Monday 29 July 2013

Operating systen & Version detection with NMAP-ii


Operating systen & Version detection with NMAP
these options can help us to gain more information about target. Most widely used function is operating system identification [-o] , used to identify O Srunning on the target machine.
msf > nmap -O 192.168.2.108
[*] exec: nmap -O 192.168.2.108
Starting Nmap 6.25 ( http://nmap.org ) at 2013-07-29 18:18 IST
Nmap scan report for 192.168.2.108
Host is up (0.013s latency).
Not shown: 986 closed ports
PORT STATE SERVICE
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
1688/tcp open nsjtp-data
2869/tcp open icslap
3306/tcp open mysql
5357/tcp open wsdapi
49152/tcp open unknown
49153/tcp open unknown
49154/tcp open unknown
49155/tcp open unknown
49157/tcp open unknown
49158/tcp open unknown
MAC Address: 7C:E9:D3:34:4A:40 (Hon Hai Precision Ind. Co.)
Device type: general purpose
Running: Microsoft Windows 7|2008
OS CPE: cpe:/o:microsoft:windows_7::- cpe:/o:microsoft:windows_7::sp1 cpe:/o:microsoft:windows_server_2008::sp1 cpe:/o:microsoft:windows_8
OS details: Microsoft Windows 7 SP0 - SP1, Windows Server 2008 SP1, or Windows 8
Network Distance: 1 hop


OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 3.53 seconds


the other widely used Nmap option is version detection (-sV) of different open ports on the target. It can be mixxed with any of the scan types.
msf > nmap -sT -sV 192.168.2.105
[*] exec: nmap -sT -sV 192.168.2.105
Starting Nmap 6.25 ( http://nmap.org ) at 2013-07-29 18:39 IST
Nmap scan report for 192.168.2.105
Host is up (0.019s latency).
Not shown: 996 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp?
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn
445/tcp open microsoft-ds Microsoft Windows XP microsoft-ds
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port21-TCP:V=6.25%I=7%D=7/29%Time=51F6698B%P=x86_64-unknown-linux-gnu%r
SF:(NULL,17,"220\x20220\x20RMNetwork\x20FTP\r\n");
MAC Address: 00:03:47:62:8A:9E (Intel)
Service Info: Host: 220; OS: Windows; CPE: cpe:/o:microsoft:windows
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.67 seconds


No comments:

Post a Comment

If you have any doubt please let me know..