aboutsummaryrefslogtreecommitdiff
path: root/netsec-assignment3-S4498062/exercise3/exercise3c
diff options
context:
space:
mode:
authorCamil Staps2015-09-24 22:54:41 +0200
committerCamil Staps2015-09-24 22:54:41 +0200
commita5a246e4ba6a73edc86ed0b5ffaaba5e3ce6cf13 (patch)
tree5a96a7fec8c297de7447a5e0db9dcac69076d722 /netsec-assignment3-S4498062/exercise3/exercise3c
parentAssignment 2 (diff)
Week 3
Diffstat (limited to 'netsec-assignment3-S4498062/exercise3/exercise3c')
-rw-r--r--netsec-assignment3-S4498062/exercise3/exercise3c54
1 files changed, 54 insertions, 0 deletions
diff --git a/netsec-assignment3-S4498062/exercise3/exercise3c b/netsec-assignment3-S4498062/exercise3/exercise3c
new file mode 100644
index 0000000..49ba174
--- /dev/null
+++ b/netsec-assignment3-S4498062/exercise3/exercise3c
@@ -0,0 +1,54 @@
+All outputs are example outputs, generated on my own local network (mapping a raspberry pi with Raspbian; Linux pi 3.18.0-trunk-rpi #1 PREEMPT Debian 3.18.5-1~exp1+rpi19 (2015-08-08) armv6l GNU/Linux). See exercise3a.
+
+# nmap 192.168.84.10 # (for example); basic 1000 TCP ports scan
+
+Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:36 CEST
+Nmap scan report for 192.168.84.75
+Host is up (0.0000040s latency).
+Not shown: 997 closed ports
+PORT STATE SERVICE
+80/tcp open http
+111/tcp open rpcbind
+443/tcp open https
+# nmap -sS 192.168.84.10 # TCP SYN scan; only check handshake (doesn't need that many connections)
+
+Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:44 CEST
+Nmap scan report for 192.168.84.75
+Host is up (0.000054s latency).
+Not shown: 997 closed ports
+PORT STATE SERVICE
+80/tcp open http
+111/tcp open rpcbind
+443/tcp open https
+
+Nmap done: 1 IP address (1 host up) scanned in 89.55 seconds
+# nmap -sT 192.168.84.10 # TCP connect scan; if TCP SYN doesn't work
+
+Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:46 CEST
+Nmap scan report for 192.168.84.75
+Host is up (0.00016s latency).
+Not shown: 997 closed ports
+PORT STATE SERVICE
+80/tcp open http
+111/tcp open rpcbind
+443/tcp open https
+
+Nmap done: 1 IP address (1 host up) scanned in 0.05 seconds
+# nmap -sU 192.168.84.10 # UDP
+
+Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:46 CEST
+Nmap scan report for 192.168.84.75
+Host is up (0.000054s latency).
+Not shown: 995 closed ports
+PORT STATE SERVICE
+68/udp open|filtered dhcpc
+111/udp open rpcbind
+631/udp open|filtered ipp
+1900/udp open|filtered upnp
+5353/udp open|filtered zeroconf
+
+Nmap done: 1 IP address (1 host up) scanned in 187.41 seconds
+
+
+I would use others from the manual if these fail.
+