blob: 49ba174a571bf995df2286679ff366634990836d (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
|
All outputs are example outputs, generated on my own local network (mapping a raspberry pi with Raspbian; Linux pi 3.18.0-trunk-rpi #1 PREEMPT Debian 3.18.5-1~exp1+rpi19 (2015-08-08) armv6l GNU/Linux). See exercise3a.
# nmap 192.168.84.10 # (for example); basic 1000 TCP ports scan
Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:36 CEST
Nmap scan report for 192.168.84.75
Host is up (0.0000040s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
80/tcp open http
111/tcp open rpcbind
443/tcp open https
# nmap -sS 192.168.84.10 # TCP SYN scan; only check handshake (doesn't need that many connections)
Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:44 CEST
Nmap scan report for 192.168.84.75
Host is up (0.000054s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
80/tcp open http
111/tcp open rpcbind
443/tcp open https
Nmap done: 1 IP address (1 host up) scanned in 89.55 seconds
# nmap -sT 192.168.84.10 # TCP connect scan; if TCP SYN doesn't work
Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:46 CEST
Nmap scan report for 192.168.84.75
Host is up (0.00016s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
80/tcp open http
111/tcp open rpcbind
443/tcp open https
Nmap done: 1 IP address (1 host up) scanned in 0.05 seconds
# nmap -sU 192.168.84.10 # UDP
Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:46 CEST
Nmap scan report for 192.168.84.75
Host is up (0.000054s latency).
Not shown: 995 closed ports
PORT STATE SERVICE
68/udp open|filtered dhcpc
111/udp open rpcbind
631/udp open|filtered ipp
1900/udp open|filtered upnp
5353/udp open|filtered zeroconf
Nmap done: 1 IP address (1 host up) scanned in 187.41 seconds
I would use others from the manual if these fail.
|