това го пуснах от рутерра:
# nmap -v -A 192.168.0.26
Starting Nmap 5.00 (
http://nmap.org ) at 2010-03-09 15:28 EET
NSE: Loaded 30 scripts for scanning.
Initiating ARP Ping Scan at 15:28
Scanning 192.168.0.26 [1 port]
Completed ARP Ping Scan at 15:28, 0.01s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 15:28
Completed Parallel DNS resolution of 1 host. at 15:28, 0.00s elapsed
Initiating SYN Stealth Scan at 15:28
Scanning 192.168.0.26 [1000 ports]
sendto in send_ip_packet: sendto(5, packet, 44, 0, 192.168.0.26, 16) => Operation not permitted
Offending packet: TCP 192.168.0.111:53253 > 192.168.0.26:445 S ttl=50 id=34948 iplen=44 seq=3124930351 win=3072 <mss 1460>
sendto in send_ip_packet: sendto(5, packet, 44, 0, 192.168.0.26, 16) => Operation not permitted
Offending packet: TCP 192.168.0.111:53253 > 192.168.0.26:110 S ttl=54 id=36468 iplen=44 seq=3124930351 win=3072 <mss 1460>
sendto in send_ip_packet: sendto(5, packet, 44, 0, 192.168.0.26, 16) => Operation not permitted
Offending packet: TCP 192.168.0.111:53253 > 192.168.0.26:5900 S ttl=52 id=55107 iplen=44 seq=3124930351 win=1024 <mss 1460>
sendto in send_ip_packet: sendto(5, packet, 44, 0, 192.168.0.26, 16) => Operation not permitted
Offending packet: TCP 192.168.0.111:53253 > 192.168.0.26:80 S ttl=53 id=10441 iplen=44 seq=3124930351 win=2048 <mss 1460>
sendto in send_ip_packet: sendto(5, packet, 44, 0, 192.168.0.26, 16) => Operation not permitted
Offending packet: TCP 192.168.0.111:53253 > 192.168.0.26:25 S ttl=51 id=11594 iplen=44 seq=3124930351 win=4096 <mss 1460>
sendto in send_ip_packet: sendto(5, packet, 44, 0, 192.168.0.26, 16) => Operation not permitted
Offending packet: TCP 192.168.0.111:53253 > 192.168.0.26:139 S ttl=40 id=34779 iplen=44 seq=3124930351 win=1024 <mss 1460>
sendto in send_ip_packet: sendto(5, packet, 44, 0, 192.168.0.26, 16) => Operation not permitted
Offending packet: TCP 192.168.0.111:53253 > 192.168.0.26:135 S ttl=45 id=31385 iplen=44 seq=3124930351 win=2048 <mss 1460>
sendto in send_ip_packet: sendto(5, packet, 44, 0, 192.168.0.26, 16) => Operation not permitted
Offending packet: TCP 192.168.0.111:53253 > 192.168.0.26:554 S ttl=55 id=4936 iplen=44 seq=3124930351 win=4096 <mss 1460>
sendto in send_ip_packet: sendto(5, packet, 44, 0, 192.168.0.26, 16) => Operation not permitted
Offending packet: TCP 192.168.0.111:53253 > 192.168.0.26:22 S ttl=55 id=3490 iplen=44 seq=3124930351 win=4096 <mss 1460>
sendto in send_ip_packet: sendto(5, packet, 44, 0, 192.168.0.26, 16) => Operation not permitted
Offending packet: TCP 192.168.0.111:53253 > 192.168.0.26:3389 S ttl=43 id=58660 iplen=44 seq=3124930351 win=4096 <mss 1460>
Omitting future Sendto error messages now that 10 have been shown. Use -d2 if you really want to see them.
Completed SYN Stealth Scan at 15:28, 21.39s elapsed (1000 total ports)
Initiating Service scan at 15:28
Initiating OS detection (try #1) against 192.168.0.26
send_ip_packet in send_closedudp_probe: Operation not permitted (1)
send_ip_packet in send_closedudp_probe: Operation not permitted (1)
send_ip_packet in send_closedudp_probe: Operation not permitted (1)
send_ip_packet in send_closedudp_probe: Operation not permitted (1)
Retrying OS detection (try #2) against 192.168.0.26
send_ip_packet in send_closedudp_probe: Operation not permitted (1)
send_ip_packet in send_closedudp_probe: Operation not permitted (1)
send_ip_packet in send_closedudp_probe: Operation not permitted (1)
send_ip_packet in send_closedudp_probe: Operation not permitted (1)
NSE: Script scanning 192.168.0.26.
NSE: Script Scanning completed.
Host 192.168.0.26 is up (0.00019s latency).
All 1000 scanned ports on 192.168.0.26 are filtered
MAC Address: 00:17:9A:37:62:61 (D-Link)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop
Read data files from: /usr/share/nmap
OS and Service detection performed. Please report any incorrect results at
http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 25.20 seconds
Raw packets sent: 17 (2650B) | Rcvd: 1 (42B)
––––––––––––––––––––––––––––––––––––––––––––––––––––––––
а това от машината, на която съм:
$ nmap -v -A 192.168.0.26
Starting Nmap 5.21 (
http://nmap.org ) at 2010-03-09 15:24 EET
NSE: Loaded 36 scripts for scanning.
Initiating Ping Scan at 15:24
Scanning 192.168.0.26 [2 ports]
Completed Ping Scan at 15:24, 3.00s elapsed (1 total hosts)
Nmap scan report for 192.168.0.26 [host down]
Read data files from: /usr/share/nmap
Note: Host seems down. If it is really up, but blocking our ping probes, try -PN
Nmap done: 1 IP address (0 hosts up) scanned in 3.79 seconds
$ nmap -v -PN -A 192.168.0.26
Starting Nmap 5.21 (
http://nmap.org ) at 2010-03-09 15:25 EET
NSE: Loaded 36 scripts for scanning.
Initiating Parallel DNS resolution of 1 host. at 15:25
Completed Parallel DNS resolution of 1 host. at 15:25, 0.00s elapsed
Initiating Connect Scan at 15:25
Scanning 192.168.0.26 [1000 ports]
Discovered open port 3389/tcp on 192.168.0.26
Completed Connect Scan at 15:25, 6.51s elapsed (1000 total ports)
Initiating Service scan at 15:25
Scanning 1 service on 192.168.0.26
Completed Service scan at 15:25, 6.00s elapsed (1 service on 1 host)
NSE: Script scanning 192.168.0.26.
NSE: Script Scanning completed.
Nmap scan report for 192.168.0.26
Host is up (0.00027s latency).
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
2869/tcp closed unknown
3389/tcp open microsoft-rdp Microsoft Terminal Service
Service Info: OS: Windows
Read data files from: /usr/share/nmap
Service detection performed. Please report any incorrect results at
http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.82 seconds