Home page logo
/

nmap-dev logo Nmap Development mailing list archives

Re: Google's Cr-48
From: Toni Ruottu <toni.ruottu () iki fi>
Date: Mon, 7 Feb 2011 21:33:02 +0200

Chris, you could do the protocol scan by commanding
nmap -v -v -sO -oN C:\Users\Chris\My Dropbox\nmap_cr-48_proto 192.168.1.101
if it is not too much work.

On Fri, Dec 24, 2010 at 1:07 PM, Vlatko Kosturjak <kost () linux hr> wrote:
I guess protocol scan would be useful too

Sent from my mobile

----- Reply message -----
From: "Chris Short" <chris () chrisshort net>
Date: Fri, Dec 24, 2010 02:20
Subject: Google's Cr-48
To: "Toni Ruottu" <toni.ruottu () iki fi>
Cc: <nmap-dev () insecure org>


# Nmap 5.21 scan initiated Thu Dec 23 19:38:25 2010 as: nmap -v -v
-p0- -sU -PN -oN C:\Users\Chris\My Dropbox\nmap_cr-48_udp
192.168.1.101
Nmap scan report for 192.168.1.101
Host is up (0.032s latency).
All 65536 scanned ports on 192.168.1.101 are open|filtered
MAC Address: 00:25:D3:39:E7:91 (AzureWave Technologies)

Read data files from: C:\Program Files\Nmap
# Nmap done at Thu Dec 23 20:15:59 2010 -- 1 IP address (1 host up)
scanned in 2257.12 seconds

Thanks,
Chris Short




On Thu, Dec 23, 2010 at 6:37 PM, Toni Ruottu <toni.ruottu () iki fi> wrote:

You can scan all ports by saying -p 0- I think. It is shorter to write and
includes port 0.

You should also scan the udp ports. Use -sU to target udp ports.
On 24 Dec 2010 00:12, "Chris Short" <chris () chrisshort net> wrote:
I am a part of Google's pilot program and Fyodor suggested I post the
nmap
run to this list. If you would like to run tests/experiments on the
device
please don't hesitate to ask.


# Nmap 5.21 scan initiated Thu Dec 23 09:08:23 2010 as: nmap -v -v
-p1-65535 -A -PN -oN C:\Users\Chris\Desktop\nmap_cr-48.txt
192.168.1.101
Initiating OS detection (try #1) against 192.168.1.101
Retrying OS detection (try #2) against 192.168.1.101
Nmap scan report for 192.168.1.101
Host is up (0.041s latency).
All 65535 scanned ports on 192.168.1.101 are filtered
MAC Address: 00:25:D3:39:E7:91 (AzureWave Technologies)
Too many fingerprints match this host to give specific OS details
TCP/IP fingerprint:


SCAN(V=5.21%D=12/23%OT=%CT=%CU=%PV=Y%DS=1%DC=D%G=N%M=0025D3%TM=4D1360AD%P=i686-pc-windows-windows)
SEQ(II=I)
U1(R=N)
IE(R=Y%DFI=N%TG=40%CD=S)

Network Distance: 1 hop

HOP RTT ADDRESS
1 40.82 ms 192.168.1.101

Read data files from: C:\Program Files\Nmap
OS and Service detection performed. Please report any incorrect
results at http://nmap.org/submit/ .
# Nmap done at Thu Dec 23 09:46:05 2010 -- 1 IP address (1 host up)
scanned in 2263.81 seconds


Thanks,
Chris Short
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/





_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


  By Date           By Thread  

Current thread:
  • Re: Google's Cr-48 Toni Ruottu (Feb 07)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]