Nmap Development mailing list archives

pgsql-brute script doesn't work


From: Alexander Fedintsev <alexanderfedintsev () gmail com>
Date: Sat, 31 Aug 2013 17:50:16 +0400

I'm trying to use this script but it doesn't work. But another
scripts(oracle, ms-sql) work fine. Here is my command line: nmap -p 5432
--script pgsql-brute --script-args
userdb=customuser.txt,passdb=custompass.txt 192.168.1.46. And here is nmap
output:


Starting Nmap 6.40 ( http://nmap.org ) at 2013-08-26 15:52 Московское время
(зима)

Nmap scan report for 192.168.1.46

Host is up (0.00s latency).

PORT STATE SERVICE

5432/tcp open postgresql

MAC Address: 08:00:27:75:8D:0F (Cadmus Computer Systems)



Nmap done: 1 IP address (1 host up) scanned in 1.90 seconds

passdb and userdb contain correct login and password. There is PostgreSQL
version 9.2 on target host.

Here is output with -d3:

Starting Nmap 6.40 ( http://nmap.org ) at 2013-08-29 09:28 Московское время
(зима)

Fetchfile found C:\Program Files (x86)\Nmap/nmap-services

Trying to initialize WinPcap

Winpcap present, dynamic linked to: WinPcap version 4.1.2 (packet.dll
version 4.1.0.2001), based on libpcap version 1.0 branch 1_0_rel0b
(20091008)

NPF service is already running.

Fetchfile found C:\Program Files (x86)\Nmap/nmap.xsl

The max # of sockets we are using is: 0

--------------- Timing report ---------------

hostgroups: min 1, max 100000

rtt-timeouts: init 1000, min 100, max 10000

max-scan-delay: TCP 1000, UDP 1000, SCTP 1000

parallelism: min 0, max 0

max-retries: 10, host-timeout: 0

min-rate: 0, max-rate: 0

---------------------------------------------

NSE: Using Lua 5.2.

Fetchfile found C:\Program Files (x86)\Nmap/nse_main.lua

Fetchfile found C:\Program Files (x86)\Nmap/nselib/stdnse.lua

Fetchfile found C:\Program Files (x86)\Nmap/nselib/strict.lua

Fetchfile found C:\Program Files (x86)\Nmap/scripts\script.db

NSE: Script Arguments seen from CLI:
userdb=customuser.txt,passdb=custompass.txt

NSE: {

["userdb"] = "customuser.txt",

["passdb"] = "custompass.txt",

}

Fetchfile found C:\Program Files (x86)\Nmap/scripts\pgsql-brute.nse

NSE: Script pgsql-brute.nse was selected by name.

Fetchfile found C:\Program Files (x86)\Nmap/nselib/pgsql.lua

Fetchfile found C:\Program Files (x86)\Nmap/nselib/shortport.lua

Fetchfile found C:\Program Files (x86)\Nmap/nselib/unpwdb.lua

NSE: Loaded 1 scripts for scanning.

NSE: Loaded 'C:\Program Files (x86)\Nmap/scripts\pgsql-brute.nse'.

NSE: Script Pre-scanning.

NSE: Starting runlevel 1 (of 1) scan.

Fetchfile found C:\Program Files (x86)\Nmap/nmap-payloads

Initiating ARP Ping Scan at 09:28

Scanning 192.168.1.46 [1 port]

Packet capture filter (device eth1): arp and arp[18:4] = 0x50E54940 and
arp[22:2] = 0x3646

SENT (1.9540s) ARP who-has 192.168.1.46 tell 192.168.1.37

**TIMING STATS** (1.9550s): IP, probes
active/freshportsleft/retry_stack/outstanding/retranwait/onbench,
cwnd/ssthresh/delay, timeout/srtt/rttvar/

Groupstats (1/1 incomplete): 1/*/*/*/*/* 10.00/75/* 200000/-1/-1

Current sending rates: 1.22 packets / s, 51.16 bytes / s.

Overall sending rates: 1.22 packets / s, 51.16 bytes / s.

RCVD (1.9550s) ARP reply 192.168.1.46 is-at 08:00:27:75:8D:0F

Found 192.168.1.46 in incomplete hosts list.

ultrascan_host_probe_update called for machine 192.168.1.46 state UNKNOWN
-> HOST_UP (trynum 0 time: 1000)

Changing ping technique for 192.168.1.46 to ARP

Moving 192.168.1.46 to completed hosts list with 0 outstanding probes.

Changing global ping host to 192.168.1.46.

Completed ARP Ping Scan at 09:28, 0.82s elapsed (1 total hosts)

Overall sending rates: 1.22 packets / s, 51.16 bytes / s.

pcap stats: 2 packets received by filter, 0 dropped by kernel.

mass_rdns: Using DNS server 192.168.1.1

Interface {21AFB328-D392-4723-BEC0-584BA1B3A682} is not known; ignoring its
nameservers.

mass_rdns: Using DNS server 192.168.1.1

Interface {846ee342-7039-11de-9d20-806e6f6e6963} is not known; ignoring its
nameservers.

Initiating Parallel DNS resolution of 1 host. at 09:28

mass_rdns: 0.81s 0/1 [#: 2, OK: 0, NX: 0, DR: 0, SF: 0, TR: 1]

Completed Parallel DNS resolution of 1 host. at 09:28, 0.00s elapsed

DNS resolution of 1 IPs took 0.81s. Mode: Async [#: 2, OK: 0, NX: 1, DR: 0,
SF: 0, TR: 1, CN: 0]

Initiating SYN Stealth Scan at 09:28

192.168.1.46 pingprobe type ARP is inappropriate for this scan type;
resetting.

Scanning 192.168.1.46 [1 port]

Packet capture filter (device eth1): dst host 192.168.1.37 and (icmp or
icmp6 or ((tcp or udp or sctp) and (src host 192.168.1.46)))

SENT (2.7690s) TCP [192.168.1.37:50852 > 192.168.1.46:5432 S seq=872582625
ack=0 off=6 res=0 win=1024 csum=0x72C2 urp=0 <mss 1460>] IP [ver=4 ihl=5
tos=0x00 iplen=44 id=15516 foff=0 ttl=42 proto=6 csum=0xd08c]

**TIMING STATS** (2.7690s): IP, probes
active/freshportsleft/retry_stack/outstanding/retranwait/onbench,
cwnd/ssthresh/delay, timeout/srtt/rttvar/

Groupstats (1/1 incomplete): 1/*/*/*/*/* 10.00/75/* 1000000/-1/-1

Current sending rates: 1000.00 packets / s, 44000.00 bytes / s.

Overall sending rates: 1000.00 packets / s, 44000.00 bytes / s.

RCVD (2.7690s) TCP [192.168.1.46:5432 > 192.168.1.37:50852 SA
seq=3383529877 ack=872582626 off=6 res=0 win=64240 csum=0x207E urp=0 <mss
1460>] IP [ver=4 ihl=5 tos=0x00 iplen=44 id=181 flg=D foff=0 ttl=128
proto=6 csum=0x7673]

Found 192.168.1.46 in incomplete hosts list.

Discovered open port 5432/tcp on 192.168.1.46

Changing ping technique for 192.168.1.46 to tcp to port 5432; flags: S

Moving 192.168.1.46 to completed hosts list with 0 outstanding probes.

Changing global ping host to 192.168.1.46.

Completed SYN Stealth Scan at 09:28, 0.00s elapsed (1 total ports)

Overall sending rates: 1000.00 packets / s, 44000.00 bytes / s.

pcap stats: 2 packets received by filter, 0 dropped by kernel.

NSE: Script scanning 192.168.1.46.

NSE: Starting runlevel 1 (of 1) scan.

NSE: Starting 'pgsql-brute' (thread: 02C37678) against 192.168.1.46:5432.

Initiating NSE at 09:28

NSE: TCP 192.168.1.37:13676 > 192.168.1.46:5432 | CONNECT

NSE: TCP 192.168.1.37:13676 > 192.168.1.46:5432 | 00000000: 00 00 00 31 00
03 00 00 75 73 65 72 00 76 65 72 1 user ver

00000010: 73 69 6f 6e 70 72 6f 62 65 00 64 61 74 61 62 61 sionprobe databa

00000020: 73 65 00 76 65 72 73 69 6f 6e 70 72 6f 62 65 00 se versionprobe

00000030: 00



NSE: TCP 192.168.1.37:13676 > 192.168.1.46:5432 | SEND

NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 ed
53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280

00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con

00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f ,

00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe

00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea

00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0

00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37"

00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb

00000080: ff 20 22 76 65 72 73 69 6f 6e 70 72 6f 62 65 22 "versionprobe"

00000090: 2c 20 e1 e0 e7 fb 20 e4 e0 ed ed fb f5 20 22 76 , "v

000000a0: 65 72 73 69 6f 6e 70 72 6f 62 65 22 2c 20 53 53 ersionprobe", SS

000000b0: 4c 20 e2 fb ea eb 2e 00 46 73 72 63 5c 62 61 63 L . Fsrc\bac

000000c0: 6b 65 6e 64 5c 6c 69 62 70 71 5c 61 75 74 68 2e kend\libpq\auth.

000000d0: 63 00 4c 34 37 39 00 52 43 6c 69 65 6e 74 41 75 c L479 RClientAu

000000e0: 74 68 65 6e 74 69 63 61 74 69 6f 6e 00 00 thentication



NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE

NSE: Trying admin/1 ...

NSE: TCP 192.168.1.37:13677 > 192.168.1.46:5432 | CONNECT

NSE: TCP 192.168.1.37:13677 > 192.168.1.46:5432 | 00000000: 00 00 00 08 04
d2 16 2f /



NSE: TCP 192.168.1.37:13677 > 192.168.1.46:5432 | SEND

NSE: TCP unknown protocol:0 < unknown protocol:0 | N

NSE: TCP unknown protocol:0 > unknown protocol:0 | 00000000: 00 00 00 23 00
03 00 00 75 73 65 72 00 61 64 6d # user adm

00000010: 69 6e 00 64 61 74 61 62 61 73 65 00 61 64 6d 69 in database admi

00000020: 6e 00 00 n



NSE: TCP unknown protocol:0 > unknown protocol:0 | SEND

NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 df
53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280

00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con

00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f ,

00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe

00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea

00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0

00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37"

00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb

00000080: ff 20 22 61 64 6d 69 6e 22 2c 20 e1 e0 e7 fb 20 "admin",

00000090: e4 e0 ed ed fb f5 20 22 61 64 6d 69 6e 22 2c 20 "admin",

000000a0: 53 53 4c 20 e2 fb ea eb 2e 00 46 73 72 63 5c 62 SSL . Fsrc\b

000000b0: 61 63 6b 65 6e 64 5c 6c 69 62 70 71 5c 61 75 74 ackend\libpq\aut

000000c0: 68 2e 63 00 4c 34 37 39 00 52 43 6c 69 65 6e 74 h.c L479 RClient

000000d0: 41 75 74 68 65 6e 74 69 63 61 74 69 6f 6e 00 00 Authentication



NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE

NSE: TCP 192.168.1.37:13678 > 192.168.1.46:5432 | CONNECT

NSE: TCP 192.168.1.37:13678 > 192.168.1.46:5432 | 00000000: 00 00 00 23 00
03 00 00 75 73 65 72 00 61 64 6d # user adm

00000010: 69 6e 00 64 61 74 61 62 61 73 65 00 61 64 6d 69 in database admi

00000020: 6e 00 00 n



NSE: TCP 192.168.1.37:13678 > 192.168.1.46:5432 | SEND

NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 df
53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280

00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con

00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f ,

00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe

00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea

00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0

00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37"

00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb

00000080: ff 20 22 61 64 6d 69 6e 22 2c 20 e1 e0 e7 fb 20 "admin",

00000090: e4 e0 ed ed fb f5 20 22 61 64 6d 69 6e 22 2c 20 "admin",

000000a0: 53 53 4c 20 e2 fb ea eb 2e 00 46 73 72 63 5c 62 SSL . Fsrc\b

000000b0: 61 63 6b 65 6e 64 5c 6c 69 62 70 71 5c 61 75 74 ackend\libpq\aut

000000c0: 68 2e 63 00 4c 34 37 39 00 52 43 6c 69 65 6e 74 h.c L479 RClient

000000d0: 41 75 74 68 65 6e 74 69 63 61 74 69 6f 6e 00 00 Authentication



NSE: pgsql-brute: sendStartup returned: в pg_hba.conf нет записи,
разрешающей подключение для репликации с компьютера "192.168.1.37" для
пользователя "admin", базы данных "admin", SSL выкл.

NSE: Trying Test/1 ...

NSE: TCP 192.168.1.37:13679 > 192.168.1.46:5432 | CONNECT

NSE: TCP 192.168.1.37:13679 > 192.168.1.46:5432 | 00000000: 00 00 00 08 04
d2 16 2f /



NSE: TCP 192.168.1.37:13679 > 192.168.1.46:5432 | SEND

NSE: TCP unknown protocol:0 < unknown protocol:0 | N

NSE: TCP unknown protocol:0 > unknown protocol:0 | 00000000: 00 00 00 21 00
03 00 00 75 73 65 72 00 54 65 73 ! user Tes

00000010: 74 00 64 61 74 61 62 61 73 65 00 54 65 73 74 00 t database Test

00000020: 00



NSOCK INFO [2.5150s] nsi_new2(): nsi_new (IOD #1)

NSOCK INFO [2.7650s] nsock_connect_udp(): UDP connection requested to
192.168.1.1:53 (IOD #1) EID 8

NSOCK INFO [2.7650s] nsock_read(): Read request from IOD #1 [192.168.1.1:53]
(timeout: -1ms) EID 18

NSOCK INFO [2.7650s] nsi_new2(): nsi_new (IOD #2)

NSOCK INFO [2.7650s] nsock_connect_udp(): UDP connection requested to
192.168.1.1:53 (IOD #2) EID 24

NSOCK INFO [2.7650s] nsock_read(): Read request from IOD #2 [192.168.1.1:53]
(timeout: -1ms) EID 34

NSOCK INFO [2.7650s] nsock_trace_handler_callback(): Callback: CONNECT
SUCCESS for EID 8 [192.168.1.1:53]

NSOCK INFO [2.7650s] nsock_trace_handler_callback(): Callback: WRITE
SUCCESS for EID 43 [192.168.1.1:53]

NSOCK INFO [2.7650s] nsock_trace_handler_callback(): Callback: CONNECT
SUCCESS for EID 24 [192.168.1.1:53]

NSOCK INFO [2.7680s] nsock_trace_handler_callback(): Callback: READ SUCCESS
for EID 18 [192.168.1.1:53] (102 bytes)

NSOCK INFO [2.7680s] nsock_read(): Read request from IOD #1 [192.168.1.1:53]
(timeout: -1ms) EID 50

NSOCK INFO [2.7680s] nsi_delete(): nsi_delete (IOD #1)

NSOCK INFO [2.7680s] msevent_cancel(): msevent_cancel on event #50 (type
READ)

NSOCK INFO [2.7680s] nsi_delete(): nsi_delete (IOD #2)

NSOCK INFO [2.7680s] msevent_cancel(): msevent_cancel on event #34 (type
READ)

NSOCK INFO [2.7680s] nsi_new2(): nsi_new (IOD #1)

NSOCK INFO [2.7700s] nsock_connect_tcp(): TCP connection requested to
192.168.1.46:5432 (IOD #1) EID 8

NSOCK INFO [2.7700s] nsock_trace_handler_callback(): Callback: CONNECT
SUCCESS for EID 8 [192.168.1.46:5432]

NSOCK INFO [2.7710s] nsock_trace_handler_callback(): Callback: WRITE
SUCCESS for EID 19 [192.168.1.46:5432]

NSOCK INFO [2.7710s] nsock_readbytes(): Read request for 2 bytes from IOD
#1 [192.168.1.46:5432] EID 26

NSOCK INFO [2.8160s] nsock_trace_handler_callback(): Callback: READ SUCCESS
for EID 26 [(null):-1] (238 bytes)

NSOCK INFO [2.8160s] nsi_delete(): nsi_delete (IOD #1)

NSOCK INFO [2.8160s] nsi_new2(): nsi_new (IOD #2)

NSOCK INFO [2.8160s] nsock_connect_tcp(): TCP connection requested to
192.168.1.46:5432 (IOD #2) EID 32

NSOCK INFO [2.8170s] nsock_trace_handler_callback(): Callback: CONNECT
SUCCESS for EID 32 [192.168.1.46:5432]

NSOCK INFO [2.8170s] nsock_trace_handler_callback(): Callback: WRITE
SUCCESS for EID 43 [192.168.1.46:5432]

NSOCK INFO [2.8170s] nsock_readbytes(): Read request for 1 bytes from IOD
#2 [192.168.1.46:5432] EID 50

NSOCK INFO [2.8300s] nsock_trace_handler_callback(): Callback: READ SUCCESS
for EID 50 [(null):-1] (1 bytes): N

NSOCK INFO [2.8300s] nsock_trace_handler_callback(): Callback: WRITE
SUCCESS for EID 59 [(null):-1]

NSOCK INFO [2.8310s] nsock_readbytes(): Read request for 2 bytes from IOD
#2 [(null):-1] EID 66

NSOCK INFO [2.8320s] nsock_trace_handler_callback(): Callback: READ SUCCESS
for EID 66 [(null):-1] (224 bytes)

NSOCK INFO [2.8320s] nsi_delete(): nsi_delete (IOD #2)

NSOCK INFO [2.8320s] nsi_new2(): nsi_new (IOD #3)

NSOCK INFO [2.8320s] nsock_connect_tcp(): TCP connection requested to
192.168.1.46:5432 (IOD #3) EID 72

NSOCK INFO [2.8320s] nsock_trace_handler_callback(): Callback: CONNECT
SUCCESS for EID 72 [192.168.1.46:5432]

NSOCK INFO [2.8420s] nsock_trace_handler_callback(): Callback: WRITE
SUCCESS for EID 83 [192.168.1.46:5432]

NSOCK INFO [2.8420s] nsock_readbytes(): Read request for 2 bytes from IOD
#3 [192.168.1.46:5432] EID 90

NSOCK INFO [2.8460s] nsock_trace_handler_callback(): Callback: READ SUCCESS
for EID 90 [(null):-1] (224 bytes)

NSOCK INFO [2.8460s] nsi_new2(): nsi_new (IOD #4)

NSOCK INFO [2.8460s] nsock_connect_tcp(): TCP connection requested to
192.168.1.46:5432 (IOD #4) EID 96

NSOCK INFO [2.8460s] nsock_trace_handler_callback(): Callback: CONNECT
SUCCESS for EID 96 [192.168.1.46:5432]

NSOCK INFO [2.8560s] nsock_trace_handler_callback(): Callback: WRITE
SUCCESS for EID 107 [192.168.1.46:5432]

NSOCK INFO [2.8560s] nsock_readbytes(): Read request for 1 bytes from IOD
#4 [192.168.1.46:5432] EID 114

NSOCK INFO [2.8600s] nsock_trace_handler_callback(): Callback: READ SUCCESS
for EID 114 [(null):-1] (1 bytes): N

NSOCK INFO [2.8600s] nsocNSE: TCP unknown protocol:0 > unknown protocol:0 |
SEND

NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 dd
53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280

00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con

00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f ,

00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe

00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea

00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0

00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37"

00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb

00000080: ff 20 22 54 65 73 74 22 2c 20 e1 e0 e7 fb 20 e4 "Test",

00000090: e0 ed ed fb f5 20 22 54 65 73 74 22 2c 20 53 53 "Test", SS

000000a0: 4c 20 e2 fb ea eb 2e 00 46 73 72 63 5c 62 61 63 L . Fsrc\bac

000000b0: 6b 65 6e 64 5c 6c 69 62 70 71 5c 61 75 74 68 2e kend\libpq\auth.

000000c0: 63 00 4c 34 37 39 00 52 43 6c 69 65 6e 74 41 75 c L479 RClientAu

000000d0: 74 68 65 6e 74 69 63 61 74 69 6f 6e 00 00 thentication



NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE

NSE: TCP 192.168.1.37:13680 > 192.168.1.46:5432 | CONNECT

NSE: TCP 192.168.1.37:13680 > 192.168.1.46:5432 | 00000000: 00 00 00 21 00
03 00 00 75 73 65 72 00 54 65 73 ! user Tes

00000010: 74 00 64 61 74 61 62 61 73 65 00 54 65 73 74 00 t database Test

00000020: 00



NSE: TCP 192.168.1.37:13680 > 192.168.1.46:5432 | SEND

NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 dd
53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280

00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con

00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f ,

00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe

00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea

00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0

00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37"

00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb

00000080: ff 20 22 54 65 73 74 22 2c 20 e1 e0 e7 fb 20 e4 "Test",

00000090: e0 ed ed fb f5 20 22 54 65 73 74 22 2c 20 53 53 "Test", SS

000000a0: 4c 20 e2 fb ea eb 2e 00 46 73 72 63 5c 62 61 63 L . Fsrc\bac

000000b0: 6b 65 6e 64 5c 6c 69 62 70 71 5c 61 75 74 68 2e kend\libpq\auth.

000000c0: 63 00 4c 34 37 39 00 52 43 6c 69 65 6e 74 41 75 c L479 RClientAu

000000d0: 74 68 65 6e 74 69 63 61 74 69 6f 6e 00 00 thentication



NSE: pgsql-brute: sendStartup returned: в pg_hba.conf нет записи,
разрешающей подключение для репликации с компьютера "192.168.1.37" для
пользователя "Test", базы данных "Test", SSL выкл.

NSE: Trying netcheckadmin/1 ...

NSE: TCP 192.168.1.37:13681 > 192.168.1.46:5432 | CONNECT

NSE: TCP 192.168.1.37:13681 > 192.168.1.46:5432 | 00000000: 00 00 00 08 04
d2 16 2f /



NSE: TCP 192.168.1.37:13681 > 192.168.1.46:5432 | SEND

NSE: TCP unknown protocol:0 < unknown protocol:0 | N

NSE: TCP unknown protocol:0 > unknown protocol:0 | 00000000: 00 00 00 33 00
03 00 00 75 73 65 72 00 6e 65 74 3 user net

00000010: 63 68 65 63 6b 61 64 6d 69 6e 00 64 61 74 61 62 checkadmin datab

00000020: 61 73 65 00 6e 65 74 63 68 65 63 6b 61 64 6d 69 ase netcheckadmi

00000030: 6e 00 00 n



NSE: TCP unknown protocol:0 > unknown protocol:0 | SEND

NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 ef
53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280

00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con

00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f ,

00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe

00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea

00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0

00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37"

00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb

00000080: ff 20 22 6e 65 74 63 68 65 63 6b 61 64 6d 69 6e "netcheckadmin

00000090: 22 2c 20 e1 e0 e7 fb 20 e4 e0 ed ed fb f5 20 22 ", "

000000a0: 6e 65 74 63 68 65 63 6b 61 64 6d 69 6e 22 2c 20 netcheckadmin",

000000b0: 53 53 4c 20 e2 fb ea eb 2e 00 46 73 72 63 5c 62 SSL . Fsrc\b

000000c0: 61 63 6b 65 6e 64 5c 6c 69 62 70 71 5c 61 75 74 ackend\libpq\aut

000000d0: 68 2e 63 00 4c 34 37 39 00 52 43 6c 69 65 6e 74 h.c L479 RClient

000000e0: 41 75 74 68 65 6e 74 69 63 61 74 69 6f 6e 00 00 Authentication



NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE

NSE: TCP 192.168.1.37:13682 > 192.168.1.46:5432 | CONNECT

NSE: TCP 192.168.1.37:13682 > 192.168.1.46:5432 | 00000000: 00 00 00 33 00
03 00 00 75 73 65 72 00 6e 65 74 3 user net

00000010: 63 68 65 63 6b 61 64 6d 69 6e 00 64 61 74 61 62 checkadmin datab

00000020: 61 73 65 00 6e 65 74 63 68 65 63 6b 61 64 6d 69 ase netcheckadmi

00000030: 6e 00 00 n



NSE: TCP 192.168.1.37:13682 > 192.168.1.46:5432 | SEND

NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 ef
53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280

00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con

00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f ,

00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe

00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea

00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0

00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37"

00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb

00000080: ff 20 22 6e 65 74 63 68 65 63 6b 61 64 6d 69 6e "netcheckadmin

00000090: 22 2c 20 e1 e0 e7 fb 20 e4 e0 ed ed fb f5 20 22 ", "

000000a0: 6e 65 74 63 68 65 63 6b 61 64 6d 69 6e 22 2c 20 netcheckadmin",

000000b0: 53 53 4c 20 e2 fb ea eb 2e 00 46 73 72 63 5c 62 SSL . Fsrc\b

000000c0: 61 63 6b 65 6e 64 5c 6c 69 62 70 71 5c 61 75 74 ackend\libpq\aut

000000d0: 68 2e 63 00 4c 34 37 39 00 52 43 6c 69 65 6e 74 h.c L479 RClient

000000e0: 41 75 74 68 65 6e 74 69 63 61 74 69 6f 6e 00 00 Authentication



NSE: pgsql-brute: sendStartup returned: в pg_hba.conf нет записи,
разрешающей подключение для репликации с компьютера "192.168.1.37" для
пользователя "netcheckadmin", базы данных "netcheckadmin", SSL выкл.

NSE: Trying postgres/1 ...

NSE: TCP 192.168.1.37:13683 > 192.168.1.46:5432 | CONNECT

NSE: TCP 192.168.1.37:13683 > 192.168.1.46:5432 | 00000000: 00 00 00 08 04
d2 16 2f /



NSE: TCP 192.168.1.37:13683 > 192.168.1.46:5432 | SEND

NSE: TCP unknown protocol:0 < unknown protocol:0 | N

NSE: TCP unknown protocol:0 > unknown protocol:0 | 00000000: 00 00 00 29 00
03 00 00 75 73 65 72 00 70 6f 73 ) user pos

00000010: 74 67 72 65 73 00 64 61 74 61 62 61 73 65 00 70 tgres database p

00000020: 6f 73 74 67 72 65 73 00 00 ostgres



NSE: TCP unknown protocol:0 > unknown protocol:0 | SEND

NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 e5
53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280

00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con

00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f ,

00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe

00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea

00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0

00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37"

00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb

00000080: ff 20 22 70 6f 73 74 67 72 65 73 22 2c 20 e1 e0 "postgres",

00000090: e7 fb 20 e4 e0 ed ed fb f5 20 22 70 6f 73 74 67 "postg

000000a0: 72 65 73 22 2c 20 53 53 4c 20 e2 fb ea eb 2e 00 res", SSL .

000000b0: 46 73 72 63 5c 62 61 63 6b 65 6e 64 5c 6c 69 62 Fsrc\backend\lib

000000c0: 70 71 5c 61 75 74 68 2e 63 00 4c 34 37 39 00 52 pq\auth.c L479 R

000000d0: 43 6c 69 65 6e 74 41 75 74 68 65 6e 74 69 63 61 ClientAuthentica

000000e0: 74 69 6f 6e 00 00 tion



NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE

NSE: TCP 192.168.1.37:13684 > 192.168.1.46:5432 | CONNECT

NSE: TCP 192.168.1.37:13684 > 192.168.1.46:5432 | 00000000: 00 00 00 29 00
03 00 00 75 73 65 72 00 70 6f 73 ) user pos

00000010: 74 67 72 65 73 00 64 61 74 61 62 61 73 65 00 70 tgres database p

00000020: 6f 73 74 67 72 65 73 00 00 ostgres



NSE: TCP 192.168.1.37:13684 > 192.168.1.46:5432 | SEND

NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 e5
53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280

00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con

00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f ,

00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe

00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea

00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0

00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37"

00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb

00000080: ff 20 22 70 6f 73 74 67 72 65 73 22 2c 20 e1 e0 "postgres",

00000090: e7 fb 20 e4 e0 ed ed fb f5 20 22 70 6f 73 74 67 "postg

000000a0: 72 65 73 22 2c 20 53 53 4c 20 e2 fb ea eb 2e 00 res", SSL .

000000b0: 46 73 72 63 5c 62 61 63 6b 65 6e 64 5c 6c 69 62 Fsrc\backend\lib

000000c0: 70 71 5c 61 75 74 68 2e 63 00 4c 34 37 39 00 52 pq\auth.c L479 R

000000d0: 43 6c 69 65 6e 74 41 75 74 68 65 6e 74 69 63 61 ClientAuthentica

000000e0: 74 69 6f 6e 00 00 tion



NSE: pgsql-brute: sendStartup returned: в pg_hba.conf нет записи,
разрешающей подключение для репликации с компьютера "192.168.1.37" для
пользователя "postgres", базы данных "postgres", SSL выкл.

NSE: Trying SYSTEM/1 ...

k_trace_handler_callback(): Callback: WRITE SUCCESS for EID 123 [(null):-1]

NSOCK INFO [2.8600s] nsock_readbytes(): Read request for 2 bytes from IOD
#4 [(null):-1] EID 130

NSOCK INFO [2.8610s] nsock_trace_handler_callback(): Callback: READ SUCCESS
for EID 130 [(null):-1] (222 bytes)

NSOCK INFO [2.8620s] nsi_delete(): nsi_delete (IOD #4)

NSOCK INFO [2.8620s] nsi_new2(): nsi_new (IOD #5)

NSOCK INFO [2.8620s] nsock_connect_tcp(): TCP connection requested to
192.168.1.46:5432 (IOD #5) EID 136

NSOCK INFO [2.8620s] nsock_trace_handler_callback(): Callback: CONNECT
SUCCESS for EID 136 [192.168.1.46:5432]

NSOCK INFO [2.8630s] nsock_trace_handler_callback(): Callback: WRITE
SUCCESS for EID 147 [192.168.1.46:5432]

NSOCK INFO [2.8630s] nsock_readbytes(): Read request for 2 bytes from IOD
#5 [192.168.1.46:5432] EID 154

NSOCK INFO [2.8790s] nsock_trace_handler_callback(): Callback: READ SUCCESS
for EID 154 [(null):-1] (222 bytes)

NSOCK INFO [2.8790s] nsi_new2(): nsi_new (IOD #6)

NSOCK INFO [2.8790s] nsock_connect_tcp(): TCP connection requested to
192.168.1.46:5432 (IOD #6) EID 160

NSOCK INFO [2.8800s] nsock_trace_handler_callback(): Callback: CONNECT
SUCCESS for EID 160 [192.168.1.46:5432]

NSOCK INFO [2.8900s] nsock_trace_handler_callback(): Callback: WRITE
SUCCESS for EID 171 [192.168.1.46:5432]

NSOCK INFO [2.8900s] nsock_readbytes(): Read request for 1 bytes from IOD
#6 [192.168.1.46:5432] EID 178

NSOCK INFO [2.8900s] nsock_trace_handler_callback(): Callback: READ SUCCESS
for EID 178 [(null):-1] (1 bytes): N

NSOCK INFO [2.8900s] nsock_trace_handler_callback(): Callback: WRITE
SUCCESS for EID 187 [(null):-1]

NSOCK INFO [2.8900s] nsock_readbytes(): Read request for 2 bytes from IOD
#6 [(null):-1] EID 194

NSOCK INFO [2.8920s] nsock_trace_handler_callback(): Callback: READ SUCCESS
for EID 194 [(null):-1] (240 bytes)

NSOCK INFO [2.8920s] nsi_delete(): nsi_delete (IOD #6)

NSOCK INFO [2.8920s] nsi_new2(): nsi_new (IOD #7)

NSOCK INFO [2.8920s] nsock_connect_tcp(): TCP connection requested to
192.168.1.46:5432 (IOD #7) EID 200

NSOCK INFO [2.8920s] nsock_trace_handler_callback(): Callback: CONNECT
SUCCESS for EID 200 [192.168.1.46:5432]

NSOCK INFO [2.9020s] nsock_trace_handler_callback(): Callback: WRITE
SUCCESS for EID 211 [192.168.1.46:5432]

NSOCK INFO [2.9020s] nsock_readbytes(): Read request for 2 bytes from IOD
#7 [192.168.1.46:5432] EID 218

NSOCK INFO [2.9070s] nsock_trace_handler_callback(): Callback: READ SUCCESS
for EID 218 [(null):-1] (240 bytes)

NSOCK INFO [2.9080s] nsi_new2(): nsi_new (IOD #8)

NSOCK INFO [2.9080s] nsock_connect_tcp(): TCP connection requested to
192.168.1.46:5432 (IOD #8) EID 224

NSOCK INFO [2.9080s] nsock_trace_handler_callback(): Callback: CONNECT
SUCCESS for EID 224 [192.168.1.46:5432]

NSOCK INFO [2.9080s] nsock_trace_handler_callback(): Callback: WRITE
SUCCESS for EID 235 [192.168.1.46:5432]

NSOCK INFO [2.9080s] nsock_readbytes(): Read request for 1 bytes from IOD
#8 [192.168.1.46:5432] EID 242

NSOCK INFO [2.9220s] nsock_trace_handler_callback(): Callback: READ SUCCESS
for EID 242 [(null):-1] (1 bytes): N

NSOCK INFO [2.9220s] nsock_trace_handler_callback(): Callback: WRITE
SUCCESS for EID 251 [(null):-1]

NSOCK INFO [2.9220s] nsock_readbytes(): Read request for 2 bytes from IOD
#8 [(null):-1] EID 258

NSOCK INFO [2.9230s] nsock_trace_handler_callback(): Callback: READ SUCCESS
for EID 258 [(null):-1] (230 bytes)

NSOCK INFO [2.9240s] nsi_delete(): nsi_delete (IOD #8)

NSOCK INFO [2.9240s] nsi_new2(): nsi_new (IOD #9)

NSOCK INFO [2.9240s] nsock_connect_tcp(): TCP connection requested to
192.168.1.46:5432 (IOD #9) EID 264

NSOCK INFO [2.9240s] nsock_trace_handler_callback(): Callback: CONNECT
SUCCESS for EID 264 [192.168.1.46:5432]

NSOCK INFO [2.9240s] nsock_trace_handler_callback(): Callback: WRITE
SUCCESS for EID 275 [192.168.1.46:5432]

NSOCK INFO [2.9240s] nsock_readbytes(): Read request for 2 bytes from IOD
#9 [192.168.1.46:5432] EID 282

NSOCK INFO [2.9390s] nsock_trace_handler_callback(): Callback: READ SUCCESS
for EID 282 [(null):-1] (230 bytes)

NSOCK INFO [2.9390s] nsi_new2(): nsi_new (IOD #10)

NSOCK INFO [2NSE: TCP 192.168.1.37:13685 > 192.168.1.46:5432 | CONNECT

NSE: TCP 192.168.1.37:13685 > 192.168.1.46:5432 | 00000000: 00 00 00 08 04
d2 16 2f /



NSE: TCP 192.168.1.37:13685 > 192.168.1.46:5432 | SEND

NSE: TCP unknown protocol:0 < unknown protocol:0 | N

NSE: TCP unknown protocol:0 > unknown protocol:0 | 00000000: 00 00 00 25 00
03 00 00 75 73 65 72 00 53 59 53 % user SYS

00000010: 54 45 4d 00 64 61 74 61 62 61 73 65 00 53 59 53 TEM database SYS

00000020: 54 45 4d 00 00 TEM



NSE: TCP unknown protocol:0 > unknown protocol:0 | SEND

NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 e1
53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280

00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con

00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f ,

00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe

00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea

00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0

00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37"

00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb

00000080: ff 20 22 53 59 53 54 45 4d 22 2c 20 e1 e0 e7 fb "SYSTEM",

00000090: 20 e4 e0 ed ed fb f5 20 22 53 59 53 54 45 4d 22 "SYSTEM"

000000a0: 2c 20 53 53 4c 20 e2 fb ea eb 2e 00 46 73 72 63 , SSL . Fsrc

000000b0: 5c 62 61 63 6b 65 6e 64 5c 6c 69 62 70 71 5c 61 \backend\libpq\a

000000c0: 75 74 68 2e 63 00 4c 34 37 39 00 52 43 6c 69 65 uth.c L479 RClie

000000d0: 6e 74 41 75 74 68 65 6e 74 69 63 61 74 69 6f 6e ntAuthentication

000000e0: 00 00



NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE

NSE: TCP 192.168.1.37:13686 > 192.168.1.46:5432 | CONNECT

NSE: TCP 192.168.1.37:13686 > 192.168.1.46:5432 | 00000000: 00 00 00 25 00
03 00 00 75 73 65 72 00 53 59 53 % user SYS

00000010: 54 45 4d 00 64 61 74 61 62 61 73 65 00 53 59 53 TEM database SYS

00000020: 54 45 4d 00 00 TEM



NSE: TCP 192.168.1.37:13686 > 192.168.1.46:5432 | SEND

NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 e1
53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280

00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con

00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f ,

00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe

00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea

00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0

00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37"

00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb

00000080: ff 20 22 53 59 53 54 45 4d 22 2c 20 e1 e0 e7 fb "SYSTEM",

00000090: 20 e4 e0 ed ed fb f5 20 22 53 59 53 54 45 4d 22 "SYSTEM"

000000a0: 2c 20 53 53 4c 20 e2 fb ea eb 2e 00 46 73 72 63 , SSL . Fsrc

000000b0: 5c 62 61 63 6b 65 6e 64 5c 6c 69 62 70 71 5c 61 \backend\libpq\a

000000c0: 75 74 68 2e 63 00 4c 34 37 39 00 52 43 6c 69 65 uth.c L479 RClie

000000d0: 6e 74 41 75 74 68 65 6e 74 69 63 61 74 69 6f 6e ntAuthentication

000000e0: 00 00



NSE: pgsql-brute: sendStartup returned: в pg_hba.conf нет записи,
разрешающей подключение для репликации с компьютера "192.168.1.37" для
пользователя "SYSTEM", базы данных "SYSTEM", SSL выкл.

NSE: Finished 'pgsql-brute' (thread: 02C37678) against 192.168.1.46:5432.

NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE

NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE

NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE

NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE

NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE

Completed NSE at 09:28, 0.20s elapsed


Nmap scan report for 192.168.1.46

Fetchfile found C:\Program Files (x86)\Nmap/nmap-mac-prefixes

.9390s] nsock_connect_tcp(): TCP connection requested to
192.168.1.46:5432(IOD #10) EID 288

NSOCK INFO [2.9400s] nsock_trace_handler_callback(): Callback: CONNECT
SUCCESS for EID 288 [192.168.1.46:5432]

NSOCK INFO [2.9500s] nsock_trace_handler_callback(): Callback: WRITE
SUCCESS for EID 299 [192.168.1.46:5432]

NSOCK INFO [2.9500s] nsock_readbytes(): Read request for 1 bytes from IOD
#10 [192.168.1.46:5432] EID 306

NSOCK INFO [2.9510s] nsock_trace_handler_callback(): Callback: READ SUCCESS
for EID 306 [(null):-1] (1 bytes): N

NSOCK INFO [2.9510s] nsock_trace_handler_callback(): Callback: WRITE
SUCCESS for EID 315 [(null):-1]

NSOCK INFO [2.9510s] nsock_readbytes(): Read request for 2 bytes from IOD
#10 [(null):-1] EID 322

NSOCK INFO [2.9520s] nsock_trace_handler_callback(): Callback: READ SUCCESS
for EID 322 [(null):-1] (226 bytes)

NSOCK INFO [2.9530s] nsi_delete(): nsi_delete (IOD #10)

NSOCK INFO [2.9530s] nsi_new2(): nsi_new (IOD #11)

NSOCK INFO [2.9530s] nsock_connect_tcp(): TCP connection requested to
192.168.1.46:5432 (IOD #11) EID 328

NSOCK INFO [2.9530s] nsock_trace_handler_callback(): Callback: CONNECT
SUCCESS for EID 328 [192.168.1.46:5432]

NSOCK INFO [2.9630s] nsock_trace_handler_callback(): Callback: WRITE
SUCCESS for EID 339 [192.168.1.46:5432]

NSOCK INFO [2.9630s] nsock_readbytes(): Read request for 2 bytes from IOD
#11 [192.168.1.46:5432] EID 346

NSOCK INFO [2.9640s] nsock_trace_handler_callback(): Callback: READ SUCCESS
for EID 346 [(null):-1] (226 bytes)

NSOCK INFO [2.9640s] nsi_delete(): nsi_delete (IOD #7)

NSOCK INFO [2.9640s] nsi_delete(): nsi_delete (IOD #5)

NSOCK INFO [2.9640s] nsi_delete(): nsi_delete (IOD #9)

NSOCK INFO [2.9640s] nsi_delete(): nsi_delete (IOD #3)

NSOCK INFO [2.9640s] nsi_delete(): nsi_delete (IOD #11)

MAC prefix 0001C8 is duplicated in C:\Program Files
(x86)\Nmap/nmap-mac-prefixes; ignoring duplicates.

MAC prefix 080030 is duplicated in C:\Program Files
(x86)\Nmap/nmap-mac-prefixes; ignoring duplicates.

MAC prefix 080030 is duplicated in C:\Program Files
(x86)\Nmap/nmap-mac-prefixes; ignoring duplicates.

Host is up, received arp-response (0.00088s latency).

Scanned at 2013-08-29 09:28:25 Московское время (зима) for 2s

PORT STATE SERVICE REASON

5432/tcp open postgresql syn-ack


MAC Address: 08:00:27:75:8D:0F (Cadmus Computer Systems)

Final times for host: srtt: 875 rttvar: 4000 to: 100000



NSE: Script Post-scanning.

NSE: Starting runlevel 1 (of 1) scan.

Read from C:\Program Files (x86)\Nmap: nmap-mac-prefixes nmap-payloads
nmap-services.

Nmap done: 1 IP address (1 host up) scanned in 2.97 seconds

Raw packets sent: 2 (72B) | Rcvd: 2 (72B)


I really hope that you will help me.
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/

Current thread: