Nmap Development mailing list archives
more beta30/Darwin tests
From: Paul Tod Rieger <prie () abl com>
Date: Mon, 05 Nov 2001 00:17:43 -0500
Testing nmap/AppleBSD on a larger /24 network (and hoping to develop a "test suite" eventually): # nmap -n -sP 172.16.100.0/24 Starting nmap V. 2.54BETA30 ( www.insecure.org/nmap/ ) [...] Nmap run completed -- 256 IP addresses (128 hosts up) scanned in 8 seconds # nmap -n -sS -O -p'80,113,139' 172.16.100.0/24 Starting nmap V. 2.54BETA30 ( www.insecure.org/nmap/ ) [...] Nmap run completed -- 256 IP addresses (135 hosts up) scanned in 431 seconds Most are M$ boxes, with a few exceptions: 1) nmap only identified 2 of 3 Cisco switches: Interesting ports on (172.16.100.91): (The 2 ports scanned but not shown below are in state: closed) Port State Service 80/tcp open http Remote OS guesses: AS5200, Cisco 2501/5260/5300 terminal server IOS 11.3.6(T1), Cisco IOS 11.3 - 12.0(11) Interesting ports on (172.16.100.94): (The 2 ports scanned but not shown below are in state: closed) Port State Service 80/tcp open http Remote OS guesses: AS5200, Cisco 2501/5260/5300 terminal server IOS 11.3.6(T1), Cisco IOS 11.3 - 12.0(11) even though the 3rd switch: Interesting ports on (172.16.100.1): (The 2 ports scanned but not shown below are in state: closed) Port State Service 80/tcp open http No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=2.54BETA30%P=powerpc-apple-darwin1.4%D=11/1%Time=3BE1EA95%O=80%C=113) TSeq(Class=TR%IPID=Z%TS=U) T1(Resp=Y%DF=N%W=1020%ACK=S++%Flags=AS%Ops=M) T2(Resp=Y%DF=N%W=0%ACK=S%Flags=AR%Ops=) T3(Resp=Y%DF=N%W=1020%ACK=S++%Flags=AS%Ops=M) T4(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) T7(Resp=Y%DF=N%W=0%ACK=S%Flags=AR%Ops=) PU(Resp=N) Warning: OS detection will be MUCH less reliable because we did not find at least 1 open and 1 closed TCP port All 3 scanned ports on (172.16.100.13) are: closed Too many fingerprints match this host for me to give an accurate OS guess has an admin webpage: # telnet 172.16.100.1 80 [...] Date: Wed, 05 May 1993 10:56:33 UTC Server: cisco-IOS/12.0 HTTP-server/1.0(1) TITLE>Switch Home Page H1>Cisco Systems H2>Accessing Cisco WS-C2924-XL "Switch" [...] nearly identical to the other 2, which barely differ: # telnet 172.16.100.91 80 [...] Date: Sat, 20 Mar 1993 00:23:10 UTC Server: cisco-IOS/12.0 HTTP-server/1.0(1) TITLE>WS-C2924-XL Home Page H1>Cisco Systems H2>Accessing Cisco WS-C2924-XL "WS-C2924-XL" # telnet 172.16.100.94 80 [...] Date: Sat, 20 Mar 1993 00:24:58 UTC Server: cisco-IOS/12.0 HTTP-server/1.0(1) TITLE>WS-C2924-XL Home Page H1>Cisco Systems H2>Accessing Cisco WS-C2924-XL "WS-C2924-XL" Why might the 3rd switch look different? Would another type of scan give some insight? 2) Another box wasn't identified: # nmap -n -sS -O -F 172.16.100.25 Starting nmap V. 2.54BETA30 ( www.insecure.org/nmap/ ) Interesting ports on (172.16.100.25): (The 1110 ports scanned but not shown below are in state: closed) Port State Service 135/tcp open loc-srv 139/tcp open netbios-ssn 427/tcp open svrloc No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=2.54BETA30%P=powerpc-apple-darwin1.4%D=11/1%Time=3BE1EABB%O=139%C=80) TSeq(Class=TD%gcd=1%SI=1%IPID=BI%TS=0) T1(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=MNWNNT) T2(Resp=Y%DF=N%W=0%ACK=S%Flags=AR%Ops=) T3(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=MNWNNT) T4(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) T7(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) PU(Resp=N) Nmap run completed -- 1 IP address (1 host up) scanned in 14 seconds Is there another way nmap might identify this system's OS? 3) Curiously, .115 didn't show up in the ping scan, then looked filtered in the network scan: Warning: OS detection will be MUCH less reliable because we did not find at least 1 open and 1 closed TCP port Interesting ports on (172.16.100.115): Port State Service 80/tcp filtered http 113/tcp filtered auth 139/tcp filtered netbios-ssn Too many fingerprints match this host for me to give an accurate OS guess but then opened up: # nmap -n -sS -O -F 172.16.100.115 Starting nmap V. 2.54BETA30 ( www.insecure.org/nmap/ ) Interesting ports on (172.16.100.115): (The 1108 ports scanned but not shown below are in state: closed) Port State Service 80/tcp open http 135/tcp open loc-srv 139/tcp open netbios-ssn 443/tcp open https 1026/tcp open nterm Remote operating system guess: Windows NT4 / Win95 / Win98 Nmap run completed -- 1 IP address (1 host up) scanned in 3 seconds Is there a reason for this "flakiness"? (Maybe the system was booting up?) 4) Some were probably behind "personal firewalls": # nmap -n -sS -O -F 172.16.100.39 Starting nmap V. 2.54BETA30 ( www.insecure.org/nmap/ ) Warning: OS detection will be MUCH less reliable because we did not find at least 1 open and 1 closed TCP port All 1113 scanned ports on (172.16.100.39) are: closed Too many fingerprints match this host for me to give an accurate OS guess Nmap run completed -- 1 IP address (1 host up) scanned in 6 seconds Any scans that might work on these? Thanks! Tod abl.com --------------------------------------------------------------------- For help using this (nmap-dev) mailing list, send a blank email to nmap-dev-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).
Current thread:
- more beta30/Darwin tests Paul Tod Rieger (Nov 04)
