Nmap Development mailing list archives
3.45 corrupting 3.00 results - Win2k command line version.
From: "Nathan" <nathan.grandbois () cerdant com>
Date: Thu, 18 Sep 2003 15:09:23 -0400
The Windows release of version 3.45 isn't working for me. I don't know why but here is what happens. It is reporting all ports as filtered. I've used version 3.00 for a while and it worked great. Now that doesn't work either. Below I have scanned a machine on my internal network for the netbios ports, nmap 3.00 now reports them as filtered. I then nc to those ports to prove they are open. I then FTP to a site to get the banner, run nmap 3.45 which tells me it is filtered. Version 3.00 was working fine until I ran 3.45. I did choose the registry update for 3.45. My system is a win2k pro with all the latest patches/service packs. If you need any more information/test results let me know and I'll get them to you. If this email address is not where I should be sending this, please direct me to the correct one. Thank you very much! Nathan C:\Tools\NMapWin\bin>nmap -sS -P0 -v -v -debug -T Normal -p 135-139 192.168.110.199 Starting nmap V. 3.00 ( www.insecure.org/nmap ) The first host is 192, and the last one is 192 The first host is 168, and the last one is 168 The first host is 110, and the last one is 110 The first host is 199, and the last one is 199 Host CERDANT1 (192.168.110.199) appears to be up ... good. Starting pos_scan (SYN Stealth Scan) Packet capture filter: dst host 192.168.110.10 and (icmp or (tcp and src host 192.168.110.199)) Initiating SYN Stealth Scan against CERDANT1 (192.168.110.199) Moving port or prog 139 to the potentially firewalled list Moving port or prog 137 to the potentially firewalled list Moving port or prog 136 to the potentially firewalled list Moving port or prog 135 to the potentially firewalled list Moving port or prog 138 to the potentially firewalled list Preparing for retry, nonresponsive port 138 noted Preparing for retry, nonresponsive port 135 noted Preparing for retry, nonresponsive port 136 noted Preparing for retry, nonresponsive port 137 noted Preparing for retry, nonresponsive port 139 noted Done with round 1 Moving port or prog 138 to the potentially firewalled list Moving port or prog 135 to the potentially firewalled list Moving port or prog 136 to the potentially firewalled list Moving port or prog 137 to the potentially firewalled list Moving port or prog 139 to the potentially firewalled list Done with round 2 The SYN Stealth Scan took 36 seconds to scan 5 ports. Interesting ports on CERDANT1 (192.168.110.199): Port State Service 135/tcp filtered msrpc 136/tcp filtered profile 137/tcp filtered netbios-ns 138/tcp filtered netbios-dgm 139/tcp filtered netbios-ssn Final times for host: srtt: -1 rttvar: -1 to: 6000000 Nmap run completed -- 1 IP address (1 host up) scanned in 38 seconds C:\Tools\NMapWin\bin>cd .. C:\Tools\NMapWin>cd .. C:\Tools>cd netcat C:\Tools\netcat>nc -v -v 192.168.110.199 135 CERDANT1 [192.168.110.199] 135 (epmap) open ^C C:\Tools\netcat>nc -v -v 192.168.110.199 137 CERDANT1 [192.168.110.199] 137 (netbios-ns): connection refused sent 0, rcvd 0: NOTSOCK C:\Tools\netcat>nc -v -v 192.168.110.199 139 CERDANT1 [192.168.110.199] 139 (netbios-ssn) open ^C C:\Tools\netcat>nc -v -v 192.168.110.199 138 CERDANT1 [192.168.110.199] 138 (?): connection refused sent 0, rcvd 0: NOTSOCK C:\Tools\netcat> C:\Tools\netcat>ftp 63.216.25.131 Connected to 63.216.25.131. 220- 220- ftp.nai.com FTP server (SFTPD) 220 User (63.216.25.131:(none)): ^C C:\Tools\netcat>nmap -sS -sV -P0 -p 21 -v -v -debug --version_trace 63.216.25.131 ***WinIP*** winpcap is present ***WinIP*** rawsock is available Starting nmap 3.45 ( http://www.insecure.org/nmap ) at 2003-09-18 15:03 Eastern Daylight Time The max # of sockets we are using is: 0 The first host is 63, and the last one is 63 The first host is 216, and the last one is 216 The first host is 25, and the last one is 25 The first host is 131, and the last one is 131 63.216.25.131 will use interface 192.168.110.10 Host 63-216-25-131.sdsl.cais.net (63.216.25.131) appears to be up ... good. Starting pos_scan (SYN Stealth Scan) Opening a real raw socket Trying to open eth1 for recieve with winpcap. Packet capture filter: dst host 192.168.110.10 and (icmp or (tcp and src host 63.216.25.131)) Initiating SYN Stealth Scan against 63-216-25-131.sdsl.cais.net (63.216.25.131) at 15:03 Ideal number of queries: 30 outstanding: 1 max 150 ports_left 1 timeout 6000000 senddelay: 0us Ideal number of queries: 30 outstanding: 1 max 150 ports_left 1 timeout 6000000 senddelay: 0us Ideal number of queries: 30 outstanding: 1 max 150 ports_left 1 timeout 6000000 senddelay: 0us Ideal number of queries: 30 outstanding: 0 max 150 ports_left 1 timeout 6000000 senddelay: 0us Finished round #1. Current stats: numqueries_ideal: 30; min_width: 1; max_width: 150; packet_incr: 4; senddelay: 0us; fa llback: 70% Ideal number of queries: 30 outstanding: 1 max 150 ports_left 1 timeout 6000000 senddelay: 0us Ideal number of queries: 30 outstanding: 1 max 150 ports_left 1 timeout 6000000 senddelay: 0us Ideal number of queries: 30 outstanding: 1 max 150 ports_left 1 timeout 6000000 senddelay: 0us Ideal number of queries: 30 outstanding: 0 max 150 ports_left 1 timeout 6000000 senddelay: 0us Adding filtered port 21/tcp Finished round #2. Current stats: numqueries_ideal: 30; min_width: 1; max_width: 150; packet_incr: 4; senddelay: 0us; fa llback: 70% The SYN Stealth Scan took 36 seconds to scan 1 ports. Fetchfile found C:\tools\NMap\/nmap-service-probes Interesting ports on 63-216-25-131.sdsl.cais.net (63.216.25.131): Fetchfile found C:\tools\NMap\/nmap-services PORT STATE SERVICE VERSION 21/tcp filtered ftp Final times for host: srtt: -1 rttvar: -1 to: 6000000 Nmap run completed -- 1 IP address (1 host up) scanned in 36.793 seconds C:\Tools\netcat> --------------------------------------------------------------------- For help using this (nmap-dev) mailing list, send a blank email to nmap-dev-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).
Current thread:
- 3.45 corrupting 3.00 results - Win2k command line version. Nathan (Sep 18)