Nmap Development mailing list archives
bug displaying OS information in nmao 3.30
From: Ste Jones <root () networkpenetration com>
Date: Sun, 29 Jun 2003 10:39:39 +0100
the new output in 3.30 doesn;t display the OS fingerprint... note the OS fingerprint: (none) below cheers ste root () networkpenetration com -bash-2.05b# nmap -O -sS -d 192.168.3.1 Starting nmap 3.30 ( http://www.insecure.org/nmap/ ) at 2003-06-29 09:28 GMT The first host is 192, and the last one is 192 The first host is 168, and the last one is 168 The first host is 3, and the last one is 3 The first host is 1, and the last one is 1 Packet capture filter (device fxp0): (icmp and dst host 192.168.3.2) or ((tcp or udp) and dst host 192.168.3.2 and ( dst port 44425 or dst port 44426 or dst port 44427 or dst port 44428 or dst port 44429)) We got a ping packet back from 192.168.3.1: id = 8171 seq = 35155 checksum = 22209 Hostupdate called for machine 192.168.3.1 state UNKNOWN/COMBO -> HOST_UP (trynum 0, dotimeadj: yes time: 12308) Finished block: srtt: 308 rttvar: 5000 timeout: 300000 block_tries: 1 up_this_block: 1 down_this_block: 0 group_sz: 1 massping done: num_hosts: 1 num_responses: 1 Host ponygirl.localdomain (192.168.3.1) appears to be up ... good. Starting pos_scan (SYN Stealth Scan) Packet capture filter (device fxp0): dst host 192.168.3.2 and (icmp or (tcp and src host 192.168.3.1)) Initiating SYN Stealth Scan against abc.localdomain (192.168.3.1) at 09:28 Adding open port 135/tcp Adding open port 139/tcp Adding open port 1026/tcp Adding open port 445/tcp Finished round #1. Current stats: numqueries_ideal: 118; min_width: 1; max_width: 150; packet_incr: 4; senddelay: 0us; fallback: 70% The SYN Stealth Scan took 1 second to scan 1644 ports. Wait time is 300ms Packet capture filter (device fxp0): dst host 192.168.3.2 and (icmp or (tcp and src host 192.168.3.1)) For OSScan assuming that port 135 is open and port 1 is closed and neither are firewalled Interesting ports on abc.localdomain (192.168.3.1): (The 1640 ports scanned but not shown below are in state: closed) Port State Service 135/tcp open loc-srv 139/tcp open netbios-ssn 445/tcp open microsoft-ds 1026/tcp open LSA-or-nterm Device type: general purpose Running: Microsoft Windows NT/2K/XP OS details: Microsoft Windows XP Pro or Windows 2000 Pro SP2+ OS Fingerprint: (None) TCP Sequence Prediction: Class=random positive increments Difficulty=18776 (Worthy challenge) TCP ISN Seq. Numbers: 428E9E4C 42915198 429359C1 42958824 IPID Sequence Generation: Incremental Final times for host: srtt: 186 rttvar: 29 to: 300000 Nmap run completed -- 1 IP address (1 host up) scanned in 4.340 seconds --------------------------------------------------------------------- For help using this (nmap-dev) mailing list, send a blank email to nmap-dev-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).
Current thread:
- bug displaying OS information in nmao 3.30 Ste Jones (Jun 29)