225 [host down] Nmap scan report for 192.168.0.226 [host down] Nmap scan report for 192.168.0.227 [host down] Nmap scan report for 192.168.0.228 [host down] Nmap scan report for 192.168.0.229 [host down] Nmap scan report for 192.168.0.230 [host down] Nmap scan report for 192.168.0.231 [host down] Nmap scan report for 192.168.0.232 [host down] Nmap scan report for 192.168.0.233 [host down] Nmap scan report for 192.168.0.234 [host down] Nmap scan report for 192.168.0.235 [host down] Nmap scan report for 192.168.0.236 [host down] Nmap scan report for 192.168.0.237 [host down] Nmap scan report for 192.168.0.238 [host down] Nmap scan report for 192.168.0.239 [host down] Nmap scan report for 192.168.0.240 [host down] Nmap scan report for 192.168.0.241 [host down] Nmap scan report for 192.168.0.242 [host down] Nmap scan report for 192.168.0.243 [host down] Nmap scan report for 192.168.0.244 [host down] Nmap scan report for 192.168.0.245 [host down] Nmap scan report for 192.168.0.246 [host down] Nmap scan report for 192.168.0.247 [host down] Nmap scan report for 192.168.0.248 [host down] Nmap scan report for 192.168.0.249 [host down] Nmap scan report for 192.168.0.250 [host down] Nmap scan report for 192.168.0.251 [host down] Nmap scan report for 192.168.0.252 [host down] Nmap scan report for 192.168.0.253 [host down] Nmap scan report for 192.168.0.254 [host down] Nmap scan report for 192.168.0.255 [host down] Initiating ARP Ping Scan at 00:14 Scanning 255 hosts [1 port/host] Completed ARP Ping Scan at 00:14, 2.95s elapsed (255 total hosts) Initiating Parallel DNS resolution of 255 hosts. at 00:14 Completed Parallel DNS resolution of 255 hosts. at 00:14, 0.03s elapsed Nmap scan report for 192.168.1.0 [host down] Nmap scan report for 192.168.1.2 [host down] Nmap scan report for 192.168.1.3 [host down] Nmap scan report for 192.168.1.4 [host down] Nmap scan report for 192.168.1.5 [host down] Nmap scan report for 192.168.1.6 [host down] Nmap scan report for 192.168.1.7 [host down] Nmap scan report for 192.168.1.8 [host down] Nmap scan report for 192.168.1.9 [host down] Nmap scan report for 192.168.1.10 [host down] Nmap scan report for 192.168.1.11 [host down] Nmap scan report for 192.168.1.12 [host down] Nmap scan report for 192.168.1.13 [host down] Nmap scan report for 192.168.1.14 [host down] Nmap scan report for 192.168.1.15 [host down] Nmap scan report for 192.168.1.16 [host down] Nmap scan report for 192.168.1.17 [host down] Nmap scan report for 192.168.1.18 [host down] Nmap scan report for 192.168.1.19 [host down] Nmap scan report for 192.168.1.20 [host down] Nmap scan report for 192.168.1.21 [host down] Nmap scan report for 192.168.1.22 [host down] Nmap scan report for 192.168.1.23 [host down] Nmap scan report for 192.168.1.24 [host down] Nmap scan report for 192.168.1.25 [host down] Nmap scan report for 192.168.1.26 [host down] Nmap scan report for 192.168.1.27 [host down] Nmap scan report for 192.168.1.28 [host down] Nmap scan report for 192.168.1.29 [host down] Nmap scan report for 192.168.1.30 [host down] Nmap scan report for 192.168.1.31 [host down] Nmap scan report for 192.168.1.32 [host down] Nmap scan report for 192.168.1.33 [host down] Nmap scan report for 192.168.1.34 [host down] Nmap scan report for 192.168.1.35 [host down] Nmap scan report for 192.168.1.36 [host down] Nmap scan report for 192.168.1.37 [host down] Nmap scan report for 192.168.1.38 [host down] Nmap scan report for 192.168.1.39 [host down] Nmap scan report for 192.168.1.40 [host down] Nmap scan report for 192.168.1.41 [host down] Nmap scan report for 192.168.1.42 [host down] Nmap scan report for 192.168.1.43 [host down] Nmap scan report for 192.168.1.44 [host down] Nmap scan report for 192.168.1.45 [host down] Nmap scan report for 192.168.1.46 [host down] Nmap scan report for 192.168.1.47 [host down] Nmap scan report for 192.168.1.48 [host down] Nmap scan report for 192.168.1.49 [host down] Nmap scan report for 192.168.1.50 [host down] Nmap scan report for 192.168.1.51 [host down] Nmap scan report for 192.168.1.52 [host down] Nmap scan report for 192.168.1.53 [host down] Nmap scan report for 192.168.1.54 [host down] Nmap scan report for 192.168.1.55 [host down] Nmap scan report for 192.168.1.56 [host down] Nmap scan report for 192.168.1.57 [host down] Nmap scan report for 192.168.1.58 [host down] Nmap scan report for 192.168.1.59 [host down] Nmap scan report for 192.168.1.60 [host down] Nmap scan report for 192.168.1.61 [host down] Nmap scan report for 192.168.1.62 [host down] Nmap scan report for 192.168.1.63 [host down] Nmap scan report for 192.168.1.64 [host down] Nmap scan report for 192.168.1.65 [host down] Nmap scan report for 192.168.1.66 [host down] Nmap scan report for 192.168.1.67 [host down] Nmap scan report for 192.168.1.68 [host down] Nmap scan report for 192.168.1.69 [host down] Nmap scan report for 192.168.1.70 [host down] Nmap scan report for 192.168.1.71 [host down] Nmap scan report for 192.168.1.72 [host down] Nmap scan report for 192.168.1.73 [host down] Nmap scan report for 192.168.1.74 [host down] Nmap scan report for 192.168.1.75 [host down] Nmap scan report for 192.168.1.76 [host down] Nmap scan report for 192.168.1.77 [host down] Nmap scan report for 192.168.1.78 [host down] Nmap scan report for 192.168.1.79 [host down] Nmap scan report for 192.168.1.80 [host down] Nmap scan report for 192.168.1.81 [host down] Nmap scan report for 192.168.1.82 [host down] Nmap scan report for 192.168.1.83 [host down] Nmap scan report for 192.168.1.84 [host down] Nmap scan report for 192.168.1.85 [host down] Nmap scan report for 192.168.1.86 [host down] Nmap scan report for 192.168.1.87 [host down] Nmap scan report for 192.168.1.88 [host down] Nmap scan report for 192.168.1.89 [host down] Nmap scan report for 192.168.1.90 [host down] Nmap scan report for 192.168.1.91 [host down] Nmap scan report for 192.168.1.92 [host down] Nmap scan report for 192.168.1.93 [host down] Nmap scan report for 192.168.1.94 [host down] Nmap scan report for 192.168.1.95 [host down] Nmap scan report for 192.168.1.96 [host down] Nmap scan report for 192.168.1.97 [host down] Nmap scan report for 192.168.1.98 [host down] Nmap scan report for 192.168.1.99 [host down] Nmap scan report for 192.168.1.100 [host down] Nmap scan report for 192.168.1.101 [host down] Nmap scan report for 192.168.1.103 [host down] Nmap scan report for 192.168.1.104 [host down] Nmap scan report for 192.168.1.105 [host down] Nmap scan report for 192.168.1.106 [host down] Nmap scan report for 192.168.1.107 [host down] Nmap scan report for 192.168.1.108 [host down] Nmap scan report for 192.168.1.109 [host down] Nmap scan report for 192.168.1.110 [host down] Nmap scan report for 192.168.1.111 [host down] Nmap scan report for 192.168.1.112 [host down] Nmap scan report for 192.168.1.113 [host down] Nmap scan report for 192.168.1.114 [host down] Nmap scan report for 192.168.1.115 [host down] Nmap scan report for 192.168.1.116 [host down] Nmap scan report for 192.168.1.117 [host down] Nmap scan report for 192.168.1.118 [host down] Nmap scan report for 192.168.1.119 [host down] Nmap scan report for 192.168.1.120 [host down] Nmap scan report for 192.168.1.121 [host down] Nmap scan report for 192.168.1.122 [host down] Nmap scan report for 192.168.1.123 [host down] Nmap scan report for 192.168.1.124 [host down] Nmap scan report for 192.168.1.125 [host down] Nmap scan report for 192.168.1.126 [host down] Nmap scan report for 192.168.1.127 [host down] Nmap scan report for 192.168.1.128 [host down] Nmap scan report for 192.168.1.129 [host down] Nmap scan report for 192.168.1.130 [host down] Nmap scan report for 192.168.1.131 [host down] Nmap scan report for 192.168.1.132 [host down] Nmap scan report for 192.168.1.133 [host down] Nmap scan report for 192.168.1.134 [host down] Nmap scan report for 192.168.1.135 [host down] Nmap scan report for 192.168.1.136 [host down] Nmap scan report for 192.168.1.137 [host down] Nmap scan report for 192.168.1.138 [host down] Nmap scan report for 192.168.1.139 [host down] Nmap scan report for 192.168.1.140 [host down] Nmap scan report for 192.168.1.141 [host down] Nmap scan report for 192.168.1.142 [host down] Nmap scan report for 192.168.1.143 [host down] Nmap scan report for 192.168.1.144 [host down] Nmap scan report for 192.168.1.145 [host down] Nmap scan report for 192.168.1.146 [host down] Nmap scan report for 192.168.1.147 [host down] Nmap scan report for 192.168.1.148 [host down] Nmap scan report for 192.168.1.149 [host down] Nmap scan report for 192.168.1.150 [host down] Nmap scan report for 192.168.1.151 [host down] Nmap scan report for 192.168.1.152 [host down] Nmap scan report for 192.168.1.153 [host down] Nmap scan report for 192.168.1.154 [host down] Nmap scan report for 192.168.1.155 [host down] Nmap scan report for 192.168.1.156 [host down] Nmap scan report for 192.168.1.157 [host down] Nmap scan report for 192.168.1.158 [host down] Nmap scan report for 192.168.1.159 [host down] Nmap scan report for 192.168.1.160 [host down] Nmap scan report for 192.168.1.161 [host down] Nmap scan report for 192.168.1.162 [host down] Nmap scan report for 192.168.1.163 [host down] Nmap scan report for 192.168.1.164 [host down] Nmap scan report for 192.168.1.165 [host down] Nmap scan report for 192.168.1.166 [host down] Nmap scan report for 192.168.1.167 [host down] Nmap scan report for 192.168.1.168 [host down] Nmap scan report for 192.168.1.169 [host down] Nmap scan report for 192.168.1.170 [host down] Nmap scan report for 192.168.1.171 [host down] Nmap scan report for 192.168.1.172 [host down] Nmap scan report for 192.168.1.173 [host down] Nmap scan report for 192.168.1.174 [host down] Nmap scan report for 192.168.1.175 [host down] Nmap scan report for 192.168.1.176 [host down] Nmap scan report for 192.168.1.177 [host down] Nmap scan report for 192.168.1.178 [host down] Nmap scan report for 192.168.1.179 [host down] Nmap scan report for 192.168.1.180 [host down] Nmap scan report for 192.168.1.181 [host down] Nmap scan report for 192.168.1.182 [host down] Nmap scan report for 192.168.1.183 [host down] Nmap scan report for 192.168.1.184 [host down] Nmap scan report for 192.168.1.185 [host down] Nmap scan report for 192.168.1.186 [host down] Nmap scan report for 192.168.1.187 [host down] Nmap scan report for 192.168.1.188 [host down] Nmap scan report for 192.168.1.189 [host down] Nmap scan report for 192.168.1.190 [host down] Nmap scan report for 192.168.1.191 [host down] Nmap scan report for 192.168.1.192 [host down] Nmap scan report for 192.168.1.193 [host down] Nmap scan report for 192.168.1.194 [host down] Nmap scan report for 192.168.1.195 [host down] Nmap scan report for 192.168.1.196 [host down] Nmap scan report for 192.168.1.197 [host down] Nmap scan report for 192.168.1.198 [host down] Nmap scan report for 192.168.1.199 [host down] Nmap scan report for 192.168.1.200 [host down] Nmap scan report for 192.168.1.201 [host down] Nmap scan report for 192.168.1.202 [host down] Nmap scan report for 192.168.1.203 [host down] Nmap scan report for 192.168.1.204 [host down] Nmap scan report for 192.168.1.205 [host down] Nmap scan report for 192.168.1.206 [host down] Nmap scan report for 192.168.1.207 [host down] Nmap scan report for 192.168.1.208 [host down] Nmap scan report for 192.168.1.209 [host down] Nmap scan report for 192.168.1.210 [host down] Nmap scan report for 192.168.1.211 [host down] Nmap scan report for 192.168.1.212 [host down] Nmap scan report for 192.168.1.213 [host down] Nmap scan report for 192.168.1.214 [host down] Nmap scan report for 192.168.1.215 [host down] Nmap scan report for 192.168.1.216 [host down] Nmap scan report for 192.168.1.217 [host down] Nmap scan report for 192.168.1.218 [host down] Nmap scan report for 192.168.1.219 [host down] Nmap scan report for 192.168.1.220 [host down] Nmap scan report for 192.168.1.221 [host down] Nmap scan report for 192.168.1.222 [host down] Nmap scan report for 192.168.1.223 [host down] Nmap scan report for 192.168.1.224 [host down] Nmap scan report for 192.168.1.225 [host down] Nmap scan report for 192.168.1.226 [host down] Nmap scan report for 192.168.1.227 [host down] Nmap scan report for 192.168.1.228 [host down] Nmap scan report for 192.168.1.229 [host down] Nmap scan report for 192.168.1.230 [host down] Nmap scan report for 192.168.1.231 [host down] Nmap scan report for 192.168.1.232 [host down] Nmap scan report for 192.168.1.233 [host down] Nmap scan report for 192.168.1.234 [host down] Nmap scan report for 192.168.1.235 [host down] Nmap scan report for 192.168.1.236 [host down] Nmap scan report for 192.168.1.237 [host down] Nmap scan report for 192.168.1.238 [host down] Nmap scan report for 192.168.1.239 [host down] Nmap scan report for 192.168.1.240 [host down] Nmap scan report for 192.168.1.241 [host down] Nmap scan report for 192.168.1.242 [host down] Nmap scan report for 192.168.1.243 [host down] Nmap scan report for 192.168.1.244 [host down] Nmap scan report for 192.168.1.245 [host down] Nmap scan report for 192.168.1.246 [host down] Nmap scan report for 192.168.1.247 [host down] Nmap scan report for 192.168.1.248 [host down] Nmap scan report for 192.168.1.249 [host down] Nmap scan report for 192.168.1.250 [host down] Nmap scan report for 192.168.1.251 [host down] Nmap scan report for 192.168.1.252 [host down] Nmap scan report for 192.168.1.253 [host down] Nmap scan report for 192.168.1.254 [host down] Nmap scan report for 192.168.1.255 [host down] Initiating Parallel DNS resolution of 1 host. at 00:14 Completed Parallel DNS resolution of 1 host. at 00:14, 0.03s elapsed Initiating SYN Stealth Scan at 00:14 Scanning 192.168.1.1 [1 port] Discovered open port 80/tcp on 192.168.1.1 Completed SYN Stealth Scan at 00:14, 0.01s elapsed (1 total ports) Initiating UDP Scan at 00:14 Scanning 192.168.1.1 [1 port] Completed UDP Scan at 00:14, 0.23s elapsed (1 total ports) Initiating Service scan at 00:14 Scanning 2 services on 192.168.1.1 Completed Service scan at 00:16, 82.50s elapsed (2 services on 1 host) Initiating OS detection (try #1) against 192.168.1.1 NSE: Script scanning 192.168.1.1. Initiating NSE at 00:16 Completed NSE at 00:16, 30.58s elapsed Nmap scan report for 192.168.1.1 Host is up (0.0025s latency). PORT STATE SERVICE VERSION 80/tcp open http TP-LINK WR340G WAP http config | http-auth-finder: | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.1.1 | url method |_ http://192.168.1.1:80/ HTTP: Basic | http-comments-displayer: | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.1.1 | | Path: http://192.168.1.1:80/ | Line number: 1 | Comment: | <!--Web Server Error Report:<HR> | <H1>Server Error: 401 N/A</H1> |_ Operating System Error Nr:3997698: HTM <P><HR><H2>Access denied</H2><P><P><HR><H1>/userRpm/Index.htm</H1><P>--> |_http-google-malware: [ERROR] No API key found. Update the variable APIKEY in http-google-malware or set it in the argument http-google-malware.api | http-grep: |_ ERROR: Argument http-grep.match was not set | http-headers: | Server: Router | Connection: close | WWW-Authenticate: Basic realm="TP-LINK Wireless Router WR340G" | Content-Type: text/html | |_ (Request type: GET) |_http-methods: No Allow or Public header in OPTIONS response (status code 401) |_http-title: Login Incorrect |_http-traceroute: ERROR: Script execution failed (use -d to debug) 80/udp open|filtered http MAC Address: 54:E6:FC:E9:3B:62 (Tp-link Technologies CO.) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: media device|broadband router|general purpose Running: VBrick embedded, Westell embedded, Wind River VxWorks OS CPE: cpe:/h:vbrick:4300 cpe:/h:westell:wirespeed_6100 cpe:/o:windriver:vxworks OS details: VBrick 4300 video encoder, Westell WireSpeed Dual Connect 6100 DSL router, VxWorks Uptime guess: 0.440 days (since Fri Jan 31 13:42:54 2014) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=151 (Good luck!) IP ID Sequence Generation: Incremental Service Info: Device: WAP Host script results: | firewalk: | HOP HOST PROTOCOL BLOCKED PORTS |_0 192.168.1.102 udp 80 |_ipidseq: Unknown | traceroute-geolocation: | HOP RTT ADDRESS GEOLOCATION |_ 1 2.46 192.168.1.1 - ,- TRACEROUTE HOP RTT ADDRESS 1 2.46 ms 192.168.1.1 Initiating Ping Scan at 00:16 Scanning 4096 hosts [7 ports/host] Ping Scan Timing: About 1.00% done Ping Scan Timing: About 2.01% done; ETC: 01:07 (0:49:33 remaining)
Offline
[b]Pomocnik[/b]: wystarczy w jednym wątku poruszyć dany problem. Pisz już tutaj, logi, polecenia itp. umieszczaj w tagach code: http://forum.dug.net.pl/help.php
Offline
Completed Service scan at 00:16, 82.50s elapsed (2 services on 1 host) Initiating OS detection (try #1) against 192.168.1.1 NSE: Script scanning 192.168.1.1. Initiating NSE at 00:16 Completed NSE at 00:16, 30.58s elapsed Nmap scan report for 192.168.1.1 Host is up (0.0025s latency). PORT STATE SERVICE VERSION 80/tcp open http TP-LINK WR340G WAP http config | http-auth-finder: | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.1.1 | url method |_ http://192.168.1.1:80/ HTTP: Basic | http-comments-displayer: | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.1.1 | | Path: http://192.168.1.1:80/ | Line number: 1 | Comment: | <!--Web Server Error Report:<HR> | <H1>Server Error: 401 N/A</H1> |_ Operating System Error Nr:3997698: HTM <P><HR><H2>Access denied</H2><P><P><HR><H1>/userRpm/Index.htm</H1><P>--> |_http-google-malware: [ERROR] No API key found. Update the variable APIKEY in http-google-malware or set it in the argument http-google-malware.api | http-grep: |_ ERROR: Argument http-grep.match was not set | http-headers: | Server: Router | Connection: close | WWW-Authenticate: Basic realm="TP-LINK Wireless Router WR340G" | Content-Type: text/html | |_ (Request type: GET) |_http-methods: No Allow or Public header in OPTIONS response (status code 401) |_http-title: Login Incorrect |_http-traceroute: ERROR: Script execution failed (use -d to debug) 80/udp open|filtered http MAC Address: 54:E6:FC:E9:3B:62 (Tp-link Technologies CO.) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: media device|broadband router|general purpose Running: VBrick embedded, Westell embedded, Wind River VxWorks OS CPE: cpe:/h:vbrick:4300 cpe:/h:westell:wirespeed_6100 cpe:/o:windriver:vxworks OS details: VBrick 4300 video encoder, Westell WireSpeed Dual Connect 6100 DSL router, VxWorks Uptime guess: 0.440 days (since Fri Jan 31 13:42:54 2014) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=151 (Good luck!) IP ID Sequence Generation: Incremental Service Info: Device: WAP Host script results: | firewalk: | HOP HOST PROTOCOL BLOCKED PORTS |_0 192.168.1.102 udp 80 |_ipidseq: Unknown | traceroute-geolocation: | HOP RTT ADDRESS GEOLOCATION |_ 1 2.46 192.168.1.1 - ,- TRACEROUTE HOP RTT ADDRESS 1 2.46 ms 192.168.1.1 Initiating Ping Scan at 00:16 Scanning 4096 hosts [7 ports/host] Ping Scan Timing: About 1.00% done Ping Scan Timing: About 2.01% done; ETC: 01:07 (0:49:33 remaining) Ping Scan Timing: About 6.32% done; ETC: 01:07 (0:46:57 remaining) Ping Scan Timing: About 10.95% done; ETC: 01:06 (0:44:27 remaining) Ping Scan Timing: About 15.89% done; ETC: 01:06 (0:41:55 remaining) Ping Scan Timing: About 20.74% done; ETC: 01:06 (0:39:25 remaining)
Offline
[b]Pomocnik[/b]: wystarczy w jednym wątku poruszyć dany problem. Pisz już tutaj, logi, polecenia itp. umieszczaj w tagach code: http://forum.dug.net.pl/help.php
Offline
No zakręcony jest kolega trochę. :)
Offline
okiej wybaczcie jestem nowym laikiem...
Offline
Masz jakiegoś dziwnego tego nmapa, to na Windows?
Spróbuj innej wersji - 6.25 na przykład, bo ta nowa 6.40 jest dość dziwna.
Albo przynajmniej wklejaj dokładne polecenie, jakie wrzucasz, bo ta tona jakichś komentarzy, to coś, co widzę pierwszy raz w życiu.
Ostatnio edytowany przez Jacekalex (2014-01-31 00:55:00)
Offline
Mam pytanie a propo procesów, czy mógłby ktoś luknąc i napisac które z nich są zbędne ?
Jakie porty powinienem zamknąc aby komputer był bezpieczniejszy i jakie procesy są zbędne?
cli.exe 676 TCP 1025 127.0.0.1 0.0.0.0 Listening C:\Program Files\ATI Technologies\ATI.ACE\cli.exe Catalyst Control Centre CLI Application (Command Line Interface) 1.11.0.0 ATI Technologies Inc. 2014-01-31 16:04:41 DAWID-1\Kameleon A 2014-02-01 00:48:51
cli.exe 3088 TCP 1031 127.0.0.1 0.0.0.0 Listening C:\Program Files\ATI Technologies\ATI.ACE\cli.exe Catalyst Control Centre CLI Application (Command Line Interface) 1.11.0.0 ATI Technologies Inc. 2014-01-31 16:05:29 DAWID-1\Kameleon A 2014-02-01 00:48:51
firefox.exe 3968 TCP 2698 192.168.1.102 80 http 213.189.45.99 host-213.189.45.99.ggc.com Established C:\Program Files\Mozilla Firefox\firefox.exe Firefox Firefox 26.0 Mozilla Corporation 2014-01-31 20:32:39 DAWID-1\Kameleon A 2014-02-01 00:48:51 C:\Program Files\Mozilla Firefox\nss3.dll currports opis programu - Szukaj w Google - Mozilla Firefox
firefox.exe 3968 TCP 2462 192.168.1.102 80 http 213.189.45.99 host-213.189.45.99.ggc.com Established C:\Program Files\Mozilla Firefox\firefox.exe Firefox Firefox 26.0 Mozilla Corporation 2014-01-31 20:32:39 DAWID-1\Kameleon A 2014-02-01 00:48:51 C:\Program Files\Mozilla Firefox\nss3.dll currports opis programu - Szukaj w Google - Mozilla Firefox
firefox.exe 3968 TCP 1395 127.0.0.1 1394 127.0.0.1 localhost Established C:\Program Files\Mozilla Firefox\firefox.exe Firefox Firefox 26.0 Mozilla Corporation 2014-01-31 20:32:39 DAWID-1\Kameleon A 2014-02-01 00:48:51 C:\Program Files\Mozilla Firefox\nss3.dll currports opis programu - Szukaj w Google - Mozilla Firefox
firefox.exe 3968 TCP 1394 127.0.0.1 1395 127.0.0.1 localhost Established C:\Program Files\Mozilla Firefox\firefox.exe Firefox Firefox 26.0 Mozilla Corporation 2014-01-31 20:32:39 DAWID-1\Kameleon A 2014-02-01 00:48:51 C:\Program Files\Mozilla Firefox\nss3.dll currports opis programu - Szukaj w Google - Mozilla Firefox
lsass.exe 968 UDP 500 isakmp 0.0.0.0 C:\WINDOWS\system32\lsass.exe Microsoft® Windows® Operating System LSA Shell (Export Version) 5.1.2600.5508 (xpsp.080320-1631) Microsoft Corporation 2014-01-31 16:04:17 NT AUTHORITY\SYSTEM PolicyAgent, ProtectedStorage, SamSs A 2014-02-01 00:48:51 C:\WINDOWS\system32\oakley.DLL
lsass.exe 968 UDP 4500 0.0.0.0 C:\WINDOWS\system32\lsass.exe Microsoft® Windows® Operating System LSA Shell (Export Version) 5.1.2600.5508 (xpsp.080320-1631) Microsoft Corporation 2014-01-31 16:04:17 NT AUTHORITY\SYSTEM PolicyAgent, ProtectedStorage, SamSs A 2014-02-01 00:48:51 C:\WINDOWS\system32\oakley.DLL
N360.exe 1364 TCP 1028 127.0.0.1 0.0.0.0 Listening C:\Program Files\Norton 360\Engine\21.1.0.18\N360.exe Norton 360 Norton 360 12.11.0.16 Symantec Corporation 2014-01-31 16:04:52 N360 AR 2014-02-01 00:48:51 C:\Program Files\Norton 360\Engine\21.1.0.18\ccL120U.dll
svchost.exe 1244 TCP 135 epmap 0.0.0.0 0.0.0.0 Listening C:\WINDOWS\system32\svchost.exe Microsoft® Windows® Operating System Generic Host Process for Win32 Services 5.1.2600.5508 (xpsp.080320-1628) Microsoft Corporation 2014-01-31 16:04:20 RpcSs A 2014-02-01 00:48:51 C:\WINDOWS\system32\RPCRT4.dll
svchost.exe 1284 UDP 123 ntp 192.168.1.102 C:\WINDOWS\system32\svchost.exe Microsoft® Windows® Operating System Generic Host Process for Win32 Services 5.1.2600.5508 (xpsp.080320-1628) Microsoft Corporation 2014-01-31 16:04:21 NT AUTHORITY\SYSTEM AudioSrv, Browser, CryptSvc, Dhcp, dmserver, ERSvc, EventSystem, FastUserSwitchingCompatibility, helpsvc, LanmanServer, lanmanworkstation, Netman, Nla, RasMan, Schedule A 2014-02-01 00:48:51 c:\windows\system32\w32time.dll
svchost.exe 1384 UDP 2493 0.0.0.0 C:\WINDOWS\system32\svchost.exe Microsoft® Windows® Operating System Generic Host Process for Win32 Services 5.1.2600.5508 (xpsp.080320-1628) Microsoft Corporation 2014-01-31 16:04:22 Dnscache A 2014-02-01 00:48:51 c:\windows\system32\DNSAPI.dll
svchost.exe 1384 UDP 3847 0.0.0.0 C:\WINDOWS\system32\svchost.exe Microsoft® Windows® Operating System Generic Host Process for Win32 Services 5.1.2600.5508 (xpsp.080320-1628) Microsoft Corporation 2014-01-31 16:04:22 Dnscache A 2014-02-01 00:48:51 c:\windows\system32\DNSAPI.dll
svchost.exe 1384 UDP 2490 0.0.0.0 C:\WINDOWS\system32\svchost.exe Microsoft® Windows® Operating System Generic Host Process for Win32 Services 5.1.2600.5508 (xpsp.080320-1628) Microsoft Corporation 2014-01-31 16:04:22 Dnscache A 2014-02-01 00:48:51 c:\windows\system32\DNSAPI.dll
svchost.exe 1384 UDP 2494 0.0.0.0 C:\WINDOWS\system32\svchost.exe Microsoft® Windows® Operating System Generic Host Process for Win32 Services 5.1.2600.5508 (xpsp.080320-1628) Microsoft Corporation 2014-01-31 16:04:22 Dnscache A 2014-02-01 00:48:51 c:\windows\system32\DNSAPI.dll
svchost.exe 1480 UDP 1900 192.168.1.102 C:\WINDOWS\system32\svchost.exe Microsoft® Windows® Operating System Generic Host Process for Win32 Services 5.1.2600.5508 (xpsp.080320-1628) Microsoft Corporation 2014-01-31 16:04:22 LmHosts, RemoteRegistry, SSDPSRV, WebClient A 2014-02-01 00:48:51 c:\windows\system32\ssdpsrv.dll
svchost.exe 1284 UDP 123 ntp 127.0.0.1 C:\WINDOWS\system32\svchost.exe Microsoft® Windows® Operating System Generic Host Process for Win32 Services 5.1.2600.5508 (xpsp.080320-1628) Microsoft Corporation 2014-01-31 16:04:21 NT AUTHORITY\SYSTEM AudioSrv, Browser, CryptSvc, Dhcp, dmserver, ERSvc, EventSystem, FastUserSwitchingCompatibility, helpsvc, LanmanServer, lanmanworkstation, Netman, Nla, RasMan, Schedule A 2014-02-01 00:48:51 c:\windows\system32\w32time.dll
svchost.exe 1384 UDP 2491 0.0.0.0 C:\WINDOWS\system32\svchost.exe Microsoft® Windows® Operating System Generic Host Process for Win32 Services 5.1.2600.5508 (xpsp.080320-1628) Microsoft Corporation 2014-01-31 16:04:22 Dnscache A 2014-02-01 00:48:51 c:\windows\system32\DNSAPI.dll
svchost.exe 1384 UDP 2495 0.0.0.0 C:\WINDOWS\system32\svchost.exe Microsoft® Windows® Operating System Generic Host Process for Win32 Services 5.1.2600.5508 (xpsp.080320-1628) Microsoft Corporation 2014-01-31 16:04:22 Dnscache A 2014-02-01 00:48:51 c:\windows\system32\DNSAPI.dll
svchost.exe 1384 UDP 1026 0.0.0.0 C:\WINDOWS\system32\svchost.exe Microsoft® Windows® Operating System Generic Host Process for Win32 Services 5.1.2600.5508 (xpsp.080320-1628) Microsoft Corporation 2014-01-31 16:04:22 Dnscache A 2014-02-01 00:48:51 c:\windows\system32\DNSAPI.dll
svchost.exe 1480 UDP 1900 127.0.0.1 C:\WINDOWS\system32\svchost.exe Microsoft® Windows® Operating System Generic Host Process for Win32 Services 5.1.2600.5508 (xpsp.080320-1628) Microsoft Corporation 2014-01-31 16:04:22 LmHosts, RemoteRegistry, SSDPSRV, WebClient A 2014-02-01 00:48:51 c:\windows\system32\ssdpsrv.dll
svchost.exe 1384 UDP 1445 0.0.0.0 C:\WINDOWS\system32\svchost.exe Microsoft® Windows® Operating System Generic Host Process for Win32 Services 5.1.2600.5508 (xpsp.080320-1628) Microsoft Corporation 2014-01-31 16:04:22 Dnscache A 2014-02-01 00:48:51 c:\windows\system32\DNSAPI.dll
svchost.exe 1384 UDP 2492 0.0.0.0 C:\WINDOWS\system32\svchost.exe Microsoft® Windows® Operating System Generic Host Process for Win32 Services 5.1.2600.5508 (xpsp.080320-1628) Microsoft Corporation 2014-01-31 16:04:22 Dnscache A 2014-02-01 00:48:51 c:\windows\system32\DNSAPI.dll
svchost.exe 1384 UDP 1054 0.0.0.0 C:\WINDOWS\system32\svchost.exe Microsoft® Windows® Operating System Generic Host Process for Win32 Services 5.1.2600.5508 (xpsp.080320-1628) Microsoft Corporation 2014-01-31 16:04:22 Dnscache A 2014-02-01 00:48:51 c:\windows\system32\DNSAPI.dll
System 4 TCP 445 microsoft-ds 0.0.0.0 0.0.0.0 Listening N/A 2014-02-01 00:48:51
System 4 TCP 139 netbios-ssn 192.168.1.102 0.0.0.0 Listening N/A 2014-02-01 00:48:51
System 4 UDP 137 netbios-ns 192.168.1.102 N/A 2014-02-01 00:48:51
System 4 UDP 445 microsoft-ds 0.0.0.0 N/A 2014-02-01 00:48:51
System 4 UDP 138 netbios-dgm 192.168.1.102 N/A 2014-02-01 00:48:51
Unknown 0 TCP 2701 192.168.1.102 80 http 37.235.55.111 111-55-235-37.static.edis.at Time Wait N/A 2014-02-01 00:48:51
Unknown 0 TCP 2697 192.168.1.102 80 http 37.235.55.111 111-55-235-37.static.edis.at Time Wait N/A 2014-02-01 00:48:51
[color=#FF0000]
Offline
Jakie porty powinienem zamknąc aby komputer był bezpieczniejszy[/quote]
Wszystkie!Kod:
Starting Nmap 6.40 ( http://nmap.org ) at 2014-01-31 01:21 CET Nmap scan report for 192.168.0.101 Host is up (0.000020s latency). All 65535 scanned ports on 192.168.0.101 are closedMam pytanie a propo procesów, czy mógłby ktoś luknąc i napisac które z nich są zbędne ?[/quote]
Wszystkie!, wywal to wpizdu i instaluj linuksa;)Offline
zamknij kompa do szafy
Offline
@Pomocnik
Nie ten dział, tu się przerabia sieci i serwery Linuksowe, znaczniki CODE,
jak wklejasz śmietnik, a jak nie wiesz, jakie to są procesy, to pytaj tutaj:
http://forum.gazeta.pl/forum/f,430,Wirusy_trojany_spyware.html
Na forach Linuksowych trudniej znaleźć kogoś, kto na codzień siedzi z nosem w procesach Windows.
Offline
ahh ten linux ciekawie by było przejść na linuxa dla zielonych
Offline
ciekawie to by było przejść koło rozebranej dupy z rozkładówki plejboja, linuksa to się instaluje i używa, nie ma na co czekać kolego;)
Offline
Initiating Parallel DNS resolution of 1 host. at 04:09 Completed Parallel DNS resolution of 1 host. at 04:09, 0.05s elapsed Initiating SYN Stealth Scan at 04:09 Scanning 192.168.1.1 [1 port] Completed SYN Stealth Scan at 04:09, 0.44s elapsed (1 total ports) Initiating UDP Scan at 04:09 Scanning 192.168.1.1 [1 port] Discovered open port 53/udp on 192.168.1.1 Completed UDP Scan at 04:09, 0.44s elapsed (1 total ports) Initiating Service scan at 04:09 Scanning 1 service on 192.168.1.1 Completed Service scan at 04:10, 82.59s elapsed (1 service on 1 host) Initiating OS detection (try #1) against 192.168.1.1 Retrying OS detection (try #2) against 192.168.1.1 NSE: Script scanning 192.168.1.1. Initiating NSE at 04:11 Completed NSE at 04:11, 4.75s elapsed Nmap scan report for 192.168.1.1 Host is up (0.025s latency). PORT STATE SERVICE VERSION 53/tcp filtered domain 53/udp open domain? | dns-client-subnet-scan: |_ ERROR: dns-client-subnet-scan.domain was not specified |_dns-recursion: Recursion appears to be enabled 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : SF-Port53-UDP:V=6.40%I=7%D=2/1%Time=52EC6574%P=i686-pc-windows-windows%r(D SF:NSVersionBindReq,C,"\0\x06\x81\x84\0\0\0\0\0\0\0\0")%r(DNSStatusRequest SF:,C,"\0\0\x90\x84\0\0\0\0\0\0\0\0")%r(RPCCheck,C,"r\xfe\x99\x11\0\0\0\0\ SF:0\0\0\0")%r(NBTStat,32,"\x80\xf0\x81\x83\0\x01\0\0\0\0\0\0\x20ckaaaaaaa SF:aaaaaaaaaaaaaaaaaaaaaaa\0\0!\0\x01")%r(SIPOptions,C,"OP\xd0\x01\0\0\0\0 SF:\0\0\0\0")%r(NTPRequest,11,"\xe3\0\x80\x11\0\x01\0\0\0\0\0\0\0\0\0\0\0" SF:)%r(SNMPv1public,C,"0\x82\x80\x01\0\0\0\0\0\0\0\0")%r(SNMPv3GetRequest, SF:C,"0:\x80\x01\0\0\0\0\0\0\0\0")%r(AFSVersionRequest,C,"\0\0\x81\x01\0\0 SF:\0\0\0\0\0\0")%r(DNS-SD,2E,"\0\0\x81\x83\0\x01\0\0\0\0\0\0\t_services\x SF:07_dns-sd\x04_udp\x05local\0\0\x0c\0\x01")%r(Citrix,C,"\x1e\0\x81\x11\0 SF:\0\0\0\0\0\0\0")%r(Kerberos,C,"j\x81\xe8\x11\0\0\0\0\0\0\0\0")%r(sybase SF:anywhere,C,"\x1b\0\x80\x11\0\0\0\0\0\0\0\0"); MAC Address: 54:E6:FC:E9:3B:62 (Tp-link Technologies CO.) Too many fingerprints match this host to give specific OS details Network Distance: 1 hop Host script results: | firewalk: | HOP HOST PROTOCOL BLOCKED PORTS |_0 192.168.1.102 tcp 53 | traceroute-geolocation: | HOP RTT ADDRESS GEOLOCATION |_ 1 24.89 192.168.1.1 - ,- TRACEROUTE HOP RTT ADDRESS 1 24.89 ms 192.168.1.1 Initiating Ping Scan at 04:11 Scanning 4096 hosts [7 ports/host] Ping Scan Timing: About 1.00% done Ping Scan Timing: About 1.99% done; ETC: 05:02 (0:49:57 remaining) Ping Scan Timing: About 6.17% done; ETC: 05:02 (0:47:23 remaining) Ping Scan Timing: About 10.96% done; ETC: 05:01 (0:44:49 remaining)
ciekawe co on oznacza heeeeee
wpisałem to i wyskoczyło mi to coś źle zrobiłem czy nie znam chińskiego hmmm
nmap -p 80 192.168.0.0./16 -sV Slow comprehensive scan
Starting Nmap 6.40 ( http://nmap.org ) at 2014-02-01 04:25 W. Europe Standard Time NSE: failed to initialize the script engine: C:\Program Files\Nmap/nse_main.lua:146: module 'stdnse' not found: NSE failed to find nselib/stdnse.lua in search paths. no field package.preload['stdnse'] no file 'C:\Program Files\Nmap\lua\stdnse.lua' no file 'C:\Program Files\Nmap\lua\stdnse\init.lua' no file 'C:\Program Files\Nmap\stdnse.lua' no file 'C:\Program Files\Nmap\stdnse\init.lua' no file '.\stdnse.lua' no file 'C:\Program Files\Nmap\stdnse.dll' no file 'C:\Program Files\Nmap\loadall.dll' no file '.\stdnse.dll' stack traceback: [C]: in function 'require' C:\Program Files\Nmap/nse_main.lua:146: in main chunk [C]: in ? QUITTING!
[quote=menel]ciekawie to by było przejść koło rozebranej dupy z rozkładówki plejboja, linuksa to się instaluje i używa, nie ma na co czekać kolego;)[/quote]
dobre dobre jeszcze tego to joo nie słyszoł hehe
[quote=menel]ciekawie to by było przejść koło rozebranej dupy z rozkładówki plejboja, linuksa to się instaluje i używa, nie ma na co czekać kolego;)[/quote]
a jakiego byś polecił linuxa jeżeli nigdy nie miałem z nim styczności ?
Offline
a jakiego byś polecił linuxa jeżeli nigdy nie miałem z nim styczności ?[/quote]
http://jakilinux.org/jaki-linux/
poczytaj, popróbuj, w razie problemów masz zawsze fora, większość z nas tak zaczynała...powodzenia;)Ostatnio edytowany przez menel (2014-01-31 13:50:34)
Offline
[quote=Pomocnik]a jakiego byś polecił linuxa jeżeli nigdy nie miałem z nim styczności ?[/quote]
Szkoda, że nie czytasz na jakich forach umieszczasz wątki, bo gdybyś przeczytał i się zainteresował, wiedziałbyś, że jest to forum dotyczące [url=http://www.debian.org/]dystrybucji Debian[/url] i zapewne większość taką dystrybucje poleci ;)
Ostatnio edytowany przez ba10 (2014-01-31 14:08:00)
Offline
[b]ba10[/b] na głęboką wodę wrzucasz chłopa;) można zacząć od debiana czemu nie, ale po co ma się zniechęcać na wjazd... niech zacznie od minta albo jakiegoś *buntu czy coś w ten deseń a jak zostanie przy linuksie to i tak skończy wcześniej czy później na debianie;)
Offline
Time (s) | Query |
---|---|
0.00011 | SET CHARSET latin2 |
0.00004 | SET NAMES latin2 |
0.00141 | SELECT u.*, g.*, o.logged FROM punbb_users AS u INNER JOIN punbb_groups AS g ON u.group_id=g.g_id LEFT JOIN punbb_online AS o ON o.ident='3.135.206.25' WHERE u.id=1 |
0.00104 | REPLACE INTO punbb_online (user_id, ident, logged) VALUES(1, '3.135.206.25', 1733056074) |
0.00030 | SELECT * FROM punbb_online WHERE logged<1733055774 |
0.00099 | DELETE FROM punbb_online WHERE ident='18.118.162.8' |
0.00062 | SELECT t.subject, t.closed, t.num_replies, t.sticky, f.id AS forum_id, f.forum_name, f.moderators, fp.post_replies, 0 FROM punbb_topics AS t INNER JOIN punbb_forums AS f ON f.id=t.forum_id LEFT JOIN punbb_forum_perms AS fp ON (fp.forum_id=f.id AND fp.group_id=3) WHERE (fp.read_forum IS NULL OR fp.read_forum=1) AND t.id=25122 AND t.moved_to IS NULL |
0.00006 | SELECT search_for, replace_with FROM punbb_censoring |
0.00389 | SELECT u.email, u.title, u.url, u.location, u.use_avatar, u.signature, u.email_setting, u.num_posts, u.registered, u.admin_note, p.id, p.poster AS username, p.poster_id, p.poster_ip, p.poster_email, p.message, p.hide_smilies, p.posted, p.edited, p.edited_by, g.g_id, g.g_user_title, o.user_id AS is_online FROM punbb_posts AS p INNER JOIN punbb_users AS u ON u.id=p.poster_id INNER JOIN punbb_groups AS g ON g.g_id=u.group_id LEFT JOIN punbb_online AS o ON (o.user_id=u.id AND o.user_id!=1 AND o.idle=0) WHERE p.topic_id=25122 ORDER BY p.id LIMIT 0,25 |
0.00118 | UPDATE punbb_topics SET num_views=num_views+1 WHERE id=25122 |
Total query time: 0.00964 s |