07.06.2014 Views

2 - Raspberry PI Community Projects

2 - Raspberry PI Community Projects

2 - Raspberry PI Community Projects

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

10.8.2. Remote Diagnosis: nmap<br />

nmap (in the similarly-named package) is, in a way, the remote equivalent for netstat. It can<br />

scan a set of “well-known” ports for one or several remote servers, and list the ports where an<br />

application is found to answer to incoming connections. Furthermore, nmap is able to identify<br />

some of these applications, sometimes even their version number. The counterpart of this tool<br />

is that, since it runs remotely, it cannot provide information on processes or users; however, it<br />

can operate on several targets at once.<br />

A typical nmap invocation only uses the -A option (so that nmap attempts to identify the versions<br />

of the server software it finds) followed by one or more IP addresses or DNS names of machines<br />

to scan. Again, many more options exist to finely control the behavior of nmap; please refer to<br />

the documentation in the nmap(1) manual page.<br />

# nmap scouzmir<br />

Starting Nmap 5.00 ( http://nmap.org ) at 2010-10-12 18:52 CEST<br />

Interesting ports on 192.168.1.101:<br />

Not shown: 998 closed ports<br />

PORT STATE SERVICE<br />

22/tcp open ssh<br />

111/tcp open rpcbind<br />

MAC Address: 52:54:00:99:01:01 (QEMU Virtual NIC)<br />

Nmap done: 1 IP address (1 host up) scanned in 2.11 seconds<br />

# nmap -A localhost<br />

Starting Nmap 5.00 ( http://nmap.org ) at 2010-10-12 18:59 CEST<br />

Warning: Hostname localhost resolves to 2 IPs. Using 127.0.0.1.<br />

Interesting ports on localhost (127.0.0.1):<br />

Not shown: 997 closed ports<br />

PORT STATE SERVICE VERSION<br />

22/tcp open ssh OpenSSH 5.5p1 Debian 4 (protocol 2.0)<br />

| ssh-hostkey: 1024 af:07:60:17:16:64:6f:ee:c4:ca:b5:64:1e:4a:4c:22 (DSA)<br />

|_ 2048 25:b0:aa:6b:11:5a:56:b6:8d:2d:ed:b3:16:17:96:33 (RSA)<br />

25/tcp open smtp Exim smtpd 4.72<br />

| smtp-commands: EHLO scouzmir.internal.placard.fr.eu.org Hello localhost [127.0.0.1], SIZE 52428800,<br />

➥ <strong>PI</strong>PELINING, HELP<br />

|_ HELP Commands supported: AUTH HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP<br />

111/tcp open rpcbind<br />

| rpcinfo:<br />

| 100000 2 111/udp rpcbind<br />

| 100024 1 53273/udp status<br />

| 100000 2 111/tcp rpcbind<br />

|_ 100024 1 41127/tcp status<br />

No exact OS matches for host (If you know what OS is running on it, see http://nmap.org/submit/ ).<br />

TCP/IP fingerprint:<br />

OS:SCAN(V=5.00%D=10/12%OT=22%CT=1%CU=34421%PV=N%DS=0%G=Y%TM=4CB4941A%P=i686<br />

OS:-pc-linux-gnu)SEQ(SP=BF%GCD=1%ISR=CC%TI=Z%CI=Z%II=I%TS=8)OPS(O1=M400CST1<br />

OS:1NW4%O2=M400CST11NW4%O3=M400CNNT11NW4%O4=M400CST11NW4%O5=M400CST11NW4%O6<br />

OS:=M400CST11)WIN(W1=8000%W2=8000%W3=8000%W4=8000%W5=8000%W6=8000)ECN(R=Y%D<br />

OS:F=Y%T=40%W=8018%O=M400CNNSNW4%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=<br />

OS:0%Q=)T2(R=N)T3(R=Y%DF=Y%T=40%W=8000%S=O%A=S+%F=AS%O=M400CST11NW4%RD=0%Q=<br />

OS:)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=<br />

OS:S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF<br />

OS:=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=<br />

OS:G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S)<br />

Network Distance: 0 hops<br />

Service Info: Host: scouzmir.internal.placard.fr.eu.org; OS: Linux<br />

OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .<br />

Nmap done: 1 IP address (1 host up) scanned in 21.32 seconds<br />

Chapter 10 — Network Infrastructure<br />

247

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!