BackTrack 5 tools

1. fping 可以指定一个ip范围

root@root:~# fping -g 10.9.128.0 10.9.128.255
10.9.128.1 is alive
10.9.128.6 is alive
10.9.128.7 is alive
10.9.128.9 is alive
10.9.128.10 is alive
10.9.128.11 is alive

2. httprint

root@root:/pentest/enumeration/www/httprint/linux# ./httprint -h 202.108.253.37 -s signatures.txt 
httprint v0.301 (beta) - web server fingerprinting tool
(c) 2003-2005 net-square solutions pvt. ltd. - see readme.txt
http://net-square.com/httprint/
httprint@net-square.com

Finger Printing on http://202.108.253.37:80/
Finger Printing Completed on http://202.108.253.37:80/
--------------------------------------------------
Host: 202.108.253.37
Derived Signature:
nginx
811C9DC5E2CE6926811C9DC5811C9DC5811C9DC594DF1BD04276E4BB811C9DC5
0D7645B5811C9DC5811C9DC5CD37187C11DDC7D78398721E811C9DC5811C9DC5
E2CE6926811C9DC5811C9DC5811C9DC5E2CE6927811C9DC5E2CE6926811C9DC5
811C9DC5E1CE67B1811C9DC5811C9DC5811C9DC56ED3C2956ED3C295E2CE6923
E2CE69236ED3C295811C9DC5E2CE6927E2CE6923

Banner Reported: nginx
Banner Deduced: Microsoft-IIS/6.0
Score: 90
Confidence: 54.22
------------------------
Scores: 
Microsoft-IIS/6.0: 90 54.22
Apache/1.3.27: 75 27.68
Apache/1.3.26: 75 27.68
Apache/1.3.[4-24]: 75 27.68
Apache/1.3.[1-3]: 75 27.68
Apache/2.0.x: 72 23.67
thttpd: 69 20.06
Agranat-EmWeb: 68 18.93
Apache/1.2.6: 65 15.80
Lotus-Domino/6.x: 64 14.83
Netscape-Enterprise/4.1: 62 13.01
TUX/2.0 (Linux): 62 13.01
Microsoft-IIS/4.0: 57  9.08
Microsoft-IIS/5.0: 57  9.08
Microsoft-IIS/5.0 ASP.NET: 57  9.08
Microsoft-IIS/5.1: 57  9.08
Netscape-Enterprise/6.0: 57  9.08
Netscape-Enterprise/3.6 SP2: 54  7.12
cisco-IOS: 54  7.12
Lexmark Optra Printer: 52  5.96
Netscape-Enterprise/3.5.1G: 49  4.44
Com21 Cable Modem: 49  4.44
SMC Wireless Router 7004VWBR: 49  4.44
MikroTik RouterOS: 49  4.44
IDS-Server/3.2.2: 49  4.44
Belkin Wireless router: 49  4.44
WebSitePro/2.3.18: 49  4.44
VisualRoute 2005 Server Edition: 49  4.44
Linksys WRTP54G: 49  4.44
JC-HTTPD/1.14.18: 49  4.44
BaseHTTP/0.3 Python/2p3.3 edna/0.4: 47  3.56
RomPager/4.07 UPnP/1.0: 47  3.56
Zeus/4.1: 46  3.16
HP-ChaiServer/3.0: 44  2.44
Oracle Servlet Engine: 44  2.44
Zeus/4_2: 43  2.11
Zope/2.6.0 ZServer/1.1b1: 41  1.52
Jetty (unverified): 40  1.26
Netscape-Enterprise/3.5.1: 39  1.02
Domino-Go-Webserver/4.6.2.8: 39  1.02
AOLserver/3.5.6: 39  1.02
TightVNC: 39  1.02
dwhttpd (Sun Answerbook): 39  1.02
Intel NetportExpressPro/1.0: 39  1.02
Boa/0.94.11: 39  1.02
RealVNC/4.0: 39  1.02
GWS/2.1 Google Web Server: 39  1.02
Stronghold/2.4.2-Apache/1.3.x: 21  0.64
AOLserver/3.4.2-3.5.1: 21  0.64
Jana Server/1.45: 21  0.64
Xerver_v3: 21  0.64
Lotus-Domino/5.x: 24  0.64
Microsoft-IIS/5.0 Virtual Host: 24  0.64
Adaptec ASM 1.1: 24  0.64
WebLogic XMLX Module 8.1: 24  0.64
SunONE WebServer 6.0: 20  0.63
Netscape-Enterprise/4.1: 20  0.63
MiniServ/0.01 Webmin: 20  0.63
CompaqHTTPServer/4.2: 20  0.63
fnord: 20  0.63
Oracle XML DB/Oracle9i: 25  0.62
Allied Telesyn Ethernet switch: 25  0.62
JRun Web Server: 25  0.62
Linksys AP2: 37  0.59
Linksys with Talisman firmware: 37  0.59
Orion/2.0x: 27  0.55
Jetty/4.2.2: 15  0.49
Netgear MR814v2 - IP_SHARER WEB 1.0: 15  0.49
Tanberg 880 video conf: 15  0.49
WebLogic Server 8.x: 14  0.45
EHTTP/1.1: 14  0.45
WebLogic Server 8.1: 14  0.45
Tomcat Web Server/3.2.3: 14  0.45
Hewlett Packard xjet: 29  0.43
HP Jet-Direct Print Server: 29  0.43
Resin/3.0.8: 29  0.43
AssureLogic/2.0: 13  0.41
Netscape-Enterprise/3.6: 30  0.36
AkamaiGHost: 30  0.36
Cisco-HTTP: 10  0.28
CompaqHTTPServer-SSL/4.2: 10  0.28
3Com/v1.0: 10  0.28
Snap Appliances, Inc./3.x: 10  0.28
Microsoft ISA Server (internal): 10  0.28
Microsoft ISA Server (external): 10  0.28
NetPort Software 1.1: 10  0.28
WebSENSE/1.0: 10  0.28
Cisco Pix 6.2: 10  0.28
MailEnable-HTTP/5.0: 10  0.28
MiniServ/0.01: 10  0.28
Tcl-Webserver/3.4.2: 10  0.28
Stronghold/4.0-Apache/1.3.x: 31  0.27
EMWHTTPD/1.0: 35  0.24
Ipswitch-IMail/8.12: 35  0.24
Surgemail webmail (DManager): 35  0.24
Apache-Tomcat/4.1.29: 32  0.16
Microsoft-IIS/URLScan: 34  0.09
NetWare-Enterprise-Web-Server/5.1: 34  0.09
CompaqHTTPServer/1.0: 34  0.09
Linksys Print Server: 5  0.08
Zeus/4.0: 33  0.04
squid/2.5.STABLE5: 33  0.04
RemotelyAnywhere: 0  0.00
Linksys AP1: 0  0.00
Linksys Router: 0  0.00
ServletExec: 0  0.00
NetBuilderHTTPDv0.1: 0  0.00
Linksys BEFSR41/BEFSR11/BEFSRU31: 0  0.00
Ubicom/1.1: 0  0.00
Ubicom/1.1 802.11b: 0  0.00

--------------------------------------------------

3. dmitry

root@root:~# dmitry -i 202.108.253.37
Deepmagic Information Gathering Tool
"There be some deep magic going on"

ERROR: Unable to locate Host Name for 202.108.253.37
Continuing with limited modules
HostIP:202.108.253.37
HostName:

Gathered Inet-whois information for 202.108.253.37
---------------------------------


inetnum:        202.108.0.0 - 202.108.255.255
netname:        UNICOM-BJ
descr:          China Unicom Beijing province network
descr:          China Unicom
country:        CN
admin-c:        CH1302-AP
tech-c:         SY21-AP
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CNCGROUP-BJ
mnt-routes:     MAINT-CNCGROUP-RR
changed:        hm-changed@apnic.net 20031017
status:         ALLOCATED PORTABLE
changed:        hm-changed@apnic.net 20060124
changed:        hm-changed@apnic.net 20090507
changed:        hm-changed@apnic.net 20090508
source:         APNIC

person:         ChinaUnicom Hostmaster
nic-hdl:        CH1302-AP
e-mail:         abuse@cnc-noc.net
address:        No.21,Jin-Rong Street
address:        Beijing,100033
address:        P.R.China
phone:          +86-10-66259764
fax-no:         +86-10-66259764
country:        CN
changed:        abuse@cnc-noc.net 20090408
mnt-by:         MAINT-CNCGROUP
source:         APNIC

person:         sun ying
address:        fu xing men nei da jie 97, Xicheng District
address:        Beijing 100800
country:        CN
phone:          +86-10-66030657
fax-no:         +86-10-66078815
e-mail:         hostmast@publicf.bta.net.cn
nic-hdl:        SY21-AP
mnt-by:         MAINT-CNCGROUP-BJ
changed:        suny@publicf.bta.net.cn 19980824
changed:        hm-changed@apnic.net 20060717
changed:        hostmast@publicf.bta.net.cn  20090630
source:         APNIC



All scans completed, exiting

root@root:~# dmitry -w soufun.com
Deepmagic Information Gathering Tool
"There be some deep magic going on"

HostIP:202.108.253.57
HostName:soufun.com

Gathered Inic-whois information for soufun.com
---------------------------------

   Domain Name: SOUFUN.COM
   Registrar: NETWORK SOLUTIONS, LLC.
   Whois Server: whois.networksolutions.com
   Referral URL: http://www.networksolutions.com/en_US/
   Name Server: NS.SOUFUN.COM
   Name Server: NS2.SOUFUN.COM
   Name Server: NS3.SOUFUN.COM
   Status: clientTransferProhibited
   Updated Date: 29-nov-2012
   Creation Date: 15-apr-1999
   Expiration Date: 15-apr-2016

>>> Last update of whois database: Sat, 23 Feb 2013 03:25:42 UTC <<<

4. arp spoof

需要设置ip_forward为1

对所有host响应gateway的mac是eth0的MAC

root@root:~# arpspoof -i eth0  10.9.128.1
0:1c:25:1e:d6:b7 ff:ff:ff:ff:ff:ff 0806 42: arp reply 10.9.128.1 is-at 0:1c:25:1e:d6:b7
0:1c:25:1e:d6:b7 ff:ff:ff:ff:ff:ff 0806 42: arp reply 10.9.128.1 is-at 0:1c:25:1e:d6:b7


5. dnsenum

root@root:/pentest/enumeration/dns/dnsenum# ./dnsenum.pl --enum nuomi.com
dnsenum.pl VERSION:1.2
Warning: can't load Net::Whois::IP module, whois queries disabled.

-----   nuomi.com   -----

-----------------
Host's addresses:
-----------------
 nuomi.com.	900	IN	A	123.125.38.239
 nuomi.com.	900	IN	A	123.125.38.240
 nuomi.com.	900	IN	A	123.125.38.241
 nuomi.com.	900	IN	A	123.125.38.2
 nuomi.com.	900	IN	A	123.125.38.3

-------------
Name servers:
-------------
  ns1.renren.com.	211684	IN	A	123.125.40.215
  ns2.renren.com.	211684	IN	A	220.181.180.7
  ns3.renren.com.	211684	IN	A	60.28.219.15

-----------
MX record:
-----------
  mail.nuomi.com.	900	IN	A	123.125.36.126

---------------------
Trying Zonetransfers:
---------------------

 Trying zonetransfer for nuomi.com on ns2.renren.com ... 

 Trying zonetransfer for nuomi.com on ns3.renren.com ... 

 Trying zonetransfer for nuomi.com on ns1.renren.com ... 

--------------------------------------------
Scraping nuomi.com subdomains from Google:
--------------------------------------------

 ----   Google search page: 1   ---- 

 ----   Google search page: 2   ---- 

 ----   Google search page: 3   ---- 

 ----   Google search page: 4   ---- 

 ----   Google search page: 5   ---- 

 ----   Google search page: 6   ---- 

 ----   Google search page: 7   ---- 

 ----   Google search page: 8   ---- 

 ----   Google search page: 9   ---- 

 ----   Google search page: 10   ---- 

 ----   Google search page: 11   ---- 

 ----   Google search page: 12   ---- 

 ----   Google search page: 13   ---- 

 ----   Google search page: 14   ---- 
Use of uninitialized value in subroutine entry at ./dnsenum.pl line 894.

 Google results: 0
  perhaps Google is blocking our queries.
 Check manually.

brute force file not specified, bay.

6. netenum -- find all the live hosts.

root@root:/pentest/enumeration/irpas# ifconfig 
eth0      Link encap:Ethernet  HWaddr 00:1c:25:1e:d6:b7  
          inet6 addr: fe80::21c:25ff:fe1e:d6b7/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:384901 errors:0 dropped:0 overruns:0 frame:0
          TX packets:341984 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:553787460 (553.7 MB)  TX bytes:29804045 (29.8 MB)
          Interrupt:20 Memory:fe000000-fe020000 

lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:742 errors:0 dropped:0 overruns:0 frame:0
          TX packets:742 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:274352 (274.3 KB)  TX bytes:274352 (274.3 KB)

mon0      Link encap:UNSPEC  HWaddr 00-1F-3B-23-54-59-30-30-00-00-00-00-00-00-00-00  
          UP BROADCAST RUNNING PROMISC MULTICAST  MTU:1500  Metric:1
          RX packets:3023258 errors:0 dropped:2281854 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:864092462 (864.0 MB)  TX bytes:0 (0.0 B)

ppp0      Link encap:Point-to-Point Protocol  
          inet addr:10.9.131.2  P-t-P:10.9.128.1  Mask:255.255.255.255
          UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1492  Metric:1
          RX packets:3520 errors:0 dropped:0 overruns:0 frame:0
          TX packets:3883 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:3 
          RX bytes:3712512 (3.7 MB)  TX bytes:388275 (388.2 KB)

wlan0     Link encap:Ethernet  HWaddr 00:1f:3b:23:54:59  
          UP BROADCAST MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

root@root:/pentest/enumeration/irpas# ./netenum 10.9.128.1/24 5 1
118 targets found
10.9.128.1
10.9.128.2
10.9.128.3
10.9.128.5
10.9.128.14
10.9.128.15
10.9.128.16
10.9.128.22
10.9.128.23
10.9.128.24
10.9.128.25
10.9.128.26
10.9.128.27
10.9.128.28
10.9.128.33
10.9.128.34
10.9.128.42
10.9.128.43
10.9.128.44
10.9.128.45
10.9.128.47
10.9.128.46
10.9.128.50
10.9.128.54
10.9.128.55
10.9.128.56
10.9.128.59
10.9.128.64
10.9.128.69
10.9.128.74
10.9.128.76
10.9.128.77
10.9.128.78
10.9.128.79
10.9.128.86
10.9.128.87
10.9.128.88
10.9.128.89
10.9.128.95
10.9.128.96
10.9.128.97
10.9.128.99
10.9.128.100
10.9.128.101
10.9.128.102
10.9.128.103
10.9.128.105
10.9.128.107
10.9.128.108
10.9.128.109
10.9.128.111
10.9.128.112
10.9.128.117
10.9.128.118
10.9.128.125
10.9.128.126
10.9.128.127
10.9.128.130
10.9.128.135
10.9.128.136
10.9.128.138
10.9.128.139
10.9.128.140
10.9.128.141
10.9.128.142
10.9.128.143
10.9.128.144
10.9.128.146
10.9.128.147
10.9.128.149
10.9.128.150
10.9.128.152
10.9.128.154
10.9.128.156
10.9.128.157
10.9.128.159
10.9.128.162
10.9.128.163
10.9.128.166
10.9.128.167
10.9.128.168
10.9.128.169
10.9.128.170
10.9.128.176
10.9.128.178
10.9.128.179
10.9.128.181
10.9.128.182
10.9.128.185
10.9.128.186
10.9.128.187
10.9.128.190
10.9.128.196
10.9.128.197
10.9.128.199
10.9.128.203
10.9.128.208
10.9.128.210
10.9.128.211
10.9.128.212
10.9.128.214
10.9.128.215
10.9.128.216
10.9.128.219
10.9.128.220
10.9.128.221
10.9.128.226
10.9.128.227
10.9.128.228
10.9.128.231
10.9.128.234
10.9.128.235
10.9.128.240
10.9.128.241
10.9.128.245
10.9.128.246
10.9.128.247
10.9.128.253

7. protos

root@root:/pentest/enumeration/irpas# ./protos -i ppp0 -d 123.125.38.239 -v
123.125.38.239 is alive
TARGET	123.125.38.239
Running in verbose mode
	Afterscan delay is 3
	running in fast scan - pause every 1 probes
	continuing scan afterwards for 3 secs
	supported protocols will be reported
	you supplied the target(s) 123.125.38.239
Scanning 123.125.38.239
Port unreachable - therefore protocol UDP is running
Port unreachable - therefore protocol UDP is running
Port unreachable - therefore protocol UDP is running
Port unreachable - therefore protocol UDP is running
Port unreachable - therefore protocol UDP is running
>>>>>>>>> RESULTS >>>>>>>>>>

123.125.38.239 may be running (did not negate):
	ICMP IGMP ST TCP IGP NVP-II ARGUS XNET UDP DCN-MEAS PRM TRUNK-1 LEAF-1 RDP ISO-TP4 MFE-NSP SEP IDPR DDP TP++ IPv6 IPv6-Route IDRP GRE BNA AH SWIPE MOBILE SKIP IPv6-NoNxt 61 63 KRYPTOLAN IPPC SAT-MON IPCV CPHB PVP SUN-ND WB-EXPAK VMTP VINES NSFNET-IGP TCF OSPFIGP LARP AX.25 MICP ETHERIP 99PrivEncr IFMP PIM SCPS A/N SNP IPX-in-IP VRRP IATP SRP SMP PTP FIRE CRUDP IPLT PIPE FC 135 137 139 141 144 146 148 150 152 154 156 158 160 162 164 166 168 170 172 174 176 178 180 182 184 186 188 190 192 194 196 198 200 202 204 206 208 210 212 214 216 218 220 222 224 226 228 230 232 234 236 238 240 242 244 246 248 250 252 254 

root@root:/pentest/enumeration/irpas# ./protos -i ppp0 -d 10.9.128.1 -v
10.9.128.1 is alive
TARGET	10.9.128.1
Running in verbose mode
	Afterscan delay is 3
	running in fast scan - pause every 1 probes
	continuing scan afterwards for 3 secs
	supported protocols will be reported
	you supplied the target(s) 10.9.128.1
Scanning 10.9.128.1
Port unreachable - therefore protocol UDP is running
Port unreachable - therefore protocol UDP is running
Port unreachable - therefore protocol UDP is running
Port unreachable - therefore protocol UDP is running
Port unreachable - therefore protocol UDP is running
>>>>>>>>> RESULTS >>>>>>>>>>

10.9.128.1 may be running (did not negate):
	ICMP IGMP IPenc TCP UDP GRE 

8. nmap

root@root:~# nmap -v -A nuomi.com

Starting Nmap 5.51 ( http://nmap.org ) at 2013-02-22 10:42 EST
NSE: Loaded 57 scripts for scanning.
Initiating Ping Scan at 10:42
Scanning nuomi.com (123.125.38.239) [4 ports]
Completed Ping Scan at 10:42, 0.13s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 10:42
Completed Parallel DNS resolution of 1 host. at 10:42, 0.00s elapsed
Initiating SYN Stealth Scan at 10:42
Scanning nuomi.com (123.125.38.239) [1000 ports]
Discovered open port 80/tcp on 123.125.38.239
Completed SYN Stealth Scan at 10:43, 4.32s elapsed (1000 total ports)
Initiating Service scan at 10:43
Scanning 1 service on nuomi.com (123.125.38.239)
Completed Service scan at 10:43, 6.04s elapsed (1 service on 1 host)
Initiating OS detection (try #1) against nuomi.com (123.125.38.239)
Retrying OS detection (try #2) against nuomi.com (123.125.38.239)
NSE: Script scanning 123.125.38.239.
Initiating NSE at 10:43
Completed NSE at 10:43, 0.10s elapsed
Nmap scan report for nuomi.com (123.125.38.239)
Host is up (0.017s latency).
Other addresses for nuomi.com (not scanned): 123.125.38.240 123.125.38.241 123.125.38.2 123.125.38.3
Not shown: 999 filtered ports
PORT   STATE SERVICE VERSION
80/tcp open  http    nginx 1.2.0
|_http-methods: No Allow or Public header in OPTIONS response (status code 301)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 2.6.9 (92%), Linux 2.6.9 - 2.6.27 (91%), ZoneAlarm Z100G WAP (91%), Linux 2.6.11 (89%), Linux 2.6.9 (CentOS 4.4) (89%), Riverbed Steelhead 200 proxy server (89%), Linux 2.6.18 (88%), Linux 2.6.28 (88%), Linux 2.6.30 (88%), Linux 2.6.5 (88%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 8.039 days (since Thu Feb 14 09:46:30 2013)
TCP Sequence Prediction: Difficulty=190 (Good luck!)
IP ID Sequence Generation: All zeros

TRACEROUTE
HOP RTT      ADDRESS
1   16.89 ms 123.125.38.239

Read data files from: /usr/local/share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 15.81 seconds
           Raw packets sent: 2080 (95.204KB) | Rcvd: 23 (1.672KB)

root@root:~# nmap -sP 10.9.128.1/24

Starting Nmap 5.51 ( http://nmap.org ) at 2013-02-22 10:49 EST
Nmap scan report for 10.9.128.1
Host is up (0.0023s latency).
Nmap scan report for 10.9.128.5
Host is up (0.0032s latency).
Nmap scan report for 10.9.128.11
Host is up (0.0025s latency).
Nmap scan report for 10.9.128.13
Host is up (0.0019s latency).
Nmap scan report for 10.9.128.14
Host is up (0.0016s latency).
Nmap scan report for 10.9.128.15
Host is up (0.0021s latency).
Nmap scan report for 10.9.128.16
Host is up (0.0014s latency).
Nmap scan report for 10.9.128.23
Host is up (0.0028s latency).
Nmap scan report for 10.9.128.24
Host is up (0.0013s latency).
Nmap scan report for 10.9.128.25
Host is up (0.0031s latency).
Nmap scan report for 10.9.128.26
Host is up (0.00093s latency).
Nmap scan report for 10.9.128.27
Host is up (0.0028s latency).
Nmap scan report for 10.9.128.28
Host is up (0.0030s latency).
Nmap scan report for 10.9.128.33
Host is up (0.014s latency).
Nmap scan report for 10.9.128.34
Host is up (0.00096s latency).
Nmap scan report for 10.9.128.42
Host is up (0.011s latency).
Nmap scan report for 10.9.128.43
Host is up (0.0020s latency).
Nmap scan report for 10.9.128.44
Host is up (0.0029s latency).
Nmap scan report for 10.9.128.45
Host is up (0.0020s latency).
Nmap scan report for 10.9.128.46
Host is up (0.014s latency).
Nmap scan report for 10.9.128.47
Host is up (0.0050s latency).
Nmap scan report for 10.9.128.50
Host is up (0.0017s latency).
Nmap scan report for 10.9.128.53
Host is up (0.012s latency).
Nmap scan report for 10.9.128.55
Host is up (0.0022s latency).
Nmap scan report for 10.9.128.56
Host is up (0.0013s latency).
Nmap scan report for 10.9.128.59
Host is up (0.0012s latency).
Nmap scan report for 10.9.128.62
Host is up (0.00094s latency).
Nmap scan report for 10.9.128.69
Host is up (0.0046s latency).
Nmap scan report for 10.9.128.73
Host is up (0.0018s latency).
Nmap scan report for 10.9.128.74
Host is up (0.0029s latency).
Nmap scan report for 10.9.128.76
Host is up (0.0024s latency).
Nmap scan report for 10.9.128.77
Host is up (0.0013s latency).
Nmap scan report for 10.9.128.79
Host is up (0.0015s latency).
Nmap scan report for 10.9.128.86
Host is up (0.0015s latency).
Nmap scan report for 10.9.128.87
Host is up (0.0024s latency).
Nmap scan report for 10.9.128.89
Host is up (0.0013s latency).
Nmap scan report for 10.9.128.95
Host is up (0.0023s latency).
Nmap scan report for 10.9.128.96
Host is up (0.0031s latency).
Nmap scan report for 10.9.128.97
Host is up (0.0013s latency).
Nmap scan report for 10.9.128.100
Host is up (0.00092s latency).
Nmap scan report for 10.9.128.101
Host is up (0.0031s latency).
Nmap scan report for 10.9.128.102
Host is up (0.0025s latency).
Nmap scan report for 10.9.128.103
Host is up (0.0020s latency).
Nmap scan report for 10.9.128.105
Host is up (0.0019s latency).
Nmap scan report for 10.9.128.108
Host is up (0.0020s latency).
Nmap scan report for 10.9.128.111
Host is up (0.0012s latency).
Nmap scan report for 10.9.128.112
Host is up (0.0010s latency).
Nmap scan report for 10.9.128.117
Host is up (0.0021s latency).
Nmap scan report for 10.9.128.118
Host is up (0.0019s latency).
Nmap scan report for 10.9.128.119
Host is up (0.0024s latency).
Nmap scan report for 10.9.128.125
Host is up (0.0031s latency).
Nmap scan report for 10.9.128.127
Host is up (0.0013s latency).
Nmap scan report for 10.9.128.130
Host is up (0.0022s latency).
Nmap scan report for 10.9.128.135
Host is up (0.0073s latency).
Nmap scan report for 10.9.128.136
Host is up (0.0019s latency).
Nmap scan report for 10.9.128.138
Host is up (0.0024s latency).
Nmap scan report for 10.9.128.139
Host is up (0.0073s latency).
Nmap scan report for 10.9.128.140
Host is up (0.0019s latency).
Nmap scan report for 10.9.128.141
Host is up (0.0021s latency).
Nmap scan report for 10.9.128.142
Host is up (0.0021s latency).
Nmap scan report for 10.9.128.143
Host is up (0.0029s latency).
Nmap scan report for 10.9.128.144
Host is up (0.0015s latency).
Nmap scan report for 10.9.128.146
Host is up (0.0018s latency).
Nmap scan report for 10.9.128.147
Host is up (0.0017s latency).
Nmap scan report for 10.9.128.149
Host is up (0.0034s latency).
Nmap scan report for 10.9.128.150
Host is up (0.0014s latency).
Nmap scan report for 10.9.128.152
Host is up (0.0014s latency).
Nmap scan report for 10.9.128.154
Host is up (0.0013s latency).
Nmap scan report for 10.9.128.156
Host is up (0.0011s latency).
Nmap scan report for 10.9.128.157
Host is up (0.0021s latency).
Nmap scan report for 10.9.128.159
Host is up (0.00080s latency).
Nmap scan report for 10.9.128.162
Host is up (0.00093s latency).
Nmap scan report for 10.9.128.166
Host is up (0.0014s latency).
Nmap scan report for 10.9.128.167
Host is up (0.00079s latency).
Nmap scan report for 10.9.128.168
Host is up (0.0015s latency).
Nmap scan report for 10.9.128.169
Host is up (0.0042s latency).
Nmap scan report for 10.9.128.170
Host is up (0.0015s latency).
Nmap scan report for 10.9.128.176
Host is up (0.0020s latency).
Nmap scan report for 10.9.128.179
Host is up (0.0023s latency).
Nmap scan report for 10.9.128.181
Host is up (0.0073s latency).
Nmap scan report for 10.9.128.182
Host is up (0.00093s latency).
Nmap scan report for 10.9.128.185
Host is up (0.0026s latency).
Nmap scan report for 10.9.128.186
Host is up (0.0032s latency).
Nmap scan report for 10.9.128.187
Host is up (0.0020s latency).
Nmap scan report for 10.9.128.190
Host is up (0.0055s latency).
Nmap scan report for 10.9.128.196
Host is up (0.0068s latency).
Nmap scan report for 10.9.128.199
Host is up (0.0022s latency).
Nmap scan report for 10.9.128.203
Host is up (0.0045s latency).
Nmap scan report for 10.9.128.207
Host is up (0.0017s latency).
Nmap scan report for 10.9.128.208
Host is up (0.0014s latency).
Nmap scan report for 10.9.128.210
Host is up (0.0018s latency).
Nmap scan report for 10.9.128.211
Host is up (0.0015s latency).
Nmap scan report for 10.9.128.212
Host is up (0.015s latency).
Nmap scan report for 10.9.128.214
Host is up (0.0020s latency).
Nmap scan report for 10.9.128.215
Host is up (0.0014s latency).
Nmap scan report for 10.9.128.216
Host is up (0.0054s latency).
Nmap scan report for 10.9.128.219
Host is up (0.0015s latency).
Nmap scan report for 10.9.128.220
Host is up (0.0017s latency).
Nmap scan report for 10.9.128.221
Host is up (0.0020s latency).
Nmap scan report for 10.9.128.222
Host is up (0.00093s latency).
Nmap scan report for 10.9.128.226
Host is up (0.00084s latency).
Nmap scan report for 10.9.128.231
Host is up (0.00082s latency).
Nmap scan report for 10.9.128.234
Host is up (0.0012s latency).
Nmap scan report for 10.9.128.235
Host is up (0.0016s latency).
Nmap scan report for 10.9.128.241
Host is up (0.0018s latency).
Nmap scan report for 10.9.128.245
Host is up (0.0020s latency).
Nmap scan report for 10.9.128.246
Host is up (0.013s latency).
Nmap scan report for 10.9.128.247
Host is up (0.0034s latency).
Nmap scan report for 10.9.128.252
Host is up (0.0010s latency).
Nmap scan report for 10.9.128.253
Host is up (0.0012s latency).
Nmap done: 256 IP addresses (110 hosts up) scanned in 3.36 seconds

root@root:~# nmap -sS 119.167.213.153 (qingdaonews.com)

Starting Nmap 5.51 ( http://nmap.org ) at 2013-02-22 10:53 EST
Nmap scan report for 119.167.213.153
Host is up (0.0077s latency).
Not shown: 999 filtered ports
PORT   STATE SERVICE
80/tcp open  http

Nmap done: 1 IP address (1 host up) scanned in 4.58 seconds

root@root:~# nmap -O 123.125.38.3

Starting Nmap 5.51 ( http://nmap.org ) at 2013-02-22 10:54 EST
Nmap scan report for 123.125.38.3
Host is up (0.015s latency).
Not shown: 974 filtered ports
PORT      STATE SERVICE
20/tcp    open  ftp-data
30/tcp    open  unknown
80/tcp    open  http
146/tcp   open  iso-tp0
222/tcp   open  rsh-spx
555/tcp   open  dsf
668/tcp   open  mecomm
981/tcp   open  unknown
1021/tcp  open  exp1
1061/tcp  open  kiosk
1064/tcp  open  jstel
1149/tcp  open  bvtsonar
1583/tcp  open  simbaexpress
1947/tcp  open  sentinelsrm
2042/tcp  open  isis
2191/tcp  open  tvbus
2323/tcp  open  3d-nfsd
2718/tcp  open  pn-requester2
2967/tcp  open  symantec-av
3268/tcp  open  globalcatLDAP
3369/tcp  open  satvid-datalnk
3828/tcp  open  neteh
14442/tcp open  unknown
16000/tcp open  fmsas
28201/tcp open  unknown
54328/tcp open  unknown
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: CipherLab 5100 time and attendance terminal (86%), Cisco Unified Communications Manager VoIP gateway (86%), Cisco IP Phone 7941 (86%), D-Link DCS-3220 or DCS-5300G webcam (86%), Efficient Networks SpeedStream 5100 ADSL router (86%), Hioki MEMORY HiCORDER 8855 digital oscilloscope (86%), DD-WRT v23 (Linux 2.4.36) (86%), Tomato 1.27 (Linux 2.4.20) (86%), Vyatta router (Linux 2.6.26) (86%), Linux 2.6.18 (86%)
No exact OS matches for host (test conditions non-ideal).

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 27.39 seconds


评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值