Nmap Development mailing list archives

Re: Google's Cr-48


From: Toni Ruottu <toni.ruottu () iki fi>
Date: Fri, 24 Dec 2010 01:37:22 +0200

You can scan all ports by saying -p 0- I think. It is shorter to write and
includes port 0.

You should also scan the udp ports. Use -sU to target udp ports.
On 24 Dec 2010 00:12, "Chris Short" <chris () chrisshort net> wrote:
I am a part of Google's pilot program and Fyodor suggested I post the nmap
run to this list. If you would like to run tests/experiments on the device
please don't hesitate to ask.


# Nmap 5.21 scan initiated Thu Dec 23 09:08:23 2010 as: nmap -v -v
-p1-65535 -A -PN -oN C:\Users\Chris\Desktop\nmap_cr-48.txt
192.168.1.101
Initiating OS detection (try #1) against 192.168.1.101
Retrying OS detection (try #2) against 192.168.1.101
Nmap scan report for 192.168.1.101
Host is up (0.041s latency).
All 65535 scanned ports on 192.168.1.101 are filtered
MAC Address: 00:25:D3:39:E7:91 (AzureWave Technologies)
Too many fingerprints match this host to give specific OS details
TCP/IP fingerprint:

SCAN(V=5.21%D=12/23%OT=%CT=%CU=%PV=Y%DS=1%DC=D%G=N%M=0025D3%TM=4D1360AD%P=i686-pc-windows-windows)
SEQ(II=I)
U1(R=N)
IE(R=Y%DFI=N%TG=40%CD=S)

Network Distance: 1 hop

HOP RTT ADDRESS
1 40.82 ms 192.168.1.101

Read data files from: C:\Program Files\Nmap
OS and Service detection performed. Please report any incorrect
results at http://nmap.org/submit/ .
# Nmap done at Thu Dec 23 09:46:05 2010 -- 1 IP address (1 host up)
scanned in 2263.81 seconds


Thanks,
Chris Short
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: