Nmap Development mailing list archives

bug displaying OS information in nmao 3.30


From: Ste Jones <root () networkpenetration com>
Date: Sun, 29 Jun 2003 10:39:39 +0100

the new output in 3.30 doesn;t display the OS fingerprint... note the OS fingerprint: (none) below

cheers
ste
root () networkpenetration com



-bash-2.05b# nmap -O -sS -d 192.168.3.1

Starting nmap 3.30 ( http://www.insecure.org/nmap/ ) at 2003-06-29 09:28 GMT
The first host is 192, and the last one is 192
The first host is 168, and the last one is 168
The first host is 3, and the last one is 3
The first host is 1, and the last one is 1
Packet capture filter (device fxp0): (icmp and dst host 192.168.3.2) or ((tcp or udp) and dst host 192.168.3.2 and ( 
dst port 44425 or dst port 44426 or dst port 44427 or dst port 44428 or dst port 44429))
We got a ping packet back from 192.168.3.1: id = 8171 seq = 35155 checksum = 22209
Hostupdate called for machine 192.168.3.1 state UNKNOWN/COMBO -> HOST_UP (trynum 0, dotimeadj: yes time: 12308)
Finished block: srtt: 308 rttvar: 5000 timeout: 300000 block_tries: 1 up_this_block: 1 down_this_block: 0 group_sz: 1
massping done:  num_hosts: 1  num_responses: 1
Host ponygirl.localdomain (192.168.3.1) appears to be up ... good.
Starting pos_scan (SYN Stealth Scan)
Packet capture filter (device fxp0): dst host 192.168.3.2 and (icmp or (tcp and src host 192.168.3.1))
Initiating SYN Stealth Scan against abc.localdomain (192.168.3.1) at 09:28
Adding open port 135/tcp
Adding open port 139/tcp
Adding open port 1026/tcp
Adding open port 445/tcp
Finished round #1. Current stats: numqueries_ideal: 118; min_width: 1; max_width: 150; packet_incr: 4; senddelay: 0us; 
fallback: 70%
The SYN Stealth Scan took 1 second to scan 1644 ports.
Wait time is 300ms
Packet capture filter (device fxp0): dst host 192.168.3.2 and (icmp or (tcp and src host 192.168.3.1))
For OSScan assuming that port 135 is open and port 1 is closed and neither are firewalled
Interesting ports on abc.localdomain (192.168.3.1):
(The 1640 ports scanned but not shown below are in state: closed)
Port       State       Service
135/tcp    open        loc-srv
139/tcp    open        netbios-ssn
445/tcp    open        microsoft-ds
1026/tcp   open        LSA-or-nterm
Device type: general purpose
Running: Microsoft Windows NT/2K/XP
OS details: Microsoft Windows XP Pro or Windows 2000 Pro SP2+
OS Fingerprint:
(None)
TCP Sequence Prediction: Class=random positive increments
                         Difficulty=18776 (Worthy challenge)
TCP ISN Seq. Numbers: 428E9E4C 42915198 429359C1 42958824
IPID Sequence Generation: Incremental
Final times for host: srtt: 186 rttvar: 29  to: 300000

Nmap run completed -- 1 IP address (1 host up) scanned in 4.340 seconds




---------------------------------------------------------------------
For help using this (nmap-dev) mailing list, send a blank email to 
nmap-dev-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).



Current thread: