Nmap Development mailing list archives
Re: Google's Cr-48
From: Toni Ruottu <toni.ruottu () iki fi>
Date: Mon, 7 Feb 2011 21:33:02 +0200
Chris, you could do the protocol scan by commanding nmap -v -v -sO -oN C:\Users\Chris\My Dropbox\nmap_cr-48_proto 192.168.1.101 if it is not too much work. On Fri, Dec 24, 2010 at 1:07 PM, Vlatko Kosturjak <kost () linux hr> wrote:
I guess protocol scan would be useful too Sent from my mobile ----- Reply message ----- From: "Chris Short" <chris () chrisshort net> Date: Fri, Dec 24, 2010 02:20 Subject: Google's Cr-48 To: "Toni Ruottu" <toni.ruottu () iki fi> Cc: <nmap-dev () insecure org> # Nmap 5.21 scan initiated Thu Dec 23 19:38:25 2010 as: nmap -v -v -p0- -sU -PN -oN C:\Users\Chris\My Dropbox\nmap_cr-48_udp 192.168.1.101 Nmap scan report for 192.168.1.101 Host is up (0.032s latency). All 65536 scanned ports on 192.168.1.101 are open|filtered MAC Address: 00:25:D3:39:E7:91 (AzureWave Technologies) Read data files from: C:\Program Files\Nmap # Nmap done at Thu Dec 23 20:15:59 2010 -- 1 IP address (1 host up) scanned in 2257.12 seconds Thanks, Chris Short On Thu, Dec 23, 2010 at 6:37 PM, Toni Ruottu <toni.ruottu () iki fi> wrote:You can scan all ports by saying -p 0- I think. It is shorter to write and includes port 0. You should also scan the udp ports. Use -sU to target udp ports. On 24 Dec 2010 00:12, "Chris Short" <chris () chrisshort net> wrote:I am a part of Google's pilot program and Fyodor suggested I post thenmaprun to this list. If you would like to run tests/experiments on thedeviceplease don't hesitate to ask. # Nmap 5.21 scan initiated Thu Dec 23 09:08:23 2010 as: nmap -v -v -p1-65535 -A -PN -oN C:\Users\Chris\Desktop\nmap_cr-48.txt 192.168.1.101 Initiating OS detection (try #1) against 192.168.1.101 Retrying OS detection (try #2) against 192.168.1.101 Nmap scan report for 192.168.1.101 Host is up (0.041s latency). All 65535 scanned ports on 192.168.1.101 are filtered MAC Address: 00:25:D3:39:E7:91 (AzureWave Technologies) Too many fingerprints match this host to give specific OS details TCP/IP fingerprint:SCAN(V=5.21%D=12/23%OT=%CT=%CU=%PV=Y%DS=1%DC=D%G=N%M=0025D3%TM=4D1360AD%P=i686-pc-windows-windows)SEQ(II=I) U1(R=N) IE(R=Y%DFI=N%TG=40%CD=S) Network Distance: 1 hop HOP RTT ADDRESS 1 40.82 ms 192.168.1.101 Read data files from: C:\Program Files\Nmap OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . # Nmap done at Thu Dec 23 09:46:05 2010 -- 1 IP address (1 host up) scanned in 2263.81 seconds Thanks, Chris Short _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/_______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
_______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Re: Google's Cr-48 Toni Ruottu (Feb 07)