Scan the operating system used by the target host.
[email protected]:~# nmap -sT -O -A 192.168.1.133
Starting Nmap 5.61TEST4 ( http:
//nmap.org ) at 2012-08-31 02:28 EDT
Nmap scan report
for
192.168.1.133
Host
is
up (0.090s latency).
Not shown: 986 closed ports
PORT STATE SERVICE VERSION
80/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-methods: No Allow or Public header
in
OPTIONS response (status code 404)
|_http-title: Not Found
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn
445/tcp open netbios-ssn
514/tcp filtered shell
902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP)
912/tcp open vmware-auth VMware Authentication Daemon 1.0 (Uses VNC, SOAP)
1025/tcp open msrpc Microsoft Windows RPC
1026/tcp open msrpc Microsoft Windows RPC
1027/tcp open msrpc Microsoft Windows RPC
1029/tcp open msrpc Microsoft Windows RPC
1030/tcp open msrpc Microsoft Windows RPC
1433/tcp open ms-sql-s Microsoft SQL Server 2008 R2 10.50.1600.00; Pre-RTM
2383/tcp open ms-olap4?
Device type: general purpose
Running: Microsoft Windows 7(这里是目标使用的操作系统)
OS CPE: cpe:/o:microsoft:windows_7:::enterprise
OS details: Microsoft Windows 7 Enterprise(操作系统的版本)
Network Distance: 2 hops
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
|_nbstat: NetBIOS name: TKE-PC(这里是计算机名称), NetBIOS user: <unknown>, NetBIOS MAC: 70:71:bc:79:fa:54 (Pegatron) (网卡mac地址)
| smb-security-mode:
| Account that was used
for
smb scripts: guest
| User-level authentication
| SMB Security: Challenge/response passwords supported
|_ Message signing disabled (dangerous, but
default
)
|_smbv2-enabled: Server supports SMBv2 protocol
| smb-os-discovery:
| OS: Windows 7 Ultimate 7600 (Windows 7 Ultimate 6.1)
| NetBIOS computer name: TKE-PC
| Workgroup: WORKGROUP
|_ System time: 2012-08-31 02:31:37 UTC+8
| ms-sql-info:
| [192.168.1.133:1433]
| Version: Microsoft SQL Server 2008 R2 Pre-RTM
| Version number: 10.50.1600.00
| Product: Microsoft SQL Server 2008 R2
| Service pack level: Pre-RTM
|_ TCP port: 1433
TRACEROUTE (
using
proto 1/icmp)
HOP RTT ADDRESS
1 0.13 ms 192.168.129.2
2 0.75 ms 192.168.1.133 OS and Service detection performed. Please report any incorrect results at http:
//nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned
in
188.80 seconds
|
In this way, the host system is detected as Win7, and you can see the SQL Server R2 when using the database.
However, the scanning time is a little longer, 188 seconds, that is, about 3 minutes.
Through the QQ IP detection, I found an IP to carry out the test, the results found that this is
[Email protected]:~# nmap-st-o-A 223.67.165.180Starting nmap 5.61test4 (http://nmap.org) at 2012-08-31 02:47 Edtnmap Scan report for 223.67.165.180Host was up (0.00051s latency). All scanned ports on 223.67.165.180 is Filteredtoo many fingerprints match this host to give specific OS Detailstrac Eroute (using proto 1/icmp) HOP RTT ADDRESS1 ... 30OS and Service detection performed. Incorrect results at http://nmap.org/submit/. Nmap done:1 IP Address (1 host up) scanned in 33.84 seconds
It turns out that the router was used by the other side, and the scan became a scan of the router.
How to use Nmap