Nie jesteś zalogowany.
Jeśli nie posiadasz konta, zarejestruj je już teraz! Pozwoli Ci ono w pełni korzystać z naszego serwisu. Spamerom dziękujemy!

Ogłoszenie

Prosimy o pomoc dla małej Julki — przekaż 1% podatku na Fundacji Dzieciom zdazyć z Pomocą.
Więcej informacji na dug.net.pl/pomagamy/.

#1  2014-01-30 23:10:09

  Pomocnik - Użytkownik

Pomocnik
Użytkownik
Zarejestrowany: 2014-01-30

Interpretacja wyniku skanowania Nmapem

Witam.
Mam pytanie a właściwie prośbę, przeskanowałem nmap bramę domyślną i mi wyskoczyło to i nie wiem co to oznacza czy to nie jest router skonfigurowany do wysyłania wiadomości do hmurki i jeszcze co to jest icloud czy to jest oprogramowanie zainstalowane na kompie do przechwytywania danych z telefonu (where is my iphon ?) a i jeszcze raw packet sent co oznaczają ?

Kod:

Starting Nmap 6.40 ( http://nmap.org ) at 2014-01-31 22:34 W. Europe Standard Time

NSE: Loaded 227 scripts for scanning.

NSE: Script Pre-scanning.

Initiating NSE at 22:34

NSE: mtrace: A source IP must be provided through fromip argument.

Completed NSE at 22:34, 10.78s elapsed

Pre-scan script results:

| broadcast-eigrp-discovery: 

|_ ERROR: Couldn't get an A.S value.

| broadcast-igmp-discovery: 

|   192.168.1.100

|     Interface: eth1

|     Version: 2

|     Group: 224.0.0.252

|     Description: Link-local Multicast Name Resolution (rfc4795)

|   192.168.1.100

|     Interface: eth1

|     Version: 2

|     Group: 224.0.0.253

|     Description: Teredo (rfc4380)

|   192.168.1.100

|     Interface: eth1

|     Version: 2

|     Group: 239.255.255.250

|     Description: Organization-Local Scope (rfc2365)

|_  Use the newtargets script-arg to add the results as targets

| http-icloud-findmyiphone: 

|_  ERROR: No username or password was supplied

| http-icloud-sendmsg: 

|_  ERROR: No username or password was supplied

| targets-asn: 

|_  targets-asn.asn is a mandatory parameter

Initiating Ping Scan at 22:34

Scanning 255.255.255.0 [7 ports]

Completed Ping Scan at 22:34, 2.19s elapsed (1 total hosts)

Nmap scan report for 255.255.255.0 [host down]

get_srcaddr: can't connect socket: The requested address is not valid in its context. 

NSE: Script Post-scanning.

Read data files from: C:\Program Files\Nmap

Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn

Nmap done: 1 IP address (0 hosts up) scanned in 21.45 seconds

           Raw packets sent: 14 (552B) | Rcvd: 1 (96B)

Offline

 

#2  2014-01-30 23:22:56

  Jacekalex - Podobno człowiek...;)

Jacekalex
Podobno człowiek...;)
Skąd: /dev/urandom
Zarejestrowany: 2008-01-07

Re: Interpretacja wyniku skanowania Nmapem

Kod:

nmap -p 80 192.168.0.0./16 -sV

Poszuka wszystkich hostów z otwartym hostem 80, i wywali listę.

Przykład:

Kod:

....
Nmap scan report for lan7 (192.168.7.1)
Host is up (0.00062s latency).
PORT   STATE SERVICE VERSION
80/tcp open  http    lighttpd

Nmap scan report for zyxel (192.168.7.5)
Host is up (0.0016s latency).
PORT   STATE SERVICE VERSION
80/tcp open  http    Allegro RomPager 4.07 UPnP/1.0 (ZyXEL ZyWALL 2)
.....

W demokracji każdy naród ma taką władzę, na jaką zasługuje ;)
Si vis pacem  para bellum  ;)       |       Pozdrawiam :)

Offline

 

#3  2014-01-30 23:33:01

  Pomocnik - Użytkownik

Pomocnik
Użytkownik
Zarejestrowany: 2014-01-30

Re: Interpretacja wyniku skanowania Nmapem

Witam wszystkich
Mam pytanie a mianowicie  prośbę przeskanowałem nmap bramę domyślną i chodzi mi o znaczenie, | http-icloud-findmyiphone: ? i te errory jak również Raw packets sent: 14 (552B) | Rcvd: 1 (96B)
Co oznaczają skanowania z nmap? za udzielenie pomocy z góry Dziękuję.

Kod:

Starting Nmap 6.40 ( http://nmap.org ) at 2014-01-31 22:34 W. Europe Standard Time

NSE: Loaded 227 scripts for scanning.

NSE: Script Pre-scanning.

Initiating NSE at 22:34

NSE: mtrace: A source IP must be provided through fromip argument.

Completed NSE at 22:34, 10.78s elapsed

Pre-scan script results:

| broadcast-eigrp-discovery: 

|_ ERROR: Couldn't get an A.S value.

| broadcast-igmp-discovery: 

|   192.168.1.100

|     Interface: eth1

|     Version: 2

|     Group: 224.0.0.252

|     Description: Link-local Multicast Name Resolution (rfc4795)

|   192.168.1.100

|     Interface: eth1

|     Version: 2

|     Group: 224.0.0.253

|     Description: Teredo (rfc4380)

|   192.168.1.100

|     Interface: eth1

|     Version: 2

|     Group: 239.255.255.250

|     Description: Organization-Local Scope (rfc2365)

|_  Use the newtargets script-arg to add the results as targets

| http-icloud-findmyiphone: 

|_  ERROR: No username or password was supplied

| http-icloud-sendmsg: 

|_  ERROR: No username or password was supplied

| targets-asn: 

|_  targets-asn.asn is a mandatory parameter

Initiating Ping Scan at 22:34

Scanning 255.255.255.0 [7 ports]

Completed Ping Scan at 22:34, 2.19s elapsed (1 total hosts)

Nmap scan report for 255.255.255.0 [host down]

get_srcaddr: can't connect socket: The requested address is not valid in its context. 

NSE: Script Post-scanning.

Read data files from: C:\Program Files\Nmap

Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn

Nmap done: 1 IP address (0 hosts up) scanned in 21.45 seconds

           Raw packets sent: 14 (552B) | Rcvd: 1 (96B)

i kolejny ip adresu

Offline

 

#4  2014-01-30 23:37:38

  Pomocnik - Użytkownik

Pomocnik
Użytkownik
Zarejestrowany: 2014-01-30

Re: Interpretacja wyniku skanowania Nmapem

Witam wszystkich
Mam pytanie a mianowicie  prośbę przeskanowałem nmap bramę domyślną i chodzi mi o znaczenie, | http-icloud-findmyiphone: ? i te errory jak również Raw packets sent: 14 (552B) | Rcvd: 1 (96B)
Co oznaczają skanowania z nmap? wybaczcie za laictwo i za udzielenie pomocy z góry Dziękuję.

Offline

 

#5  2014-01-30 23:42:22

  Jacekalex - Podobno człowiek...;)

Jacekalex
Podobno człowiek...;)
Skąd: /dev/urandom
Zarejestrowany: 2008-01-07

Re: Interpretacja wyniku skanowania Nmapem

Wynik z nmapa jest tajny?


W demokracji każdy naród ma taką władzę, na jaką zasługuje ;)
Si vis pacem  para bellum  ;)       |       Pozdrawiam :)

Offline

 

#6  2014-01-31 00:05:46

  Pomocnik - Użytkownik

Pomocnik
Użytkownik
Zarejestrowany: 2014-01-30

Re: Interpretacja wyniku skanowania Nmapem

sorki

Kod:

Starting Nmap 6.40 ( http://nmap.org ) at 2014-01-31 22:34 W. Europe Standard Time

NSE: Loaded 227 scripts for scanning.

NSE: Script Pre-scanning.

Initiating NSE at 22:34

NSE: mtrace: A source IP must be provided through fromip argument.

Completed NSE at 22:34, 10.78s elapsed

Pre-scan script results:

| broadcast-eigrp-discovery:

|_ ERROR: Couldn't get an A.S value.

| broadcast-igmp-discovery:

|   192.168.1.100

|     Interface: eth1

|     Version: 2

|     Group: 224.0.0.252

|     Description: Link-local Multicast Name Resolution (rfc4795)

|   192.168.1.100

|     Interface: eth1

|     Version: 2

|     Group: 224.0.0.253

|     Description: Teredo (rfc4380)

|   192.168.1.100

|     Interface: eth1

|     Version: 2

|     Group: 239.255.255.250

|     Description: Organization-Local Scope (rfc2365)

|_  Use the newtargets script-arg to add the results as targets

| http-icloud-findmyiphone:

|_  ERROR: No username or password was supplied

| http-icloud-sendmsg:

|_  ERROR: No username or password was supplied

| targets-asn:

|_  targets-asn.asn is a mandatory parameter

Initiating Ping Scan at 22:34

Scanning 255.255.255.0 [7 ports]

Completed Ping Scan at 22:34, 2.19s elapsed (1 total hosts)

Nmap scan report for 255.255.255.0 [host down]

get_srcaddr: can't connect socket: The requested address is not valid in its context.

NSE: Script Post-scanning.

Read data files from: C:\Program Files\Nmap

Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn

Nmap done: 1 IP address (0 hosts up) scanned in 21.45 seconds

           Raw packets sent: 14 (552B) | Rcvd: 1 (96B)

Offline

 

#7  2014-01-31 00:15:08

  Pomocnik - Użytkownik

Pomocnik
Użytkownik
Zarejestrowany: 2014-01-30

Re: Interpretacja wyniku skanowania Nmapem

wkleiłem to

Kod:

nmap -p 80 192.168.0.0./16 -sV

przeskanowałem Slow comprehensive scan i mi wyskoczyło .... co to może oznaczac?

Kod:

Starting Nmap 6.40 ( http://nmap.org ) at 2014-02-01 00:11 W. Europe Standard Time

NSE: Loaded 227 scripts for scanning.

NSE: Script Pre-scanning.

Initiating NSE at 00:11

NSE: mtrace: A source IP must be provided through fromip argument.

Completed NSE at 00:11, 10.56s elapsed

Pre-scan script results:

| broadcast-eigrp-discovery: 

|_ ERROR: Couldn't get an A.S value.

| broadcast-igmp-discovery: 

|   192.168.1.102

|     Interface: eth1

|     Version: 2

|     Group: 239.255.255.250

|     Description: Organization-Local Scope (rfc2365)

|_  Use the newtargets script-arg to add the results as targets

| http-icloud-findmyiphone: 

|_  ERROR: No username or password was supplied

| http-icloud-sendmsg: 

|_  ERROR: No username or password was supplied

| targets-asn: 

|_  targets-asn.asn is a mandatory parameter

Initiating Ping Scan at 00:11

Scanning 256 hosts [7 ports/host]

Ping Scan Timing: About 16.77% done; ETC: 00:14 (0:02:34 remaining)

Ping Scan Timing: About 32.95% done; ETC: 00:14 (0:02:04 remaining)

Ping Scan Timing: About 49.14% done; ETC: 00:14 (0:01:34 remaining)

Ping Scan Timing: About 65.68% done; ETC: 00:14 (0:01:03 remaining)

Ping Scan Timing: About 81.86% done; ETC: 00:14 (0:00:33 remaining)

Completed Ping Scan at 00:14, 186.20s elapsed (256 total hosts)

Nmap scan report for 192.168.0.0. (192.168.0.0) [host down]

Failed to resolve "nmap".

get_srcaddr: can't connect socket: The requested address is not valid in its context. 

Nmap scan report for 192.168.0.1 [host down]

Nmap scan report for 192.168.0.2 [host down]

Nmap scan report for 192.168.0.3 [host down]

Nmap scan report for 192.168.0.4 [host down]

Nmap scan report for 192.168.0.5 [host down]

Nmap scan report for 192.168.0.6 [host down]

Nmap scan report for 192.168.0.7 [host down]

Nmap scan report for 192.168.0.8 [host down]

Nmap scan report for 192.168.0.9 [host down]

Nmap scan report for 192.168.0.10 [host down]

Nmap scan report for 192.168.0.11 [host down]

Nmap scan report for 192.168.0.12 [host down]

Nmap scan report for 192.168.0.13 [host down]

Nmap scan report for 192.168.0.14 [host down]

Nmap scan report for 192.168.0.15 [host down]

Nmap scan report for 192.168.0.16 [host down]

Nmap scan report for 192.168.0.17 [host down]

Nmap scan report for 192.168.0.18 [host down]

Nmap scan report for 192.168.0.19 [host down]

Nmap scan report for 192.168.0.20 [host down]

Nmap scan report for 192.168.0.21 [host down]

Nmap scan report for 192.168.0.22 [host down]

Nmap scan report for 192.168.0.23 [host down]

Nmap scan report for 192.168.0.24 [host down]

Nmap scan report for 192.168.0.25 [host down]

Nmap scan report for 192.168.0.26 [host down]

Nmap scan report for 192.168.0.27 [host down]

Nmap scan report for 192.168.0.28 [host down]

Nmap scan report for 192.168.0.29 [host down]

Nmap scan report for 192.168.0.30 [host down]

Nmap scan report for 192.168.0.31 [host down]

Nmap scan report for 192.168.0.32 [host down]

Nmap scan report for 192.168.0.33 [host down]

Nmap scan report for 192.168.0.34 [host down]

Nmap scan report for 192.168.0.35 [host down]

Nmap scan report for 192.168.0.36 [host down]

Nmap scan report for 192.168.0.37 [host down]

Nmap scan report for 192.168.0.38 [host down]

Nmap scan report for 192.168.0.39 [host down]

Nmap scan report for 192.168.0.40 [host down]

Nmap scan report for 192.168.0.41 [host down]

Nmap scan report for 192.168.0.42 [host down]

Nmap scan report for 192.168.0.43 [host down]

Nmap scan report for 192.168.0.44 [host down]

Nmap scan report for 192.168.0.45 [host down]

Nmap scan report for 192.168.0.46 [host down]

Nmap scan report for 192.168.0.47 [host down]

Nmap scan report for 192.168.0.48 [host down]

Nmap scan report for 192.168.0.49 [host down]

Nmap scan report for 192.168.0.50 [host down]

Nmap scan report for 192.168.0.51 [host down]

Nmap scan report for 192.168.0.52 [host down]

Nmap scan report for 192.168.0.53 [host down]

Nmap scan report for 192.168.0.54 [host down]

Nmap scan report for 192.168.0.55 [host down]

Nmap scan report for 192.168.0.56 [host down]

Nmap scan report for 192.168.0.57 [host down]

Nmap scan report for 192.168.0.58 [host down]

Nmap scan report for 192.168.0.59 [host down]

Nmap scan report for 192.168.0.60 [host down]

Nmap scan report for 192.168.0.61 [host down]

Nmap scan report for 192.168.0.62 [host down]

Nmap scan report for 192.168.0.63 [host down]

Nmap scan report for 192.168.0.64 [host down]

Nmap scan report for 192.168.0.65 [host down]

Nmap scan report for 192.168.0.66 [host down]

Nmap scan report for 192.168.0.67 [host down]

Nmap scan report for 192.168.0.68 [host down]

Nmap scan report for 192.168.0.69 [host down]

Nmap scan report for 192.168.0.70 [host down]

Nmap scan report for 192.168.0.71 [host down]

Nmap scan report for 192.168.0.72 [host down]

Nmap scan report for 192.168.0.73 [host down]

Nmap scan report for 192.168.0.74 [host down]

Nmap scan report for 192.168.0.75 [host down]

Nmap scan report for 192.168.0.76 [host down]

Nmap scan report for 192.168.0.77 [host down]

Nmap scan report for 192.168.0.78 [host down]

Nmap scan report for 192.168.0.79 [host down]

Nmap scan report for 192.168.0.80 [host down]

Nmap scan report for 192.168.0.81 [host down]

Nmap scan report for 192.168.0.82 [host down]

Nmap scan report for 192.168.0.83 [host down]

Nmap scan report for 192.168.0.84 [host down]

Nmap scan report for 192.168.0.85 [host down]

Nmap scan report for 192.168.0.86 [host down]

Nmap scan report for 192.168.0.87 [host down]

Nmap scan report for 192.168.0.88 [host down]

Nmap scan report for 192.168.0.89 [host down]

Nmap scan report for 192.168.0.90 [host down]

Nmap scan report for 192.168.0.91 [host down]

Nmap scan report for 192.168.0.92 [host down]

Nmap scan report for 192.168.0.93 [host down]

Nmap scan report for 192.168.0.94 [host down]

Nmap scan report for 192.168.0.95 [host down]

Nmap scan report for 192.168.0.96 [host down]

Nmap scan report for 192.168.0.97 [host down]

Nmap scan report for 192.168.0.98 [host down]

Nmap scan report for 192.168.0.99 [host down]

Nmap scan report for 192.168.0.100 [host down]

Nmap scan report for 192.168.0.101 [host down]

Nmap scan report for 192.168.0.102 [host down]

Nmap scan report for 192.168.0.103 [host down]

Nmap scan report for 192.168.0.104 [host down]

Nmap scan report for 192.168.0.105 [host down]

Nmap scan report for 192.168.0.106 [host down]

Nmap scan report for 192.168.0.107 [host down]

Nmap scan report for 192.168.0.108 [host down]

Nmap scan report for 192.168.0.109 [host down]

Nmap scan report for 192.168.0.110 [host down]

Nmap scan report for 192.168.0.111 [host down]

Nmap scan report for 192.168.0.112 [host down]

Nmap scan report for 192.168.0.113 [host down]

Nmap scan report for 192.168.0.114 [host down]

Nmap scan report for 192.168.0.115 [host down]

Nmap scan report for 192.168.0.116 [host down]

Nmap scan report for 192.168.0.117 [host down]

Nmap scan report for 192.168.0.118 [host down]

Nmap scan report for 192.168.0.119 [host down]

Nmap scan report for 192.168.0.120 [host down]

Nmap scan report for 192.168.0.121 [host down]

Nmap scan report for 192.168.0.122 [host down]

Nmap scan report for 192.168.0.123 [host down]

Nmap scan report for 192.168.0.124 [host down]

Nmap scan report for 192.168.0.125 [host down]

Nmap scan report for 192.168.0.126 [host down]

Nmap scan report for 192.168.0.127 [host down]

Nmap scan report for 192.168.0.128 [host down]

Nmap scan report for 192.168.0.129 [host down]

Nmap scan report for 192.168.0.130 [host down]

Nmap scan report for 192.168.0.131 [host down]

Nmap scan report for 192.168.0.132 [host down]

Nmap scan report for 192.168.0.133 [host down]

Nmap scan report for 192.168.0.134 [host down]

Nmap scan report for 192.168.0.135 [host down]

Nmap scan report for 192.168.0.136 [host down]

Nmap scan report for 192.168.0.137 [host down]

Nmap scan report for 192.168.0.138 [host down]

Nmap scan report for 192.168.0.139 [host down]

Nmap scan report for 192.168.0.140 [host down]

Nmap scan report for 192.168.0.141 [host down]

Nmap scan report for 192.168.0.142 [host down]

Nmap scan report for 192.168.0.143 [host down]

Nmap scan report for 192.168.0.144 [host down]

Nmap scan report for 192.168.0.145 [host down]

Nmap scan report for 192.168.0.146 [host down]

Nmap scan report for 192.168.0.147 [host down]

Nmap scan report for 192.168.0.148 [host down]

Nmap scan report for 192.168.0.149 [host down]

Nmap scan report for 192.168.0.150 [host down]

Nmap scan report for 192.168.0.151 [host down]

Nmap scan report for 192.168.0.152 [host down]

Nmap scan report for 192.168.0.153 [host down]

Nmap scan report for 192.168.0.154 [host down]

Nmap scan report for 192.168.0.155 [host down]

Nmap scan report for 192.168.0.156 [host down]

Nmap scan report for 192.168.0.157 [host down]

Nmap scan report for 192.168.0.158 [host down]

Nmap scan report for 192.168.0.159 [host down]

Nmap scan report for 192.168.0.160 [host down]

Nmap scan report for 192.168.0.161 [host down]

Nmap scan report for 192.168.0.162 [host down]

Nmap scan report for 192.168.0.163 [host down]

Nmap scan report for 192.168.0.164 [host down]

Nmap scan report for 192.168.0.165 [host down]

Nmap scan report for 192.168.0.166 [host down]

Nmap scan report for 192.168.0.167 [host down]

Nmap scan report for 192.168.0.168 [host down]

Nmap scan report for 192.168.0.169 [host down]

Nmap scan report for 192.168.0.170 [host down]

Nmap scan report for 192.168.0.171 [host down]

Nmap scan report for 192.168.0.172 [host down]

Nmap scan report for 192.168.0.173 [host down]

Nmap scan report for 192.168.0.174 [host down]

Nmap scan report for 192.168.0.175 [host down]

Nmap scan report for 192.168.0.176 [host down]

Nmap scan report for 192.168.0.177 [host down]

Nmap scan report for 192.168.0.178 [host down]

Nmap scan report for 192.168.0.179 [host down]

Nmap scan report for 192.168.0.180 [host down]

Nmap scan report for 192.168.0.181 [host down]

Nmap scan report for 192.168.0.182 [host down]

Nmap scan report for 192.168.0.183 [host down]

Nmap scan report for 192.168.0.184 [host down]

Nmap scan report for 192.168.0.185 [host down]

Nmap scan report for 192.168.0.186 [host down]

Nmap scan report for 192.168.0.187 [host down]

Nmap scan report for 192.168.0.188 [host down]

Nmap scan report for 192.168.0.189 [host down]

Nmap scan report for 192.168.0.190 [host down]

Nmap scan report for 192.168.0.191 [host down]

Nmap scan report for 192.168.0.192 [host down]

Nmap scan report for 192.168.0.193 [host down]

Nmap scan report for 192.168.0.194 [host down]

Nmap scan report for 192.168.0.195 [host down]

Nmap scan report for 192.168.0.196 [host down]

Nmap scan report for 192.168.0.197 [host down]

Nmap scan report for 192.168.0.198 [host down]

Nmap scan report for 192.168.0.199 [host down]

Nmap scan report for 192.168.0.200 [host down]

Nmap scan report for 192.168.0.201 [host down]

Nmap scan report for 192.168.0.202 [host down]

Nmap scan report for 192.168.0.203 [host down]

Nmap scan report for 192.168.0.204 [host down]

Nmap scan report for 192.168.0.205 [host down]

Nmap scan report for 192.168.0.206 [host down]

Nmap scan report for 192.168.0.207 [host down]

Nmap scan report for 192.168.0.208 [host down]

Nmap scan report for 192.168.0.209 [host down]

Nmap scan report for 192.168.0.210 [host down]

Nmap scan report for 192.168.0.211 [host down]

Nmap scan report for 192.168.0.212 [host down]

Nmap scan report for 192.168.0.213 [host down]

Nmap scan report for 192.168.0.214 [host down]

Nmap scan report for 192.168.0.215 [host down]

Nmap scan report for 192.168.0.216 [host down]

Nmap scan report for 192.168.0.217 [host down]

Nmap scan report for 192.168.0.218 [host down]

Nmap scan report for 192.168.0.219 [host down]

Nmap scan report for 192.168.0.220 [host down]

Nmap scan report for 192.168.0.221 [host down]

Nmap scan report for 192.168.0.222 [host down]

Nmap scan report for 192.168.0.223 [host down]

Nmap scan report for 192.168.0.224 [host down]

Nmap scan report for 192.168.0.225 [host down]

Nmap scan report for 192.168.0.226 [host down]

Nmap scan report for 192.168.0.227 [host down]

Nmap scan report for 192.168.0.228 [host down]

Nmap scan report for 192.168.0.229 [host down]

Nmap scan report for 192.168.0.230 [host down]

Nmap scan report for 192.168.0.231 [host down]

Nmap scan report for 192.168.0.232 [host down]

Nmap scan report for 192.168.0.233 [host down]

Nmap scan report for 192.168.0.234 [host down]

Nmap scan report for 192.168.0.235 [host down]

Nmap scan report for 192.168.0.236 [host down]

Nmap scan report for 192.168.0.237 [host down]

Nmap scan report for 192.168.0.238 [host down]

Nmap scan report for 192.168.0.239 [host down]

Nmap scan report for 192.168.0.240 [host down]

Nmap scan report for 192.168.0.241 [host down]

Nmap scan report for 192.168.0.242 [host down]

Nmap scan report for 192.168.0.243 [host down]

Nmap scan report for 192.168.0.244 [host down]

Nmap scan report for 192.168.0.245 [host down]

Nmap scan report for 192.168.0.246 [host down]

Nmap scan report for 192.168.0.247 [host down]

Nmap scan report for 192.168.0.248 [host down]

Nmap scan report for 192.168.0.249 [host down]

Nmap scan report for 192.168.0.250 [host down]

Nmap scan report for 192.168.0.251 [host down]

Nmap scan report for 192.168.0.252 [host down]

Nmap scan report for 192.168.0.253 [host down]

Nmap scan report for 192.168.0.254 [host down]

Nmap scan report for 192.168.0.255 [host down]

Initiating ARP Ping Scan at 00:14

Scanning 255 hosts [1 port/host]

Completed ARP Ping Scan at 00:14, 2.95s elapsed (255 total hosts)

Initiating Parallel DNS resolution of 255 hosts. at 00:14

Completed Parallel DNS resolution of 255 hosts. at 00:14, 0.03s elapsed

Nmap scan report for 192.168.1.0 [host down]

Nmap scan report for 192.168.1.2 [host down]

Nmap scan report for 192.168.1.3 [host down]

Nmap scan report for 192.168.1.4 [host down]

Nmap scan report for 192.168.1.5 [host down]

Nmap scan report for 192.168.1.6 [host down]

Nmap scan report for 192.168.1.7 [host down]

Nmap scan report for 192.168.1.8 [host down]

Nmap scan report for 192.168.1.9 [host down]

Nmap scan report for 192.168.1.10 [host down]

Nmap scan report for 192.168.1.11 [host down]

Nmap scan report for 192.168.1.12 [host down]

Nmap scan report for 192.168.1.13 [host down]

Nmap scan report for 192.168.1.14 [host down]

Nmap scan report for 192.168.1.15 [host down]

Nmap scan report for 192.168.1.16 [host down]

Nmap scan report for 192.168.1.17 [host down]

Nmap scan report for 192.168.1.18 [host down]

Nmap scan report for 192.168.1.19 [host down]

Nmap scan report for 192.168.1.20 [host down]

Nmap scan report for 192.168.1.21 [host down]

Nmap scan report for 192.168.1.22 [host down]

Nmap scan report for 192.168.1.23 [host down]

Nmap scan report for 192.168.1.24 [host down]

Nmap scan report for 192.168.1.25 [host down]

Nmap scan report for 192.168.1.26 [host down]

Nmap scan report for 192.168.1.27 [host down]

Nmap scan report for 192.168.1.28 [host down]

Nmap scan report for 192.168.1.29 [host down]

Nmap scan report for 192.168.1.30 [host down]

Nmap scan report for 192.168.1.31 [host down]

Nmap scan report for 192.168.1.32 [host down]

Nmap scan report for 192.168.1.33 [host down]

Nmap scan report for 192.168.1.34 [host down]

Nmap scan report for 192.168.1.35 [host down]

Nmap scan report for 192.168.1.36 [host down]

Nmap scan report for 192.168.1.37 [host down]

Nmap scan report for 192.168.1.38 [host down]

Nmap scan report for 192.168.1.39 [host down]

Nmap scan report for 192.168.1.40 [host down]

Nmap scan report for 192.168.1.41 [host down]

Nmap scan report for 192.168.1.42 [host down]

Nmap scan report for 192.168.1.43 [host down]

Nmap scan report for 192.168.1.44 [host down]

Nmap scan report for 192.168.1.45 [host down]

Nmap scan report for 192.168.1.46 [host down]

Nmap scan report for 192.168.1.47 [host down]

Nmap scan report for 192.168.1.48 [host down]

Nmap scan report for 192.168.1.49 [host down]

Nmap scan report for 192.168.1.50 [host down]

Nmap scan report for 192.168.1.51 [host down]

Nmap scan report for 192.168.1.52 [host down]

Nmap scan report for 192.168.1.53 [host down]

Nmap scan report for 192.168.1.54 [host down]

Nmap scan report for 192.168.1.55 [host down]

Nmap scan report for 192.168.1.56 [host down]

Nmap scan report for 192.168.1.57 [host down]

Nmap scan report for 192.168.1.58 [host down]

Nmap scan report for 192.168.1.59 [host down]

Nmap scan report for 192.168.1.60 [host down]

Nmap scan report for 192.168.1.61 [host down]

Nmap scan report for 192.168.1.62 [host down]

Nmap scan report for 192.168.1.63 [host down]

Nmap scan report for 192.168.1.64 [host down]

Nmap scan report for 192.168.1.65 [host down]

Nmap scan report for 192.168.1.66 [host down]

Nmap scan report for 192.168.1.67 [host down]

Nmap scan report for 192.168.1.68 [host down]

Nmap scan report for 192.168.1.69 [host down]

Nmap scan report for 192.168.1.70 [host down]

Nmap scan report for 192.168.1.71 [host down]

Nmap scan report for 192.168.1.72 [host down]

Nmap scan report for 192.168.1.73 [host down]

Nmap scan report for 192.168.1.74 [host down]

Nmap scan report for 192.168.1.75 [host down]

Nmap scan report for 192.168.1.76 [host down]

Nmap scan report for 192.168.1.77 [host down]

Nmap scan report for 192.168.1.78 [host down]

Nmap scan report for 192.168.1.79 [host down]

Nmap scan report for 192.168.1.80 [host down]

Nmap scan report for 192.168.1.81 [host down]

Nmap scan report for 192.168.1.82 [host down]

Nmap scan report for 192.168.1.83 [host down]

Nmap scan report for 192.168.1.84 [host down]

Nmap scan report for 192.168.1.85 [host down]

Nmap scan report for 192.168.1.86 [host down]

Nmap scan report for 192.168.1.87 [host down]

Nmap scan report for 192.168.1.88 [host down]

Nmap scan report for 192.168.1.89 [host down]

Nmap scan report for 192.168.1.90 [host down]

Nmap scan report for 192.168.1.91 [host down]

Nmap scan report for 192.168.1.92 [host down]

Nmap scan report for 192.168.1.93 [host down]

Nmap scan report for 192.168.1.94 [host down]

Nmap scan report for 192.168.1.95 [host down]

Nmap scan report for 192.168.1.96 [host down]

Nmap scan report for 192.168.1.97 [host down]

Nmap scan report for 192.168.1.98 [host down]

Nmap scan report for 192.168.1.99 [host down]

Nmap scan report for 192.168.1.100 [host down]

Nmap scan report for 192.168.1.101 [host down]

Nmap scan report for 192.168.1.103 [host down]

Nmap scan report for 192.168.1.104 [host down]

Nmap scan report for 192.168.1.105 [host down]

Nmap scan report for 192.168.1.106 [host down]

Nmap scan report for 192.168.1.107 [host down]

Nmap scan report for 192.168.1.108 [host down]

Nmap scan report for 192.168.1.109 [host down]

Nmap scan report for 192.168.1.110 [host down]

Nmap scan report for 192.168.1.111 [host down]

Nmap scan report for 192.168.1.112 [host down]

Nmap scan report for 192.168.1.113 [host down]

Nmap scan report for 192.168.1.114 [host down]

Nmap scan report for 192.168.1.115 [host down]

Nmap scan report for 192.168.1.116 [host down]

Nmap scan report for 192.168.1.117 [host down]

Nmap scan report for 192.168.1.118 [host down]

Nmap scan report for 192.168.1.119 [host down]

Nmap scan report for 192.168.1.120 [host down]

Nmap scan report for 192.168.1.121 [host down]

Nmap scan report for 192.168.1.122 [host down]

Nmap scan report for 192.168.1.123 [host down]

Nmap scan report for 192.168.1.124 [host down]

Nmap scan report for 192.168.1.125 [host down]

Nmap scan report for 192.168.1.126 [host down]

Nmap scan report for 192.168.1.127 [host down]

Nmap scan report for 192.168.1.128 [host down]

Nmap scan report for 192.168.1.129 [host down]

Nmap scan report for 192.168.1.130 [host down]

Nmap scan report for 192.168.1.131 [host down]

Nmap scan report for 192.168.1.132 [host down]

Nmap scan report for 192.168.1.133 [host down]

Nmap scan report for 192.168.1.134 [host down]

Nmap scan report for 192.168.1.135 [host down]

Nmap scan report for 192.168.1.136 [host down]

Nmap scan report for 192.168.1.137 [host down]

Nmap scan report for 192.168.1.138 [host down]

Nmap scan report for 192.168.1.139 [host down]

Nmap scan report for 192.168.1.140 [host down]

Nmap scan report for 192.168.1.141 [host down]

Nmap scan report for 192.168.1.142 [host down]

Nmap scan report for 192.168.1.143 [host down]

Nmap scan report for 192.168.1.144 [host down]

Nmap scan report for 192.168.1.145 [host down]

Nmap scan report for 192.168.1.146 [host down]

Nmap scan report for 192.168.1.147 [host down]

Nmap scan report for 192.168.1.148 [host down]

Nmap scan report for 192.168.1.149 [host down]

Nmap scan report for 192.168.1.150 [host down]

Nmap scan report for 192.168.1.151 [host down]

Nmap scan report for 192.168.1.152 [host down]

Nmap scan report for 192.168.1.153 [host down]

Nmap scan report for 192.168.1.154 [host down]

Nmap scan report for 192.168.1.155 [host down]

Nmap scan report for 192.168.1.156 [host down]

Nmap scan report for 192.168.1.157 [host down]

Nmap scan report for 192.168.1.158 [host down]

Nmap scan report for 192.168.1.159 [host down]

Nmap scan report for 192.168.1.160 [host down]

Nmap scan report for 192.168.1.161 [host down]

Nmap scan report for 192.168.1.162 [host down]

Nmap scan report for 192.168.1.163 [host down]

Nmap scan report for 192.168.1.164 [host down]

Nmap scan report for 192.168.1.165 [host down]

Nmap scan report for 192.168.1.166 [host down]

Nmap scan report for 192.168.1.167 [host down]

Nmap scan report for 192.168.1.168 [host down]

Nmap scan report for 192.168.1.169 [host down]

Nmap scan report for 192.168.1.170 [host down]

Nmap scan report for 192.168.1.171 [host down]

Nmap scan report for 192.168.1.172 [host down]

Nmap scan report for 192.168.1.173 [host down]

Nmap scan report for 192.168.1.174 [host down]

Nmap scan report for 192.168.1.175 [host down]

Nmap scan report for 192.168.1.176 [host down]

Nmap scan report for 192.168.1.177 [host down]

Nmap scan report for 192.168.1.178 [host down]

Nmap scan report for 192.168.1.179 [host down]

Nmap scan report for 192.168.1.180 [host down]

Nmap scan report for 192.168.1.181 [host down]

Nmap scan report for 192.168.1.182 [host down]

Nmap scan report for 192.168.1.183 [host down]

Nmap scan report for 192.168.1.184 [host down]

Nmap scan report for 192.168.1.185 [host down]

Nmap scan report for 192.168.1.186 [host down]

Nmap scan report for 192.168.1.187 [host down]

Nmap scan report for 192.168.1.188 [host down]

Nmap scan report for 192.168.1.189 [host down]

Nmap scan report for 192.168.1.190 [host down]

Nmap scan report for 192.168.1.191 [host down]

Nmap scan report for 192.168.1.192 [host down]

Nmap scan report for 192.168.1.193 [host down]

Nmap scan report for 192.168.1.194 [host down]

Nmap scan report for 192.168.1.195 [host down]

Nmap scan report for 192.168.1.196 [host down]

Nmap scan report for 192.168.1.197 [host down]

Nmap scan report for 192.168.1.198 [host down]

Nmap scan report for 192.168.1.199 [host down]

Nmap scan report for 192.168.1.200 [host down]

Nmap scan report for 192.168.1.201 [host down]

Nmap scan report for 192.168.1.202 [host down]

Nmap scan report for 192.168.1.203 [host down]

Nmap scan report for 192.168.1.204 [host down]

Nmap scan report for 192.168.1.205 [host down]

Nmap scan report for 192.168.1.206 [host down]

Nmap scan report for 192.168.1.207 [host down]

Nmap scan report for 192.168.1.208 [host down]

Nmap scan report for 192.168.1.209 [host down]

Nmap scan report for 192.168.1.210 [host down]

Nmap scan report for 192.168.1.211 [host down]

Nmap scan report for 192.168.1.212 [host down]

Nmap scan report for 192.168.1.213 [host down]

Nmap scan report for 192.168.1.214 [host down]

Nmap scan report for 192.168.1.215 [host down]

Nmap scan report for 192.168.1.216 [host down]

Nmap scan report for 192.168.1.217 [host down]

Nmap scan report for 192.168.1.218 [host down]

Nmap scan report for 192.168.1.219 [host down]

Nmap scan report for 192.168.1.220 [host down]

Nmap scan report for 192.168.1.221 [host down]

Nmap scan report for 192.168.1.222 [host down]

Nmap scan report for 192.168.1.223 [host down]

Nmap scan report for 192.168.1.224 [host down]

Nmap scan report for 192.168.1.225 [host down]

Nmap scan report for 192.168.1.226 [host down]

Nmap scan report for 192.168.1.227 [host down]

Nmap scan report for 192.168.1.228 [host down]

Nmap scan report for 192.168.1.229 [host down]

Nmap scan report for 192.168.1.230 [host down]

Nmap scan report for 192.168.1.231 [host down]

Nmap scan report for 192.168.1.232 [host down]

Nmap scan report for 192.168.1.233 [host down]

Nmap scan report for 192.168.1.234 [host down]

Nmap scan report for 192.168.1.235 [host down]

Nmap scan report for 192.168.1.236 [host down]

Nmap scan report for 192.168.1.237 [host down]

Nmap scan report for 192.168.1.238 [host down]

Nmap scan report for 192.168.1.239 [host down]

Nmap scan report for 192.168.1.240 [host down]

Nmap scan report for 192.168.1.241 [host down]

Nmap scan report for 192.168.1.242 [host down]

Nmap scan report for 192.168.1.243 [host down]

Nmap scan report for 192.168.1.244 [host down]

Nmap scan report for 192.168.1.245 [host down]

Nmap scan report for 192.168.1.246 [host down]

Nmap scan report for 192.168.1.247 [host down]

Nmap scan report for 192.168.1.248 [host down]

Nmap scan report for 192.168.1.249 [host down]

Nmap scan report for 192.168.1.250 [host down]

Nmap scan report for 192.168.1.251 [host down]

Nmap scan report for 192.168.1.252 [host down]

Nmap scan report for 192.168.1.253 [host down]

Nmap scan report for 192.168.1.254 [host down]

Nmap scan report for 192.168.1.255 [host down]

Initiating Parallel DNS resolution of 1 host. at 00:14

Completed Parallel DNS resolution of 1 host. at 00:14, 0.03s elapsed

Initiating SYN Stealth Scan at 00:14

Scanning 192.168.1.1 [1 port]

Discovered open port 80/tcp on 192.168.1.1

Completed SYN Stealth Scan at 00:14, 0.01s elapsed (1 total ports)

Initiating UDP Scan at 00:14

Scanning 192.168.1.1 [1 port]

Completed UDP Scan at 00:14, 0.23s elapsed (1 total ports)

Initiating Service scan at 00:14

Scanning 2 services on 192.168.1.1

Completed Service scan at 00:16, 82.50s elapsed (2 services on 1 host)

Initiating OS detection (try #1) against 192.168.1.1

NSE: Script scanning 192.168.1.1.

Initiating NSE at 00:16

Offline

 

#8  2014-01-31 00:18:03

  Pomocnik - Użytkownik

Pomocnik
Użytkownik
Zarejestrowany: 2014-01-30

Re: Interpretacja wyniku skanowania Nmapem

wkleiłem to

Kod:

nmap -p 80 192.168.0.0./16 -sV

przeskanowałem Slow comprehensive scan i mi wyskoczyło .... co to może oznaczac?

Kod:

Starting Nmap 6.40 ( http://nmap.org ) at 2014-02-01 00:11 W. Europe Standard Time

NSE: Loaded 227 scripts for scanning.

NSE: Script Pre-scanning.

Initiating NSE at 00:11

NSE: mtrace: A source IP must be provided through fromip argument.

Completed NSE at 00:11, 10.56s elapsed

Pre-scan script results:

| broadcast-eigrp-discovery: 

|_ ERROR: Couldn't get an A.S value.

| broadcast-igmp-discovery: 

|   192.168.1.102

|     Interface: eth1

|     Version: 2

|     Group: 239.255.255.250

|     Description: Organization-Local Scope (rfc2365)

|_  Use the newtargets script-arg to add the results as targets

| http-icloud-findmyiphone: 

|_  ERROR: No username or password was supplied

| http-icloud-sendmsg: 

|_  ERROR: No username or password was supplied

| targets-asn: 

|_  targets-asn.asn is a mandatory parameter

Initiating Ping Scan at 00:11

Scanning 256 hosts [7 ports/host]

Ping Scan Timing: About 16.77% done; ETC: 00:14 (0:02:34 remaining)

Ping Scan Timing: About 32.95% done; ETC: 00:14 (0:02:04 remaining)

Ping Scan Timing: About 49.14% done; ETC: 00:14 (0:01:34 remaining)

Ping Scan Timing: About 65.68% done; ETC: 00:14 (0:01:03 remaining)

Ping Scan Timing: About 81.86% done; ETC: 00:14 (0:00:33 remaining)

Completed Ping Scan at 00:14, 186.20s elapsed (256 total hosts)

Nmap scan report for 192.168.0.0. (192.168.0.0) [host down]

Failed to resolve "nmap".

get_srcaddr: can't connect socket: The requested address is not valid in its context. 

Nmap scan report for 192.168.0.1 [host down]

Nmap scan report for 192.168.0.2 [host down]

Nmap scan report for 192.168.0.3 [host down]

Nmap scan report for 192.168.0.4 [host down]

Nmap scan report for 192.168.0.5 [host down]

Nmap scan report for 192.168.0.6 [host down]

Nmap scan report for 192.168.0.7 [host down]

Nmap scan report for 192.168.0.8 [host down]

Nmap scan report for 192.168.0.9 [host down]

Nmap scan report for 192.168.0.10 [host down]

Nmap scan report for 192.168.0.11 [host down]

Nmap scan report for 192.168.0.12 [host down]

Nmap scan report for 192.168.0.13 [host down]

Nmap scan report for 192.168.0.14 [host down]

Nmap scan report for 192.168.0.15 [host down]

Nmap scan report for 192.168.0.16 [host down]

Nmap scan report for 192.168.0.17 [host down]

Nmap scan report for 192.168.0.18 [host down]

Nmap scan report for 192.168.0.19 [host down]

Nmap scan report for 192.168.0.20 [host down]

Nmap scan report for 192.168.0.21 [host down]

Nmap scan report for 192.168.0.22 [host down]

Nmap scan report for 192.168.0.23 [host down]

Nmap scan report for 192.168.0.24 [host down]

Nmap scan report for 192.168.0.25 [host down]

Nmap scan report for 192.168.0.26 [host down]

Nmap scan report for 192.168.0.27 [host down]

Nmap scan report for 192.168.0.28 [host down]

Nmap scan report for 192.168.0.29 [host down]

Nmap scan report for 192.168.0.30 [host down]

Nmap scan report for 192.168.0.31 [host down]

Nmap scan report for 192.168.0.32 [host down]

Nmap scan report for 192.168.0.33 [host down]

Nmap scan report for 192.168.0.34 [host down]

Nmap scan report for 192.168.0.35 [host down]

Nmap scan report for 192.168.0.36 [host down]

Nmap scan report for 192.168.0.37 [host down]

Nmap scan report for 192.168.0.38 [host down]

Nmap scan report for 192.168.0.39 [host down]

Nmap scan report for 192.168.0.40 [host down]

Nmap scan report for 192.168.0.41 [host down]

Nmap scan report for 192.168.0.42 [host down]

Nmap scan report for 192.168.0.43 [host down]

Nmap scan report for 192.168.0.44 [host down]

Nmap scan report for 192.168.0.45 [host down]

Nmap scan report for 192.168.0.46 [host down]

Nmap scan report for 192.168.0.47 [host down]

Nmap scan report for 192.168.0.48 [host down]

Nmap scan report for 192.168.0.49 [host down]

Nmap scan report for 192.168.0.50 [host down]

Nmap scan report for 192.168.0.51 [host down]

Nmap scan report for 192.168.0.52 [host down]

Nmap scan report for 192.168.0.53 [host down]

Nmap scan report for 192.168.0.54 [host down]

Nmap scan report for 192.168.0.55 [host down]

Nmap scan report for 192.168.0.56 [host down]

Nmap scan report for 192.168.0.57 [host down]

Nmap scan report for 192.168.0.58 [host down]

Nmap scan report for 192.168.0.59 [host down]

Nmap scan report for 192.168.0.60 [host down]

Nmap scan report for 192.168.0.61 [host down]

Nmap scan report for 192.168.0.62 [host down]

Nmap scan report for 192.168.0.63 [host down]

Nmap scan report for 192.168.0.64 [host down]

Nmap scan report for 192.168.0.65 [host down]

Nmap scan report for 192.168.0.66 [host down]

Nmap scan report for 192.168.0.67 [host down]

Nmap scan report for 192.168.0.68 [host down]

Nmap scan report for 192.168.0.69 [host down]

Nmap scan report for 192.168.0.70 [host down]

Nmap scan report for 192.168.0.71 [host down]

Nmap scan report for 192.168.0.72 [host down]

Nmap scan report for 192.168.0.73 [host down]

Nmap scan report for 192.168.0.74 [host down]

Nmap scan report for 192.168.0.75 [host down]

Nmap scan report for 192.168.0.76 [host down]

Nmap scan report for 192.168.0.77 [host down]

Nmap scan report for 192.168.0.78 [host down]

Nmap scan report for 192.168.0.79 [host down]

Nmap scan report for 192.168.0.80 [host down]

Nmap scan report for 192.168.0.81 [host down]

Nmap scan report for 192.168.0.82 [host down]

Nmap scan report for 192.168.0.83 [host down]

Nmap scan report for 192.168.0.84 [host down]

Nmap scan report for 192.168.0.85 [host down]

Nmap scan report for 192.168.0.86 [host down]

Nmap scan report for 192.168.0.87 [host down]

Nmap scan report for 192.168.0.88 [host down]

Nmap scan report for 192.168.0.89 [host down]

Nmap scan report for 192.168.0.90 [host down]

Nmap scan report for 192.168.0.91 [host down]

Nmap scan report for 192.168.0.92 [host down]

Nmap scan report for 192.168.0.93 [host down]

Nmap scan report for 192.168.0.94 [host down]

Nmap scan report for 192.168.0.95 [host down]

Nmap scan report for 192.168.0.96 [host down]

Nmap scan report for 192.168.0.97 [host down]

Nmap scan report for 192.168.0.98 [host down]

Nmap scan report for 192.168.0.99 [host down]

Nmap scan report for 192.168.0.100 [host down]

Nmap scan report for 192.168.0.101 [host down]

Nmap scan report for 192.168.0.102 [host down]

Nmap scan report for 192.168.0.103 [host down]

Nmap scan report for 192.168.0.104 [host down]

Nmap scan report for 192.168.0.105 [host down]

Nmap scan report for 192.168.0.106 [host down]

Nmap scan report for 192.168.0.107 [host down]

Nmap scan report for 192.168.0.108 [host down]

Nmap scan report for 192.168.0.109 [host down]

Nmap scan report for 192.168.0.110 [host down]

Nmap scan report for 192.168.0.111 [host down]

Nmap scan report for 192.168.0.112 [host down]

Nmap scan report for 192.168.0.113 [host down]

Nmap scan report for 192.168.0.114 [host down]

Nmap scan report for 192.168.0.115 [host down]

Nmap scan report for 192.168.0.116 [host down]

Nmap scan report for 192.168.0.117 [host down]

Nmap scan report for 192.168.0.118 [host down]

Nmap scan report for 192.168.0.119 [host down]

Nmap scan report for 192.168.0.120 [host down]

Nmap scan report for 192.168.0.121 [host down]

Nmap scan report for 192.168.0.122 [host down]

Nmap scan report for 192.168.0.123 [host down]

Nmap scan report for 192.168.0.124 [host down]

Nmap scan report for 192.168.0.125 [host down]

Nmap scan report for 192.168.0.126 [host down]

Nmap scan report for 192.168.0.127 [host down]

Nmap scan report for 192.168.0.128 [host down]

Nmap scan report for 192.168.0.129 [host down]

Nmap scan report for 192.168.0.130 [host down]

Nmap scan report for 192.168.0.131 [host down]

Nmap scan report for 192.168.0.132 [host down]

Nmap scan report for 192.168.0.133 [host down]

Nmap scan report for 192.168.0.134 [host down]

Nmap scan report for 192.168.0.135 [host down]

Nmap scan report for 192.168.0.136 [host down]

Nmap scan report for 192.168.0.137 [host down]

Nmap scan report for 192.168.0.138 [host down]

Nmap scan report for 192.168.0.139 [host down]

Nmap scan report for 192.168.0.140 [host down]

Nmap scan report for 192.168.0.141 [host down]

Nmap scan report for 192.168.0.142 [host down]

Nmap scan report for 192.168.0.143 [host down]

Nmap scan report for 192.168.0.144 [host down]

Nmap scan report for 192.168.0.145 [host down]

Nmap scan report for 192.168.0.146 [host down]

Nmap scan report for 192.168.0.147 [host down]

Nmap scan report for 192.168.0.148 [host down]

Nmap scan report for 192.168.0.149 [host down]

Nmap scan report for 192.168.0.150 [host down]

Nmap scan report for 192.168.0.151 [host down]

Nmap scan report for 192.168.0.152 [host down]

Nmap scan report for 192.168.0.153 [host down]

Nmap scan report for 192.168.0.154 [host down]

Nmap scan report for 192.168.0.155 [host down]

Nmap scan report for 192.168.0.156 [host down]

Nmap scan report for 192.168.0.157 [host down]

Nmap scan report for 192.168.0.158 [host down]

Nmap scan report for 192.168.0.159 [host down]

Nmap scan report for 192.168.0.160 [host down]

Nmap scan report for 192.168.0.161 [host down]

Nmap scan report for 192.168.0.162 [host down]

Nmap scan report for 192.168.0.163 [host down]

Nmap scan report for 192.168.0.164 [host down]

Nmap scan report for 192.168.0.165 [host down]

Nmap scan report for 192.168.0.166 [host down]

Nmap scan report for 192.168.0.167 [host down]

Nmap scan report for 192.168.0.168 [host down]

Nmap scan report for 192.168.0.169 [host down]

Nmap scan report for 192.168.0.170 [host down]

Nmap scan report for 192.168.0.171 [host down]

Nmap scan report for 192.168.0.172 [host down]

Nmap scan report for 192.168.0.173 [host down]

Nmap scan report for 192.168.0.174 [host down]

Nmap scan report for 192.168.0.175 [host down]

Nmap scan report for 192.168.0.176 [host down]

Nmap scan report for 192.168.0.177 [host down]

Nmap scan report for 192.168.0.178 [host down]

Nmap scan report for 192.168.0.179 [host down]

Nmap scan report for 192.168.0.180 [host down]

Nmap scan report for 192.168.0.181 [host down]

Nmap scan report for 192.168.0.182 [host down]

Nmap scan report for 192.168.0.183 [host down]

Nmap scan report for 192.168.0.184 [host down]

Nmap scan report for 192.168.0.185 [host down]

Nmap scan report for 192.168.0.186 [host down]

Nmap scan report for 192.168.0.187 [host down]

Nmap scan report for 192.168.0.188 [host down]

Nmap scan report for 192.168.0.189 [host down]

Nmap scan report for 192.168.0.190 [host down]

Nmap scan report for 192.168.0.191 [host down]

Nmap scan report for 192.168.0.192 [host down]

Nmap scan report for 192.168.0.193 [host down]

Nmap scan report for 192.168.0.194 [host down]

Nmap scan report for 192.168.0.195 [host down]

Nmap scan report for 192.168.0.196 [host down]

Nmap scan report for 192.168.0.197 [host down]

Nmap scan report for 192.168.0.198 [host down]

Nmap scan report for 192.168.0.199 [host down]

Nmap scan report for 192.168.0.200 [host down]

Nmap scan report for 192.168.0.201 [host down]

Nmap scan report for 192.168.0.202 [host down]

Nmap scan report for 192.168.0.203 [host down]

Nmap scan report for 192.168.0.204 [host down]

Nmap scan report for 192.168.0.205 [host down]

Nmap scan report for 192.168.0.206 [host down]

Nmap scan report for 192.168.0.207 [host down]

Nmap scan report for 192.168.0.208 [host down]

Nmap scan report for 192.168.0.209 [host down]

Nmap scan report for 192.168.0.210 [host down]

Nmap scan report for 192.168.0.211 [host down]

Nmap scan report for 192.168.0.212 [host down]

Nmap scan report for 192.168.0.213 [host down]

Nmap scan report for 192.168.0.214 [host down]

Nmap scan report for 192.168.0.215 [host down]

Nmap scan report for 192.168.0.216 [host down]

Nmap scan report for 192.168.0.217 [host down]

Nmap scan report for 192.168.0.218 [host down]

Nmap scan report for 192.168.0.219 [host down]

Nmap scan report for 192.168.0.220 [host down]

Nmap scan report for 192.168.0.221 [host down]

Nmap scan report for 192.168.0.222 [host down]

Nmap scan report for 192.168.0.223 [host down]

Nmap scan report for 192.168.0.224 [host down]

Nmap scan report for 192.168.0.225 [host down]

Nmap scan report for 192.168.0.226 [host down]

Nmap scan report for 192.168.0.227 [host down]

Nmap scan report for 192.168.0.228 [host down]

Nmap scan report for 192.168.0.229 [host down]

Nmap scan report for 192.168.0.230 [host down]

Nmap scan report for 192.168.0.231 [host down]

Nmap scan report for 192.168.0.232 [host down]

Nmap scan report for 192.168.0.233 [host down]

Nmap scan report for 192.168.0.234 [host down]

Nmap scan report for 192.168.0.235 [host down]

Nmap scan report for 192.168.0.236 [host down]

Nmap scan report for 192.168.0.237 [host down]

Nmap scan report for 192.168.0.238 [host down]

Nmap scan report for 192.168.0.239 [host down]

Nmap scan report for 192.168.0.240 [host down]

Nmap scan report for 192.168.0.241 [host down]

Nmap scan report for 192.168.0.242 [host down]

Nmap scan report for 192.168.0.243 [host down]

Nmap scan report for 192.168.0.244 [host down]

Nmap scan report for 192.168.0.245 [host down]

Nmap scan report for 192.168.0.246 [host down]

Nmap scan report for 192.168.0.247 [host down]

Nmap scan report for 192.168.0.248 [host down]

Nmap scan report for 192.168.0.249 [host down]

Nmap scan report for 192.168.0.250 [host down]

Nmap scan report for 192.168.0.251 [host down]

Nmap scan report for 192.168.0.252 [host down]

Nmap scan report for 192.168.0.253 [host down]

Nmap scan report for 192.168.0.254 [host down]

Nmap scan report for 192.168.0.255 [host down]

Initiating ARP Ping Scan at 00:14

Scanning 255 hosts [1 port/host]

Completed ARP Ping Scan at 00:14, 2.95s elapsed (255 total hosts)

Initiating Parallel DNS resolution of 255 hosts. at 00:14

Completed Parallel DNS resolution of 255 hosts. at 00:14, 0.03s elapsed

Nmap scan report for 192.168.1.0 [host down]

Nmap scan report for 192.168.1.2 [host down]

Nmap scan report for 192.168.1.3 [host down]

Nmap scan report for 192.168.1.4 [host down]

Nmap scan report for 192.168.1.5 [host down]

Nmap scan report for 192.168.1.6 [host down]

Nmap scan report for 192.168.1.7 [host down]

Nmap scan report for 192.168.1.8 [host down]

Nmap scan report for 192.168.1.9 [host down]

Nmap scan report for 192.168.1.10 [host down]

Nmap scan report for 192.168.1.11 [host down]

Nmap scan report for 192.168.1.12 [host down]

Nmap scan report for 192.168.1.13 [host down]

Nmap scan report for 192.168.1.14 [host down]

Nmap scan report for 192.168.1.15 [host down]

Nmap scan report for 192.168.1.16 [host down]

Nmap scan report for 192.168.1.17 [host down]

Nmap scan report for 192.168.1.18 [host down]

Nmap scan report for 192.168.1.19 [host down]

Nmap scan report for 192.168.1.20 [host down]

Nmap scan report for 192.168.1.21 [host down]

Nmap scan report for 192.168.1.22 [host down]

Nmap scan report for 192.168.1.23 [host down]

Nmap scan report for 192.168.1.24 [host down]

Nmap scan report for 192.168.1.25 [host down]

Nmap scan report for 192.168.1.26 [host down]

Nmap scan report for 192.168.1.27 [host down]

Nmap scan report for 192.168.1.28 [host down]

Nmap scan report for 192.168.1.29 [host down]

Nmap scan report for 192.168.1.30 [host down]

Nmap scan report for 192.168.1.31 [host down]

Nmap scan report for 192.168.1.32 [host down]

Nmap scan report for 192.168.1.33 [host down]

Nmap scan report for 192.168.1.34 [host down]

Nmap scan report for 192.168.1.35 [host down]

Nmap scan report for 192.168.1.36 [host down]

Nmap scan report for 192.168.1.37 [host down]

Nmap scan report for 192.168.1.38 [host down]

Nmap scan report for 192.168.1.39 [host down]

Nmap scan report for 192.168.1.40 [host down]

Nmap scan report for 192.168.1.41 [host down]

Nmap scan report for 192.168.1.42 [host down]

Nmap scan report for 192.168.1.43 [host down]

Nmap scan report for 192.168.1.44 [host down]

Nmap scan report for 192.168.1.45 [host down]

Nmap scan report for 192.168.1.46 [host down]

Nmap scan report for 192.168.1.47 [host down]

Nmap scan report for 192.168.1.48 [host down]

Nmap scan report for 192.168.1.49 [host down]

Nmap scan report for 192.168.1.50 [host down]

Nmap scan report for 192.168.1.51 [host down]

Nmap scan report for 192.168.1.52 [host down]

Nmap scan report for 192.168.1.53 [host down]

Nmap scan report for 192.168.1.54 [host down]

Nmap scan report for 192.168.1.55 [host down]

Nmap scan report for 192.168.1.56 [host down]

Nmap scan report for 192.168.1.57 [host down]

Nmap scan report for 192.168.1.58 [host down]

Nmap scan report for 192.168.1.59 [host down]

Nmap scan report for 192.168.1.60 [host down]

Nmap scan report for 192.168.1.61 [host down]

Nmap scan report for 192.168.1.62 [host down]

Nmap scan report for 192.168.1.63 [host down]

Nmap scan report for 192.168.1.64 [host down]

Nmap scan report for 192.168.1.65 [host down]

Nmap scan report for 192.168.1.66 [host down]

Nmap scan report for 192.168.1.67 [host down]

Nmap scan report for 192.168.1.68 [host down]

Nmap scan report for 192.168.1.69 [host down]

Nmap scan report for 192.168.1.70 [host down]

Nmap scan report for 192.168.1.71 [host down]

Nmap scan report for 192.168.1.72 [host down]

Nmap scan report for 192.168.1.73 [host down]

Nmap scan report for 192.168.1.74 [host down]

Nmap scan report for 192.168.1.75 [host down]

Nmap scan report for 192.168.1.76 [host down]

Nmap scan report for 192.168.1.77 [host down]

Nmap scan report for 192.168.1.78 [host down]

Nmap scan report for 192.168.1.79 [host down]

Nmap scan report for 192.168.1.80 [host down]

Nmap scan report for 192.168.1.81 [host down]

Nmap scan report for 192.168.1.82 [host down]

Nmap scan report for 192.168.1.83 [host down]

Nmap scan report for 192.168.1.84 [host down]

Nmap scan report for 192.168.1.85 [host down]

Nmap scan report for 192.168.1.86 [host down]

Nmap scan report for 192.168.1.87 [host down]

Nmap scan report for 192.168.1.88 [host down]

Nmap scan report for 192.168.1.89 [host down]

Nmap scan report for 192.168.1.90 [host down]

Nmap scan report for 192.168.1.91 [host down]

Nmap scan report for 192.168.1.92 [host down]

Nmap scan report for 192.168.1.93 [host down]

Nmap scan report for 192.168.1.94 [host down]

Nmap scan report for 192.168.1.95 [host down]

Nmap scan report for 192.168.1.96 [host down]

Nmap scan report for 192.168.1.97 [host down]

Nmap scan report for 192.168.1.98 [host down]

Nmap scan report for 192.168.1.99 [host down]

Nmap scan report for 192.168.1.100 [host down]

Nmap scan report for 192.168.1.101 [host down]

Nmap scan report for 192.168.1.103 [host down]

Nmap scan report for 192.168.1.104 [host down]

Nmap scan report for 192.168.1.105 [host down]

Nmap scan report for 192.168.1.106 [host down]

Nmap scan report for 192.168.1.107 [host down]

Nmap scan report for 192.168.1.108 [host down]

Nmap scan report for 192.168.1.109 [host down]

Nmap scan report for 192.168.1.110 [host down]

Nmap scan report for 192.168.1.111 [host down]

Nmap scan report for 192.168.1.112 [host down]

Nmap scan report for 192.168.1.113 [host down]

Nmap scan report for 192.168.1.114 [host down]

Nmap scan report for 192.168.1.115 [host down]

Nmap scan report for 192.168.1.116 [host down]

Nmap scan report for 192.168.1.117 [host down]

Nmap scan report for 192.168.1.118 [host down]

Nmap scan report for 192.168.1.119 [host down]

Nmap scan report for 192.168.1.120 [host down]

Nmap scan report for 192.168.1.121 [host down]

Nmap scan report for 192.168.1.122 [host down]

Nmap scan report for 192.168.1.123 [host down]

Nmap scan report for 192.168.1.124 [host down]

Nmap scan report for 192.168.1.125 [host down]

Nmap scan report for 192.168.1.126 [host down]

Nmap scan report for 192.168.1.127 [host down]

Nmap scan report for 192.168.1.128 [host down]

Nmap scan report for 192.168.1.129 [host down]

Nmap scan report for 192.168.1.130 [host down]

Nmap scan report for 192.168.1.131 [host down]

Nmap scan report for 192.168.1.132 [host down]

Nmap scan report for 192.168.1.133 [host down]

Nmap scan report for 192.168.1.134 [host down]

Nmap scan report for 192.168.1.135 [host down]

Nmap scan report for 192.168.1.136 [host down]

Nmap scan report for 192.168.1.137 [host down]

Nmap scan report for 192.168.1.138 [host down]

Nmap scan report for 192.168.1.139 [host down]

Nmap scan report for 192.168.1.140 [host down]

Nmap scan report for 192.168.1.141 [host down]

Nmap scan report for 192.168.1.142 [host down]

Nmap scan report for 192.168.1.143 [host down]

Nmap scan report for 192.168.1.144 [host down]

Nmap scan report for 192.168.1.145 [host down]

Nmap scan report for 192.168.1.146 [host down]

Nmap scan report for 192.168.1.147 [host down]

Nmap scan report for 192.168.1.148 [host down]

Nmap scan report for 192.168.1.149 [host down]

Nmap scan report for 192.168.1.150 [host down]

Nmap scan report for 192.168.1.151 [host down]

Nmap scan report for 192.168.1.152 [host down]

Nmap scan report for 192.168.1.153 [host down]

Nmap scan report for 192.168.1.154 [host down]

Nmap scan report for 192.168.1.155 [host down]

Nmap scan report for 192.168.1.156 [host down]

Nmap scan report for 192.168.1.157 [host down]

Nmap scan report for 192.168.1.158 [host down]

Nmap scan report for 192.168.1.159 [host down]

Nmap scan report for 192.168.1.160 [host down]

Nmap scan report for 192.168.1.161 [host down]

Nmap scan report for 192.168.1.162 [host down]

Nmap scan report for 192.168.1.163 [host down]

Nmap scan report for 192.168.1.164 [host down]

Nmap scan report for 192.168.1.165 [host down]

Nmap scan report for 192.168.1.166 [host down]

Nmap scan report for 192.168.1.167 [host down]

Nmap scan report for 192.168.1.168 [host down]

Nmap scan report for 192.168.1.169 [host down]

Nmap scan report for 192.168.1.170 [host down]

Nmap scan report for 192.168.1.171 [host down]

Nmap scan report for 192.168.1.172 [host down]

Nmap scan report for 192.168.1.173 [host down]

Nmap scan report for 192.168.1.174 [host down]

Nmap scan report for 192.168.1.175 [host down]

Nmap scan report for 192.168.1.176 [host down]

Nmap scan report for 192.168.1.177 [host down]

Nmap scan report for 192.168.1.178 [host down]

Nmap scan report for 192.168.1.179 [host down]

Nmap scan report for 192.168.1.180 [host down]

Nmap scan report for 192.168.1.181 [host down]

Nmap scan report for 192.168.1.182 [host down]

Nmap scan report for 192.168.1.183 [host down]

Nmap scan report for 192.168.1.184 [host down]

Nmap scan report for 192.168.1.185 [host down]

Nmap scan report for 192.168.1.186 [host down]

Nmap scan report for 192.168.1.187 [host down]

Nmap scan report for 192.168.1.188 [host down]

Nmap scan report for 192.168.1.189 [host down]

Nmap scan report for 192.168.1.190 [host down]

Nmap scan report for 192.168.1.191 [host down]

Nmap scan report for 192.168.1.192 [host down]

Nmap scan report for 192.168.1.193 [host down]

Nmap scan report for 192.168.1.194 [host down]

Nmap scan report for 192.168.1.195 [host down]

Nmap scan report for 192.168.1.196 [host down]

Nmap scan report for 192.168.1.197 [host down]

Nmap scan report for 192.168.1.198 [host down]

Nmap scan report for 192.168.1.199 [host down]

Nmap scan report for 192.168.1.200 [host down]

Nmap scan report for 192.168.1.201 [host down]

Nmap scan report for 192.168.1.202 [host down]

Nmap scan report for 192.168.1.203 [host down]

Nmap scan report for 192.168.1.204 [host down]

Nmap scan report for 192.168.1.205 [host down]

Nmap scan report for 192.168.1.206 [host down]

Nmap scan report for 192.168.1.207 [host down]

Nmap scan report for 192.168.1.208 [host down]

Nmap scan report for 192.168.1.209 [host down]

Nmap scan report for 192.168.1.210 [host down]

Nmap scan report for 192.168.1.211 [host down]

Nmap scan report for 192.168.1.212 [host down]

Nmap scan report for 192.168.1.213 [host down]

Nmap scan report for 192.168.1.214 [host down]

Nmap scan report for 192.168.1.215 [host down]

Nmap scan report for 192.168.1.216 [host down]

Nmap scan report for 192.168.1.217 [host down]

Nmap scan report for 192.168.1.218 [host down]

Nmap scan report for 192.168.1.219 [host down]

Nmap scan report for 192.168.1.220 [host down]

Nmap scan report for 192.168.1.221 [host down]

Nmap scan report for 192.168.1.222 [host down]

Nmap scan report for 192.168.1.223 [host down]

Nmap scan report for 192.168.1.224 [host down]

Nmap scan report for 192.168.1.225 [host down]

Nmap scan report for 192.168.1.226 [host down]

Nmap scan report for 192.168.1.227 [host down]

Nmap scan report for 192.168.1.228 [host down]

Nmap scan report for 192.168.1.229 [host down]

Nmap scan report for 192.168.1.230 [host down]

Nmap scan report for 192.168.1.231 [host down]

Nmap scan report for 192.168.1.232 [host down]

Nmap scan report for 192.168.1.233 [host down]

Nmap scan report for 192.168.1.234 [host down]

Nmap scan report for 192.168.1.235 [host down]

Nmap scan report for 192.168.1.236 [host down]

Nmap scan report for 192.168.1.237 [host down]

Nmap scan report for 192.168.1.238 [host down]

Nmap scan report for 192.168.1.239 [host down]

Nmap scan report for 192.168.1.240 [host down]

Nmap scan report for 192.168.1.241 [host down]

Nmap scan report for 192.168.1.242 [host down]

Nmap scan report for 192.168.1.243 [host down]

Nmap scan report for 192.168.1.244 [host down]

Nmap scan report for 192.168.1.245 [host down]

Nmap scan report for 192.168.1.246 [host down]

Nmap scan report for 192.168.1.247 [host down]

Nmap scan report for 192.168.1.248 [host down]

Nmap scan report for 192.168.1.249 [host down]

Nmap scan report for 192.168.1.250 [host down]

Nmap scan report for 192.168.1.251 [host down]

Nmap scan report for 192.168.1.252 [host down]

Nmap scan report for 192.168.1.253 [host down]

Nmap scan report for 192.168.1.254 [host down]

Nmap scan report for 192.168.1.255 [host down]

Initiating Parallel DNS resolution of 1 host. at 00:14

Completed Parallel DNS resolution of 1 host. at 00:14, 0.03s elapsed

Initiating SYN Stealth Scan at 00:14

Scanning 192.168.1.1 [1 port]

Discovered open port 80/tcp on 192.168.1.1

Completed SYN Stealth Scan at 00:14, 0.01s elapsed (1 total ports)

Initiating UDP Scan at 00:14

Scanning 192.168.1.1 [1 port]

Completed UDP Scan at 00:14, 0.23s elapsed (1 total ports)

Initiating Service scan at 00:14

Scanning 2 services on 192.168.1.1

Completed Service scan at 00:16, 82.50s elapsed (2 services on 1 host)

Initiating OS detection (try #1) against 192.168.1.1

NSE: Script scanning 192.168.1.1.

Initiating NSE at 00:16

Completed NSE at 00:16, 30.58s elapsed

Nmap scan report for 192.168.1.1

Host is up (0.0025s latency).

PORT   STATE         SERVICE VERSION

80/tcp open          http    TP-LINK WR340G WAP http config

| http-auth-finder: 

| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.1.1

|   url                     method

|_  http://192.168.1.1:80/  HTTP: Basic

| http-comments-displayer: 

| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.1.1

|     

|     Path: http://192.168.1.1:80/

|     Line number: 1

|     Comment: 

|         <!--Web Server Error Report:<HR>

|         <H1>Server Error: 401 N/A</H1>

|_        Operating System Error Nr:3997698: HTM <P><HR><H2>Access denied</H2><P><P><HR><H1>/userRpm/Index.htm</H1><P>-->

|_http-google-malware: [ERROR] No API key found. Update the variable APIKEY in http-google-malware or set it in the argument http-google-malware.api

| http-grep: 

|_  ERROR: Argument http-grep.match was not set

| http-headers: 

|   Server: Router

|   Connection: close

|   WWW-Authenticate: Basic realm="TP-LINK Wireless Router WR340G"

|   Content-Type: text/html

|   

|_  (Request type: GET)

|_http-methods: No Allow or Public header in OPTIONS response (status code 401)

|_http-title: Login Incorrect

|_http-traceroute: ERROR: Script execution failed (use -d to debug)

80/udp open|filtered http

MAC Address: 54:E6:FC:E9:3B:62 (Tp-link Technologies CO.)

Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port

Device type: media device|broadband router|general purpose

Running: VBrick embedded, Westell embedded, Wind River VxWorks

OS CPE: cpe:/h:vbrick:4300 cpe:/h:westell:wirespeed_6100 cpe:/o:windriver:vxworks

OS details: VBrick 4300 video encoder, Westell WireSpeed Dual Connect 6100 DSL router, VxWorks

Uptime guess: 0.440 days (since Fri Jan 31 13:42:54 2014)

Network Distance: 1 hop

TCP Sequence Prediction: Difficulty=151 (Good luck!)

IP ID Sequence Generation: Incremental

Service Info: Device: WAP



Host script results:

| firewalk: 

| HOP  HOST           PROTOCOL  BLOCKED PORTS

|_0    192.168.1.102  udp       80

|_ipidseq: Unknown

| traceroute-geolocation: 

|   HOP  RTT   ADDRESS      GEOLOCATION

|_  1    2.46  192.168.1.1  - ,- 



TRACEROUTE

HOP RTT     ADDRESS

1   2.46 ms 192.168.1.1



Initiating Ping Scan at 00:16

Scanning 4096 hosts [7 ports/host]

Ping Scan Timing: About 1.00% done

Ping Scan Timing: About 2.01% done; ETC: 01:07 (0:49:33 remaining)

Offline

 

#9  2014-01-31 00:26:14

  ArnVaker - Kapelusznik

ArnVaker
Kapelusznik
Skąd: Midgard
Zarejestrowany: 2009-05-06

Re: Interpretacja wyniku skanowania Nmapem

[b]Pomocnik[/b]: wystarczy w jednym wątku poruszyć dany problem. Pisz już tutaj, logi, polecenia itp. umieszczaj w tagach code: http://forum.dug.net.pl/help.php


[img]http://svn.debianart.org/themes/generic/spinner/spinner48px-moreblue.png[/img]

Offline

 

#10  2014-01-31 00:26:46

  Pomocnik - Użytkownik

Pomocnik
Użytkownik
Zarejestrowany: 2014-01-30

Re: Interpretacja wyniku skanowania Nmapem

Kod:

Completed Service scan at 00:16, 82.50s elapsed (2 services on 1 host)

Initiating OS detection (try #1) against 192.168.1.1

NSE: Script scanning 192.168.1.1.

Initiating NSE at 00:16

Completed NSE at 00:16, 30.58s elapsed

Nmap scan report for 192.168.1.1

Host is up (0.0025s latency).

PORT   STATE         SERVICE VERSION

80/tcp open          http    TP-LINK WR340G WAP http config

| http-auth-finder: 

| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.1.1

|   url                     method

|_  http://192.168.1.1:80/  HTTP: Basic

| http-comments-displayer: 

| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.1.1

|     

|     Path: http://192.168.1.1:80/

|     Line number: 1

|     Comment: 

|         <!--Web Server Error Report:<HR>

|         <H1>Server Error: 401 N/A</H1>

|_        Operating System Error Nr:3997698: HTM <P><HR><H2>Access denied</H2><P><P><HR><H1>/userRpm/Index.htm</H1><P>-->

|_http-google-malware: [ERROR] No API key found. Update the variable APIKEY in http-google-malware or set it in the argument http-google-malware.api

| http-grep: 

|_  ERROR: Argument http-grep.match was not set

| http-headers: 

|   Server: Router

|   Connection: close

|   WWW-Authenticate: Basic realm="TP-LINK Wireless Router WR340G"

|   Content-Type: text/html

|   

|_  (Request type: GET)

|_http-methods: No Allow or Public header in OPTIONS response (status code 401)

|_http-title: Login Incorrect

|_http-traceroute: ERROR: Script execution failed (use -d to debug)

80/udp open|filtered http

MAC Address: 54:E6:FC:E9:3B:62 (Tp-link Technologies CO.)

Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port

Device type: media device|broadband router|general purpose

Running: VBrick embedded, Westell embedded, Wind River VxWorks

OS CPE: cpe:/h:vbrick:4300 cpe:/h:westell:wirespeed_6100 cpe:/o:windriver:vxworks

OS details: VBrick 4300 video encoder, Westell WireSpeed Dual Connect 6100 DSL router, VxWorks

Uptime guess: 0.440 days (since Fri Jan 31 13:42:54 2014)

Network Distance: 1 hop

TCP Sequence Prediction: Difficulty=151 (Good luck!)

IP ID Sequence Generation: Incremental

Service Info: Device: WAP



Host script results:

| firewalk: 

| HOP  HOST           PROTOCOL  BLOCKED PORTS

|_0    192.168.1.102  udp       80

|_ipidseq: Unknown

| traceroute-geolocation: 

|   HOP  RTT   ADDRESS      GEOLOCATION

|_  1    2.46  192.168.1.1  - ,- 



TRACEROUTE

HOP RTT     ADDRESS

1   2.46 ms 192.168.1.1



Initiating Ping Scan at 00:16

Scanning 4096 hosts [7 ports/host]

Ping Scan Timing: About 1.00% done

Ping Scan Timing: About 2.01% done; ETC: 01:07 (0:49:33 remaining)

Ping Scan Timing: About 6.32% done; ETC: 01:07 (0:46:57 remaining)

Ping Scan Timing: About 10.95% done; ETC: 01:06 (0:44:27 remaining)

Ping Scan Timing: About 15.89% done; ETC: 01:06 (0:41:55 remaining)

Ping Scan Timing: About 20.74% done; ETC: 01:06 (0:39:25 remaining)

Offline

 

#11  2014-01-31 00:29:04

  ArnVaker - Kapelusznik

ArnVaker
Kapelusznik
Skąd: Midgard
Zarejestrowany: 2009-05-06

Re: Interpretacja wyniku skanowania Nmapem

[b]Pomocnik[/b]: wystarczy w jednym wątku poruszyć dany problem. Pisz już tutaj, logi, polecenia itp. umieszczaj w tagach code: http://forum.dug.net.pl/help.php


[img]http://svn.debianart.org/themes/generic/spinner/spinner48px-moreblue.png[/img]

Offline

 

#12  2014-01-31 00:29:15

  morfik - Cenzor wirtualnego świata

morfik
Cenzor wirtualnego świata
Skąd: ze WSI
Zarejestrowany: 2011-09-15
Serwis

Re: Interpretacja wyniku skanowania Nmapem

Nie wydają się wam dziwne te jego posty? xD

Offline

 

#13  2014-01-31 00:29:56

  ArnVaker - Kapelusznik

ArnVaker
Kapelusznik
Skąd: Midgard
Zarejestrowany: 2009-05-06

Re: Interpretacja wyniku skanowania Nmapem

No zakręcony jest kolega trochę. :)


[img]http://svn.debianart.org/themes/generic/spinner/spinner48px-moreblue.png[/img]

Offline

 

#14  2014-01-31 00:29:57

  Pomocnik - Użytkownik

Pomocnik
Użytkownik
Zarejestrowany: 2014-01-30

Re: Interpretacja wyniku skanowania Nmapem

okiej wybaczcie jestem nowym laikiem...

Offline

 

#15  2014-01-31 00:52:20

  Jacekalex - Podobno człowiek...;)

Jacekalex
Podobno człowiek...;)
Skąd: /dev/urandom
Zarejestrowany: 2008-01-07

Re: Interpretacja wyniku skanowania Nmapem

Masz jakiegoś dziwnego tego nmapa, to na Windows?
Spróbuj innej wersji - 6.25 na przykład, bo ta nowa 6.40 jest dość dziwna.
Albo przynajmniej wklejaj dokładne polecenie, jakie wrzucasz, bo ta tona jakichś komentarzy, to coś, co widzę pierwszy raz w życiu.

Ostatnio edytowany przez Jacekalex (2014-01-31 00:55:00)


W demokracji każdy naród ma taką władzę, na jaką zasługuje ;)
Si vis pacem  para bellum  ;)       |       Pozdrawiam :)

Offline

 

#16  2014-01-31 01:09:06

  Pomocnik - Użytkownik

Pomocnik
Użytkownik
Zarejestrowany: 2014-01-30

Re: Interpretacja wyniku skanowania Nmapem

Mam pytanie a propo procesów, czy mógłby ktoś luknąc i napisac które z nich są zbędne ?

Jakie porty powinienem zamknąc aby komputer był bezpieczniejszy i jakie procesy są zbędne?


cli.exe    676    TCP    1025        127.0.0.1            0.0.0.0        Listening    C:\Program Files\ATI Technologies\ATI.ACE\cli.exe    Catalyst Control Centre    CLI Application (Command Line Interface)    1.11.0.0    ATI Technologies Inc.    2014-01-31 16:04:41    DAWID-1\Kameleon        A    2014-02-01 00:48:51               
cli.exe    3088    TCP    1031        127.0.0.1            0.0.0.0        Listening    C:\Program Files\ATI Technologies\ATI.ACE\cli.exe    Catalyst Control Centre    CLI Application (Command Line Interface)    1.11.0.0    ATI Technologies Inc.    2014-01-31 16:05:29    DAWID-1\Kameleon        A    2014-02-01 00:48:51               
firefox.exe    3968    TCP    2698        192.168.1.102    80    http    213.189.45.99    host-213.189.45.99.ggc.com    Established    C:\Program Files\Mozilla Firefox\firefox.exe    Firefox    Firefox    26.0    Mozilla Corporation    2014-01-31 20:32:39    DAWID-1\Kameleon        A    2014-02-01 00:48:51    C:\Program Files\Mozilla Firefox\nss3.dll        currports opis programu - Szukaj w Google - Mozilla Firefox   
firefox.exe    3968    TCP    2462        192.168.1.102    80    http    213.189.45.99    host-213.189.45.99.ggc.com    Established    C:\Program Files\Mozilla Firefox\firefox.exe    Firefox    Firefox    26.0    Mozilla Corporation    2014-01-31 20:32:39    DAWID-1\Kameleon        A    2014-02-01 00:48:51    C:\Program Files\Mozilla Firefox\nss3.dll        currports opis programu - Szukaj w Google - Mozilla Firefox   
firefox.exe    3968    TCP    1395        127.0.0.1    1394        127.0.0.1    localhost    Established    C:\Program Files\Mozilla Firefox\firefox.exe    Firefox    Firefox    26.0    Mozilla Corporation    2014-01-31 20:32:39    DAWID-1\Kameleon        A    2014-02-01 00:48:51    C:\Program Files\Mozilla Firefox\nss3.dll        currports opis programu - Szukaj w Google - Mozilla Firefox   
firefox.exe    3968    TCP    1394        127.0.0.1    1395        127.0.0.1    localhost    Established    C:\Program Files\Mozilla Firefox\firefox.exe    Firefox    Firefox    26.0    Mozilla Corporation    2014-01-31 20:32:39    DAWID-1\Kameleon        A    2014-02-01 00:48:51    C:\Program Files\Mozilla Firefox\nss3.dll        currports opis programu - Szukaj w Google - Mozilla Firefox   
lsass.exe    968    UDP    500    isakmp    0.0.0.0                        C:\WINDOWS\system32\lsass.exe    Microsoft® Windows® Operating System    LSA Shell (Export Version)    5.1.2600.5508 (xpsp.080320-1631)    Microsoft Corporation    2014-01-31 16:04:17    NT AUTHORITY\SYSTEM    PolicyAgent, ProtectedStorage, SamSs    A    2014-02-01 00:48:51    C:\WINDOWS\system32\oakley.DLL           
lsass.exe    968    UDP    4500        0.0.0.0                        C:\WINDOWS\system32\lsass.exe    Microsoft® Windows® Operating System    LSA Shell (Export Version)    5.1.2600.5508 (xpsp.080320-1631)    Microsoft Corporation    2014-01-31 16:04:17    NT AUTHORITY\SYSTEM    PolicyAgent, ProtectedStorage, SamSs    A    2014-02-01 00:48:51    C:\WINDOWS\system32\oakley.DLL           
N360.exe    1364    TCP    1028        127.0.0.1            0.0.0.0        Listening    C:\Program Files\Norton 360\Engine\21.1.0.18\N360.exe    Norton 360    Norton 360    12.11.0.16    Symantec Corporation    2014-01-31 16:04:52        N360    AR    2014-02-01 00:48:51    C:\Program Files\Norton 360\Engine\21.1.0.18\ccL120U.dll           
svchost.exe    1244    TCP    135    epmap    0.0.0.0            0.0.0.0        Listening    C:\WINDOWS\system32\svchost.exe    Microsoft® Windows® Operating System    Generic Host Process for Win32 Services    5.1.2600.5508 (xpsp.080320-1628)    Microsoft Corporation    2014-01-31 16:04:20        RpcSs    A    2014-02-01 00:48:51    C:\WINDOWS\system32\RPCRT4.dll           
svchost.exe    1284    UDP    123    ntp    192.168.1.102                        C:\WINDOWS\system32\svchost.exe    Microsoft® Windows® Operating System    Generic Host Process for Win32 Services    5.1.2600.5508 (xpsp.080320-1628)    Microsoft Corporation    2014-01-31 16:04:21    NT AUTHORITY\SYSTEM    AudioSrv, Browser, CryptSvc, Dhcp, dmserver, ERSvc, EventSystem, FastUserSwitchingCompatibility, helpsvc, LanmanServer, lanmanworkstation, Netman, Nla, RasMan, Schedule    A    2014-02-01 00:48:51    c:\windows\system32\w32time.dll           
svchost.exe    1384    UDP    2493        0.0.0.0                        C:\WINDOWS\system32\svchost.exe    Microsoft® Windows® Operating System    Generic Host Process for Win32 Services    5.1.2600.5508 (xpsp.080320-1628)    Microsoft Corporation    2014-01-31 16:04:22        Dnscache    A    2014-02-01 00:48:51    c:\windows\system32\DNSAPI.dll           
svchost.exe    1384    UDP    3847        0.0.0.0                        C:\WINDOWS\system32\svchost.exe    Microsoft® Windows® Operating System    Generic Host Process for Win32 Services    5.1.2600.5508 (xpsp.080320-1628)    Microsoft Corporation    2014-01-31 16:04:22        Dnscache    A    2014-02-01 00:48:51    c:\windows\system32\DNSAPI.dll           
svchost.exe    1384    UDP    2490        0.0.0.0                        C:\WINDOWS\system32\svchost.exe    Microsoft® Windows® Operating System    Generic Host Process for Win32 Services    5.1.2600.5508 (xpsp.080320-1628)    Microsoft Corporation    2014-01-31 16:04:22        Dnscache    A    2014-02-01 00:48:51    c:\windows\system32\DNSAPI.dll           
svchost.exe    1384    UDP    2494        0.0.0.0                        C:\WINDOWS\system32\svchost.exe    Microsoft® Windows® Operating System    Generic Host Process for Win32 Services    5.1.2600.5508 (xpsp.080320-1628)    Microsoft Corporation    2014-01-31 16:04:22        Dnscache    A    2014-02-01 00:48:51    c:\windows\system32\DNSAPI.dll           
svchost.exe    1480    UDP    1900        192.168.1.102                        C:\WINDOWS\system32\svchost.exe    Microsoft® Windows® Operating System    Generic Host Process for Win32 Services    5.1.2600.5508 (xpsp.080320-1628)    Microsoft Corporation    2014-01-31 16:04:22        LmHosts, RemoteRegistry, SSDPSRV, WebClient    A    2014-02-01 00:48:51    c:\windows\system32\ssdpsrv.dll           
svchost.exe    1284    UDP    123    ntp    127.0.0.1                        C:\WINDOWS\system32\svchost.exe    Microsoft® Windows® Operating System    Generic Host Process for Win32 Services    5.1.2600.5508 (xpsp.080320-1628)    Microsoft Corporation    2014-01-31 16:04:21    NT AUTHORITY\SYSTEM    AudioSrv, Browser, CryptSvc, Dhcp, dmserver, ERSvc, EventSystem, FastUserSwitchingCompatibility, helpsvc, LanmanServer, lanmanworkstation, Netman, Nla, RasMan, Schedule    A    2014-02-01 00:48:51    c:\windows\system32\w32time.dll           
svchost.exe    1384    UDP    2491        0.0.0.0                        C:\WINDOWS\system32\svchost.exe    Microsoft® Windows® Operating System    Generic Host Process for Win32 Services    5.1.2600.5508 (xpsp.080320-1628)    Microsoft Corporation    2014-01-31 16:04:22        Dnscache    A    2014-02-01 00:48:51    c:\windows\system32\DNSAPI.dll           
svchost.exe    1384    UDP    2495        0.0.0.0                        C:\WINDOWS\system32\svchost.exe    Microsoft® Windows® Operating System    Generic Host Process for Win32 Services    5.1.2600.5508 (xpsp.080320-1628)    Microsoft Corporation    2014-01-31 16:04:22        Dnscache    A    2014-02-01 00:48:51    c:\windows\system32\DNSAPI.dll           
svchost.exe    1384    UDP    1026        0.0.0.0                        C:\WINDOWS\system32\svchost.exe    Microsoft® Windows® Operating System    Generic Host Process for Win32 Services    5.1.2600.5508 (xpsp.080320-1628)    Microsoft Corporation    2014-01-31 16:04:22        Dnscache    A    2014-02-01 00:48:51    c:\windows\system32\DNSAPI.dll           
svchost.exe    1480    UDP    1900        127.0.0.1                        C:\WINDOWS\system32\svchost.exe    Microsoft® Windows® Operating System    Generic Host Process for Win32 Services    5.1.2600.5508 (xpsp.080320-1628)    Microsoft Corporation    2014-01-31 16:04:22        LmHosts, RemoteRegistry, SSDPSRV, WebClient    A    2014-02-01 00:48:51    c:\windows\system32\ssdpsrv.dll           
svchost.exe    1384    UDP    1445        0.0.0.0                        C:\WINDOWS\system32\svchost.exe    Microsoft® Windows® Operating System    Generic Host Process for Win32 Services    5.1.2600.5508 (xpsp.080320-1628)    Microsoft Corporation    2014-01-31 16:04:22        Dnscache    A    2014-02-01 00:48:51    c:\windows\system32\DNSAPI.dll           
svchost.exe    1384    UDP    2492        0.0.0.0                        C:\WINDOWS\system32\svchost.exe    Microsoft® Windows® Operating System    Generic Host Process for Win32 Services    5.1.2600.5508 (xpsp.080320-1628)    Microsoft Corporation    2014-01-31 16:04:22        Dnscache    A    2014-02-01 00:48:51    c:\windows\system32\DNSAPI.dll           
svchost.exe    1384    UDP    1054        0.0.0.0                        C:\WINDOWS\system32\svchost.exe    Microsoft® Windows® Operating System    Generic Host Process for Win32 Services    5.1.2600.5508 (xpsp.080320-1628)    Microsoft Corporation    2014-01-31 16:04:22        Dnscache    A    2014-02-01 00:48:51    c:\windows\system32\DNSAPI.dll           
System    4    TCP    445    microsoft-ds    0.0.0.0            0.0.0.0        Listening                        N/A                2014-02-01 00:48:51               
System    4    TCP    139    netbios-ssn    192.168.1.102            0.0.0.0        Listening                        N/A                2014-02-01 00:48:51               
System    4    UDP    137    netbios-ns    192.168.1.102                                            N/A                2014-02-01 00:48:51               
System    4    UDP    445    microsoft-ds    0.0.0.0                                            N/A                2014-02-01 00:48:51               
System    4    UDP    138    netbios-dgm    192.168.1.102                                            N/A                2014-02-01 00:48:51               
Unknown    0    TCP    2701        192.168.1.102    80    http    37.235.55.111    111-55-235-37.static.edis.at    Time Wait                        N/A                2014-02-01 00:48:51               
Unknown    0    TCP    2697        192.168.1.102    80    http    37.235.55.111    111-55-235-37.static.edis.at    Time Wait                        N/A                2014-02-01 00:48:51               

[color=#FF0000]

Offline

 

#17  2014-01-31 01:47:07

  menel - Użytkownik

menel
Użytkownik
Zarejestrowany: 2013-11-02

Re: Interpretacja wyniku skanowania Nmapem

Jakie porty powinienem zamknąc aby komputer był bezpieczniejszy[/quote]
Wszystkie!

Kod:

Starting Nmap 6.40 ( http://nmap.org ) at 2014-01-31 01:21 CET
Nmap scan report for 192.168.0.101
Host is up (0.000020s latency).
All 65535 scanned ports on 192.168.0.101 are closed

Mam pytanie a propo procesów, czy mógłby ktoś luknąc i napisac które z nich są zbędne ?[/quote]
Wszystkie!, wywal to wpizdu i instaluj linuksa;)

Offline

 

#18  2014-01-31 03:00:58

  garrick - Użytkownik

garrick
Użytkownik
Zarejestrowany: 2013-12-30

Re: Interpretacja wyniku skanowania Nmapem

zamknij kompa do szafy


Debian/xfce/*box

[url=https://docs.google.com/document/d/1J2tqbLFvsfIAh9QaagiLQWFMoN6CxPsGmo9jRVW7Klk/edit?usp=sharing][img]http://s18.postimg.org/x7bxep3t1/res.gif[/img][/url]

Offline

 

#19  2014-01-31 03:08:03

  Jacekalex - Podobno człowiek...;)

Jacekalex
Podobno człowiek...;)
Skąd: /dev/urandom
Zarejestrowany: 2008-01-07

Re: Interpretacja wyniku skanowania Nmapem

@Pomocnik

Nie ten dział, tu się przerabia sieci i serwery Linuksowe, znaczniki CODE,
jak wklejasz śmietnik, a jak nie wiesz, jakie to są procesy, to pytaj tutaj:
http://forum.gazeta.pl/forum/f,430,Wirusy_trojany_spyware.html

Na forach Linuksowych trudniej znaleźć kogoś, kto na codzień siedzi z nosem w procesach Windows.


W demokracji każdy naród ma taką władzę, na jaką zasługuje ;)
Si vis pacem  para bellum  ;)       |       Pozdrawiam :)

Offline

 

#20  2014-01-31 03:37:56

  Pomocnik - Użytkownik

Pomocnik
Użytkownik
Zarejestrowany: 2014-01-30

Re: Interpretacja wyniku skanowania Nmapem

ahh ten linux ciekawie by było przejść na linuxa dla zielonych

Offline

 

#21  2014-01-31 04:12:57

  menel - Użytkownik

menel
Użytkownik
Zarejestrowany: 2013-11-02

Re: Interpretacja wyniku skanowania Nmapem

ciekawie to by było przejść koło rozebranej dupy z rozkładówki plejboja, linuksa to się instaluje i używa, nie ma na co czekać kolego;)

Offline

 

#22  2014-01-31 06:09:40

  Pomocnik - Użytkownik

Pomocnik
Użytkownik
Zarejestrowany: 2014-01-30

Re: Interpretacja wyniku skanowania Nmapem

Kod:

Initiating Parallel DNS resolution of 1 host. at 04:09

Completed Parallel DNS resolution of 1 host. at 04:09, 0.05s elapsed

Initiating SYN Stealth Scan at 04:09

Scanning 192.168.1.1 [1 port]

Completed SYN Stealth Scan at 04:09, 0.44s elapsed (1 total ports)

Initiating UDP Scan at 04:09

Scanning 192.168.1.1 [1 port]

Discovered open port 53/udp on 192.168.1.1

Completed UDP Scan at 04:09, 0.44s elapsed (1 total ports)

Initiating Service scan at 04:09

Scanning 1 service on 192.168.1.1

Completed Service scan at 04:10, 82.59s elapsed (1 service on 1 host)

Initiating OS detection (try #1) against 192.168.1.1

Retrying OS detection (try #2) against 192.168.1.1

NSE: Script scanning 192.168.1.1.

Initiating NSE at 04:11

Completed NSE at 04:11, 4.75s elapsed

Nmap scan report for 192.168.1.1

Host is up (0.025s latency).

PORT   STATE    SERVICE VERSION

53/tcp filtered domain

53/udp open     domain?

| dns-client-subnet-scan: 

|_  ERROR: dns-client-subnet-scan.domain was not specified

|_dns-recursion: Recursion appears to be enabled

1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :

SF-Port53-UDP:V=6.40%I=7%D=2/1%Time=52EC6574%P=i686-pc-windows-windows%r(D

SF:NSVersionBindReq,C,"\0\x06\x81\x84\0\0\0\0\0\0\0\0")%r(DNSStatusRequest

SF:,C,"\0\0\x90\x84\0\0\0\0\0\0\0\0")%r(RPCCheck,C,"r\xfe\x99\x11\0\0\0\0\

SF:0\0\0\0")%r(NBTStat,32,"\x80\xf0\x81\x83\0\x01\0\0\0\0\0\0\x20ckaaaaaaa

SF:aaaaaaaaaaaaaaaaaaaaaaa\0\0!\0\x01")%r(SIPOptions,C,"OP\xd0\x01\0\0\0\0

SF:\0\0\0\0")%r(NTPRequest,11,"\xe3\0\x80\x11\0\x01\0\0\0\0\0\0\0\0\0\0\0"

SF:)%r(SNMPv1public,C,"0\x82\x80\x01\0\0\0\0\0\0\0\0")%r(SNMPv3GetRequest,

SF:C,"0:\x80\x01\0\0\0\0\0\0\0\0")%r(AFSVersionRequest,C,"\0\0\x81\x01\0\0

SF:\0\0\0\0\0\0")%r(DNS-SD,2E,"\0\0\x81\x83\0\x01\0\0\0\0\0\0\t_services\x

SF:07_dns-sd\x04_udp\x05local\0\0\x0c\0\x01")%r(Citrix,C,"\x1e\0\x81\x11\0

SF:\0\0\0\0\0\0\0")%r(Kerberos,C,"j\x81\xe8\x11\0\0\0\0\0\0\0\0")%r(sybase

SF:anywhere,C,"\x1b\0\x80\x11\0\0\0\0\0\0\0\0");

MAC Address: 54:E6:FC:E9:3B:62 (Tp-link Technologies CO.)

Too many fingerprints match this host to give specific OS details

Network Distance: 1 hop



Host script results:

| firewalk: 

| HOP  HOST           PROTOCOL  BLOCKED PORTS

|_0    192.168.1.102  tcp       53

| traceroute-geolocation: 

|   HOP  RTT    ADDRESS      GEOLOCATION

|_  1    24.89  192.168.1.1  - ,- 



TRACEROUTE

HOP RTT      ADDRESS

1   24.89 ms 192.168.1.1



Initiating Ping Scan at 04:11

Scanning 4096 hosts [7 ports/host]

Ping Scan Timing: About 1.00% done

Ping Scan Timing: About 1.99% done; ETC: 05:02 (0:49:57 remaining)

Ping Scan Timing: About 6.17% done; ETC: 05:02 (0:47:23 remaining)

Ping Scan Timing: About 10.96% done; ETC: 05:01 (0:44:49 remaining)

ciekawe co on oznacza heeeeee

wpisałem to i wyskoczyło mi to coś źle zrobiłem czy nie znam chińskiego hmmm


nmap -p 80 192.168.0.0./16 -sV       Slow comprehensive scan

Kod:

Starting Nmap 6.40 ( http://nmap.org ) at 2014-02-01 04:25 W. Europe Standard Time

NSE: failed to initialize the script engine:

C:\Program Files\Nmap/nse_main.lua:146: module 'stdnse' not found:

    NSE failed to find nselib/stdnse.lua in search paths.

    no field package.preload['stdnse']

    no file 'C:\Program Files\Nmap\lua\stdnse.lua'

    no file 'C:\Program Files\Nmap\lua\stdnse\init.lua'

    no file 'C:\Program Files\Nmap\stdnse.lua'

    no file 'C:\Program Files\Nmap\stdnse\init.lua'

    no file '.\stdnse.lua'

    no file 'C:\Program Files\Nmap\stdnse.dll'

    no file 'C:\Program Files\Nmap\loadall.dll'

    no file '.\stdnse.dll'

stack traceback:

    [C]: in function 'require'

    C:\Program Files\Nmap/nse_main.lua:146: in main chunk

    [C]: in ?



QUITTING!

[quote=menel]ciekawie to by było przejść koło rozebranej dupy z rozkładówki plejboja, linuksa to się instaluje i używa, nie ma na co czekać kolego;)[/quote]
dobre dobre jeszcze tego to joo nie słyszoł hehe

[quote=menel]ciekawie to by było przejść koło rozebranej dupy z rozkładówki plejboja, linuksa to się instaluje i używa, nie ma na co czekać kolego;)[/quote]
a jakiego byś polecił linuxa jeżeli nigdy nie miałem z nim styczności ?

Offline

 

#23  2014-01-31 13:40:53

  menel - Użytkownik

menel
Użytkownik
Zarejestrowany: 2013-11-02

Re: Interpretacja wyniku skanowania Nmapem

a jakiego byś polecił linuxa jeżeli nigdy nie miałem z nim styczności ?[/quote]
http://jakilinux.org/jaki-linux/

poczytaj, popróbuj, w razie problemów masz zawsze fora, większość z nas tak zaczynała...powodzenia;)

Ostatnio edytowany przez menel (2014-01-31 13:50:34)

Offline

 

#24  2014-01-31 14:07:18

  ba10 - Członek DUG

ba10
Członek DUG
Skąd: jesteś ?
Zarejestrowany: 2006-03-07
Serwis

Re: Interpretacja wyniku skanowania Nmapem

[quote=Pomocnik]a jakiego byś polecił linuxa jeżeli nigdy nie miałem z nim styczności ?[/quote]
Szkoda, że nie czytasz na jakich forach umieszczasz wątki, bo gdybyś przeczytał i się zainteresował, wiedziałbyś, że jest to forum dotyczące [url=http://www.debian.org/]dystrybucji Debian[/url] i zapewne większość taką dystrybucje poleci ;)

Ostatnio edytowany przez ba10 (2014-01-31 14:08:00)


"Jeżeli chcesz się nauczyć Linuksa, to pierwsze co musisz zrobić to odrzucić wszelkie przyzwyczajenia wyniesione z poprzedniego systemu. Twoja wiedza jest o tyle zgubna, że daje Ci poczucie że coś jednak wiesz — jednak w kontekście Linuksa prawdopodobnie nie wiesz jeszcze nic." Minio
Mój [url=jarekw.eu]Blog[/url], a później [url=tanczymy.com]Tańczymy[/url] ;)

Offline

 

#25  2014-01-31 14:27:08

  menel - Użytkownik

menel
Użytkownik
Zarejestrowany: 2013-11-02

Re: Interpretacja wyniku skanowania Nmapem

[b]ba10[/b] na głęboką wodę wrzucasz chłopa;) można zacząć od debiana czemu nie, ale po co ma się zniechęcać na wjazd... niech zacznie od minta albo jakiegoś *buntu czy coś w ten deseń a jak zostanie przy linuksie to i tak skończy wcześniej czy później na debianie;)

Offline

 

Stopka forum

Powered by PunBB
© Copyright 2002–2005 Rickard Andersson
To nie jest tylko forum, to nasza mała ojczyzna ;-)

[ Generated in 0.016 seconds, 10 queries executed ]

Informacje debugowania

Time (s) Query
0.00021 SET CHARSET latin2
0.00006 SET NAMES latin2
0.00149 SELECT u.*, g.*, o.logged FROM punbb_users AS u INNER JOIN punbb_groups AS g ON u.group_id=g.g_id LEFT JOIN punbb_online AS o ON o.ident='18.226.93.138' WHERE u.id=1
0.00101 REPLACE INTO punbb_online (user_id, ident, logged) VALUES(1, '18.226.93.138', 1733056637)
0.00056 SELECT * FROM punbb_online WHERE logged<1733056337
0.00120 DELETE FROM punbb_online WHERE ident='85.208.96.209'
0.00062 SELECT t.subject, t.closed, t.num_replies, t.sticky, f.id AS forum_id, f.forum_name, f.moderators, fp.post_replies, 0 FROM punbb_topics AS t INNER JOIN punbb_forums AS f ON f.id=t.forum_id LEFT JOIN punbb_forum_perms AS fp ON (fp.forum_id=f.id AND fp.group_id=3) WHERE (fp.read_forum IS NULL OR fp.read_forum=1) AND t.id=25122 AND t.moved_to IS NULL
0.00009 SELECT search_for, replace_with FROM punbb_censoring
0.00498 SELECT u.email, u.title, u.url, u.location, u.use_avatar, u.signature, u.email_setting, u.num_posts, u.registered, u.admin_note, p.id, p.poster AS username, p.poster_id, p.poster_ip, p.poster_email, p.message, p.hide_smilies, p.posted, p.edited, p.edited_by, g.g_id, g.g_user_title, o.user_id AS is_online FROM punbb_posts AS p INNER JOIN punbb_users AS u ON u.id=p.poster_id INNER JOIN punbb_groups AS g ON g.g_id=u.group_id LEFT JOIN punbb_online AS o ON (o.user_id=u.id AND o.user_id!=1 AND o.idle=0) WHERE p.topic_id=25122 ORDER BY p.id LIMIT 0,25
0.00139 UPDATE punbb_topics SET num_views=num_views+1 WHERE id=25122
Total query time: 0.01161 s