Nmap Development mailing list archives
pgsql-brute script doesn't work
From: Alexander Fedintsev <alexanderfedintsev () gmail com>
Date: Sat, 31 Aug 2013 17:50:16 +0400
I'm trying to use this script but it doesn't work. But another scripts(oracle, ms-sql) work fine. Here is my command line: nmap -p 5432 --script pgsql-brute --script-args userdb=customuser.txt,passdb=custompass.txt 192.168.1.46. And here is nmap output: Starting Nmap 6.40 ( http://nmap.org ) at 2013-08-26 15:52 Московское время (зима) Nmap scan report for 192.168.1.46 Host is up (0.00s latency). PORT STATE SERVICE 5432/tcp open postgresql MAC Address: 08:00:27:75:8D:0F (Cadmus Computer Systems) Nmap done: 1 IP address (1 host up) scanned in 1.90 seconds passdb and userdb contain correct login and password. There is PostgreSQL version 9.2 on target host. Here is output with -d3: Starting Nmap 6.40 ( http://nmap.org ) at 2013-08-29 09:28 Московское время (зима) Fetchfile found C:\Program Files (x86)\Nmap/nmap-services Trying to initialize WinPcap Winpcap present, dynamic linked to: WinPcap version 4.1.2 (packet.dll version 4.1.0.2001), based on libpcap version 1.0 branch 1_0_rel0b (20091008) NPF service is already running. Fetchfile found C:\Program Files (x86)\Nmap/nmap.xsl The max # of sockets we are using is: 0 --------------- Timing report --------------- hostgroups: min 1, max 100000 rtt-timeouts: init 1000, min 100, max 10000 max-scan-delay: TCP 1000, UDP 1000, SCTP 1000 parallelism: min 0, max 0 max-retries: 10, host-timeout: 0 min-rate: 0, max-rate: 0 --------------------------------------------- NSE: Using Lua 5.2. Fetchfile found C:\Program Files (x86)\Nmap/nse_main.lua Fetchfile found C:\Program Files (x86)\Nmap/nselib/stdnse.lua Fetchfile found C:\Program Files (x86)\Nmap/nselib/strict.lua Fetchfile found C:\Program Files (x86)\Nmap/scripts\script.db NSE: Script Arguments seen from CLI: userdb=customuser.txt,passdb=custompass.txt NSE: { ["userdb"] = "customuser.txt", ["passdb"] = "custompass.txt", } Fetchfile found C:\Program Files (x86)\Nmap/scripts\pgsql-brute.nse NSE: Script pgsql-brute.nse was selected by name. Fetchfile found C:\Program Files (x86)\Nmap/nselib/pgsql.lua Fetchfile found C:\Program Files (x86)\Nmap/nselib/shortport.lua Fetchfile found C:\Program Files (x86)\Nmap/nselib/unpwdb.lua NSE: Loaded 1 scripts for scanning. NSE: Loaded 'C:\Program Files (x86)\Nmap/scripts\pgsql-brute.nse'. NSE: Script Pre-scanning. NSE: Starting runlevel 1 (of 1) scan. Fetchfile found C:\Program Files (x86)\Nmap/nmap-payloads Initiating ARP Ping Scan at 09:28 Scanning 192.168.1.46 [1 port] Packet capture filter (device eth1): arp and arp[18:4] = 0x50E54940 and arp[22:2] = 0x3646 SENT (1.9540s) ARP who-has 192.168.1.46 tell 192.168.1.37 **TIMING STATS** (1.9550s): IP, probes active/freshportsleft/retry_stack/outstanding/retranwait/onbench, cwnd/ssthresh/delay, timeout/srtt/rttvar/ Groupstats (1/1 incomplete): 1/*/*/*/*/* 10.00/75/* 200000/-1/-1 Current sending rates: 1.22 packets / s, 51.16 bytes / s. Overall sending rates: 1.22 packets / s, 51.16 bytes / s. RCVD (1.9550s) ARP reply 192.168.1.46 is-at 08:00:27:75:8D:0F Found 192.168.1.46 in incomplete hosts list. ultrascan_host_probe_update called for machine 192.168.1.46 state UNKNOWN -> HOST_UP (trynum 0 time: 1000) Changing ping technique for 192.168.1.46 to ARP Moving 192.168.1.46 to completed hosts list with 0 outstanding probes. Changing global ping host to 192.168.1.46. Completed ARP Ping Scan at 09:28, 0.82s elapsed (1 total hosts) Overall sending rates: 1.22 packets / s, 51.16 bytes / s. pcap stats: 2 packets received by filter, 0 dropped by kernel. mass_rdns: Using DNS server 192.168.1.1 Interface {21AFB328-D392-4723-BEC0-584BA1B3A682} is not known; ignoring its nameservers. mass_rdns: Using DNS server 192.168.1.1 Interface {846ee342-7039-11de-9d20-806e6f6e6963} is not known; ignoring its nameservers. Initiating Parallel DNS resolution of 1 host. at 09:28 mass_rdns: 0.81s 0/1 [#: 2, OK: 0, NX: 0, DR: 0, SF: 0, TR: 1] Completed Parallel DNS resolution of 1 host. at 09:28, 0.00s elapsed DNS resolution of 1 IPs took 0.81s. Mode: Async [#: 2, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0] Initiating SYN Stealth Scan at 09:28 192.168.1.46 pingprobe type ARP is inappropriate for this scan type; resetting. Scanning 192.168.1.46 [1 port] Packet capture filter (device eth1): dst host 192.168.1.37 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 192.168.1.46))) SENT (2.7690s) TCP [192.168.1.37:50852 > 192.168.1.46:5432 S seq=872582625 ack=0 off=6 res=0 win=1024 csum=0x72C2 urp=0 <mss 1460>] IP [ver=4 ihl=5 tos=0x00 iplen=44 id=15516 foff=0 ttl=42 proto=6 csum=0xd08c] **TIMING STATS** (2.7690s): IP, probes active/freshportsleft/retry_stack/outstanding/retranwait/onbench, cwnd/ssthresh/delay, timeout/srtt/rttvar/ Groupstats (1/1 incomplete): 1/*/*/*/*/* 10.00/75/* 1000000/-1/-1 Current sending rates: 1000.00 packets / s, 44000.00 bytes / s. Overall sending rates: 1000.00 packets / s, 44000.00 bytes / s. RCVD (2.7690s) TCP [192.168.1.46:5432 > 192.168.1.37:50852 SA seq=3383529877 ack=872582626 off=6 res=0 win=64240 csum=0x207E urp=0 <mss 1460>] IP [ver=4 ihl=5 tos=0x00 iplen=44 id=181 flg=D foff=0 ttl=128 proto=6 csum=0x7673] Found 192.168.1.46 in incomplete hosts list. Discovered open port 5432/tcp on 192.168.1.46 Changing ping technique for 192.168.1.46 to tcp to port 5432; flags: S Moving 192.168.1.46 to completed hosts list with 0 outstanding probes. Changing global ping host to 192.168.1.46. Completed SYN Stealth Scan at 09:28, 0.00s elapsed (1 total ports) Overall sending rates: 1000.00 packets / s, 44000.00 bytes / s. pcap stats: 2 packets received by filter, 0 dropped by kernel. NSE: Script scanning 192.168.1.46. NSE: Starting runlevel 1 (of 1) scan. NSE: Starting 'pgsql-brute' (thread: 02C37678) against 192.168.1.46:5432. Initiating NSE at 09:28 NSE: TCP 192.168.1.37:13676 > 192.168.1.46:5432 | CONNECT NSE: TCP 192.168.1.37:13676 > 192.168.1.46:5432 | 00000000: 00 00 00 31 00 03 00 00 75 73 65 72 00 76 65 72 1 user ver 00000010: 73 69 6f 6e 70 72 6f 62 65 00 64 61 74 61 62 61 sionprobe databa 00000020: 73 65 00 76 65 72 73 69 6f 6e 70 72 6f 62 65 00 se versionprobe 00000030: 00 NSE: TCP 192.168.1.37:13676 > 192.168.1.46:5432 | SEND NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 ed 53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280 00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con 00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f , 00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe 00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea 00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0 00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37" 00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb 00000080: ff 20 22 76 65 72 73 69 6f 6e 70 72 6f 62 65 22 "versionprobe" 00000090: 2c 20 e1 e0 e7 fb 20 e4 e0 ed ed fb f5 20 22 76 , "v 000000a0: 65 72 73 69 6f 6e 70 72 6f 62 65 22 2c 20 53 53 ersionprobe", SS 000000b0: 4c 20 e2 fb ea eb 2e 00 46 73 72 63 5c 62 61 63 L . Fsrc\bac 000000c0: 6b 65 6e 64 5c 6c 69 62 70 71 5c 61 75 74 68 2e kend\libpq\auth. 000000d0: 63 00 4c 34 37 39 00 52 43 6c 69 65 6e 74 41 75 c L479 RClientAu 000000e0: 74 68 65 6e 74 69 63 61 74 69 6f 6e 00 00 thentication NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE NSE: Trying admin/1 ... NSE: TCP 192.168.1.37:13677 > 192.168.1.46:5432 | CONNECT NSE: TCP 192.168.1.37:13677 > 192.168.1.46:5432 | 00000000: 00 00 00 08 04 d2 16 2f / NSE: TCP 192.168.1.37:13677 > 192.168.1.46:5432 | SEND NSE: TCP unknown protocol:0 < unknown protocol:0 | N NSE: TCP unknown protocol:0 > unknown protocol:0 | 00000000: 00 00 00 23 00 03 00 00 75 73 65 72 00 61 64 6d # user adm 00000010: 69 6e 00 64 61 74 61 62 61 73 65 00 61 64 6d 69 in database admi 00000020: 6e 00 00 n NSE: TCP unknown protocol:0 > unknown protocol:0 | SEND NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 df 53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280 00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con 00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f , 00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe 00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea 00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0 00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37" 00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb 00000080: ff 20 22 61 64 6d 69 6e 22 2c 20 e1 e0 e7 fb 20 "admin", 00000090: e4 e0 ed ed fb f5 20 22 61 64 6d 69 6e 22 2c 20 "admin", 000000a0: 53 53 4c 20 e2 fb ea eb 2e 00 46 73 72 63 5c 62 SSL . Fsrc\b 000000b0: 61 63 6b 65 6e 64 5c 6c 69 62 70 71 5c 61 75 74 ackend\libpq\aut 000000c0: 68 2e 63 00 4c 34 37 39 00 52 43 6c 69 65 6e 74 h.c L479 RClient 000000d0: 41 75 74 68 65 6e 74 69 63 61 74 69 6f 6e 00 00 Authentication NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE NSE: TCP 192.168.1.37:13678 > 192.168.1.46:5432 | CONNECT NSE: TCP 192.168.1.37:13678 > 192.168.1.46:5432 | 00000000: 00 00 00 23 00 03 00 00 75 73 65 72 00 61 64 6d # user adm 00000010: 69 6e 00 64 61 74 61 62 61 73 65 00 61 64 6d 69 in database admi 00000020: 6e 00 00 n NSE: TCP 192.168.1.37:13678 > 192.168.1.46:5432 | SEND NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 df 53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280 00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con 00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f , 00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe 00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea 00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0 00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37" 00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb 00000080: ff 20 22 61 64 6d 69 6e 22 2c 20 e1 e0 e7 fb 20 "admin", 00000090: e4 e0 ed ed fb f5 20 22 61 64 6d 69 6e 22 2c 20 "admin", 000000a0: 53 53 4c 20 e2 fb ea eb 2e 00 46 73 72 63 5c 62 SSL . Fsrc\b 000000b0: 61 63 6b 65 6e 64 5c 6c 69 62 70 71 5c 61 75 74 ackend\libpq\aut 000000c0: 68 2e 63 00 4c 34 37 39 00 52 43 6c 69 65 6e 74 h.c L479 RClient 000000d0: 41 75 74 68 65 6e 74 69 63 61 74 69 6f 6e 00 00 Authentication NSE: pgsql-brute: sendStartup returned: в pg_hba.conf нет записи, разрешающей подключение для репликации с компьютера "192.168.1.37" для пользователя "admin", базы данных "admin", SSL выкл. NSE: Trying Test/1 ... NSE: TCP 192.168.1.37:13679 > 192.168.1.46:5432 | CONNECT NSE: TCP 192.168.1.37:13679 > 192.168.1.46:5432 | 00000000: 00 00 00 08 04 d2 16 2f / NSE: TCP 192.168.1.37:13679 > 192.168.1.46:5432 | SEND NSE: TCP unknown protocol:0 < unknown protocol:0 | N NSE: TCP unknown protocol:0 > unknown protocol:0 | 00000000: 00 00 00 21 00 03 00 00 75 73 65 72 00 54 65 73 ! user Tes 00000010: 74 00 64 61 74 61 62 61 73 65 00 54 65 73 74 00 t database Test 00000020: 00 NSOCK INFO [2.5150s] nsi_new2(): nsi_new (IOD #1) NSOCK INFO [2.7650s] nsock_connect_udp(): UDP connection requested to 192.168.1.1:53 (IOD #1) EID 8 NSOCK INFO [2.7650s] nsock_read(): Read request from IOD #1 [192.168.1.1:53] (timeout: -1ms) EID 18 NSOCK INFO [2.7650s] nsi_new2(): nsi_new (IOD #2) NSOCK INFO [2.7650s] nsock_connect_udp(): UDP connection requested to 192.168.1.1:53 (IOD #2) EID 24 NSOCK INFO [2.7650s] nsock_read(): Read request from IOD #2 [192.168.1.1:53] (timeout: -1ms) EID 34 NSOCK INFO [2.7650s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 8 [192.168.1.1:53] NSOCK INFO [2.7650s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 43 [192.168.1.1:53] NSOCK INFO [2.7650s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 24 [192.168.1.1:53] NSOCK INFO [2.7680s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 18 [192.168.1.1:53] (102 bytes) NSOCK INFO [2.7680s] nsock_read(): Read request from IOD #1 [192.168.1.1:53] (timeout: -1ms) EID 50 NSOCK INFO [2.7680s] nsi_delete(): nsi_delete (IOD #1) NSOCK INFO [2.7680s] msevent_cancel(): msevent_cancel on event #50 (type READ) NSOCK INFO [2.7680s] nsi_delete(): nsi_delete (IOD #2) NSOCK INFO [2.7680s] msevent_cancel(): msevent_cancel on event #34 (type READ) NSOCK INFO [2.7680s] nsi_new2(): nsi_new (IOD #1) NSOCK INFO [2.7700s] nsock_connect_tcp(): TCP connection requested to 192.168.1.46:5432 (IOD #1) EID 8 NSOCK INFO [2.7700s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 8 [192.168.1.46:5432] NSOCK INFO [2.7710s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 19 [192.168.1.46:5432] NSOCK INFO [2.7710s] nsock_readbytes(): Read request for 2 bytes from IOD #1 [192.168.1.46:5432] EID 26 NSOCK INFO [2.8160s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 26 [(null):-1] (238 bytes) NSOCK INFO [2.8160s] nsi_delete(): nsi_delete (IOD #1) NSOCK INFO [2.8160s] nsi_new2(): nsi_new (IOD #2) NSOCK INFO [2.8160s] nsock_connect_tcp(): TCP connection requested to 192.168.1.46:5432 (IOD #2) EID 32 NSOCK INFO [2.8170s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 32 [192.168.1.46:5432] NSOCK INFO [2.8170s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 43 [192.168.1.46:5432] NSOCK INFO [2.8170s] nsock_readbytes(): Read request for 1 bytes from IOD #2 [192.168.1.46:5432] EID 50 NSOCK INFO [2.8300s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 50 [(null):-1] (1 bytes): N NSOCK INFO [2.8300s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 59 [(null):-1] NSOCK INFO [2.8310s] nsock_readbytes(): Read request for 2 bytes from IOD #2 [(null):-1] EID 66 NSOCK INFO [2.8320s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 66 [(null):-1] (224 bytes) NSOCK INFO [2.8320s] nsi_delete(): nsi_delete (IOD #2) NSOCK INFO [2.8320s] nsi_new2(): nsi_new (IOD #3) NSOCK INFO [2.8320s] nsock_connect_tcp(): TCP connection requested to 192.168.1.46:5432 (IOD #3) EID 72 NSOCK INFO [2.8320s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 72 [192.168.1.46:5432] NSOCK INFO [2.8420s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 83 [192.168.1.46:5432] NSOCK INFO [2.8420s] nsock_readbytes(): Read request for 2 bytes from IOD #3 [192.168.1.46:5432] EID 90 NSOCK INFO [2.8460s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 90 [(null):-1] (224 bytes) NSOCK INFO [2.8460s] nsi_new2(): nsi_new (IOD #4) NSOCK INFO [2.8460s] nsock_connect_tcp(): TCP connection requested to 192.168.1.46:5432 (IOD #4) EID 96 NSOCK INFO [2.8460s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 96 [192.168.1.46:5432] NSOCK INFO [2.8560s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 107 [192.168.1.46:5432] NSOCK INFO [2.8560s] nsock_readbytes(): Read request for 1 bytes from IOD #4 [192.168.1.46:5432] EID 114 NSOCK INFO [2.8600s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 114 [(null):-1] (1 bytes): N NSOCK INFO [2.8600s] nsocNSE: TCP unknown protocol:0 > unknown protocol:0 | SEND NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 dd 53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280 00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con 00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f , 00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe 00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea 00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0 00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37" 00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb 00000080: ff 20 22 54 65 73 74 22 2c 20 e1 e0 e7 fb 20 e4 "Test", 00000090: e0 ed ed fb f5 20 22 54 65 73 74 22 2c 20 53 53 "Test", SS 000000a0: 4c 20 e2 fb ea eb 2e 00 46 73 72 63 5c 62 61 63 L . Fsrc\bac 000000b0: 6b 65 6e 64 5c 6c 69 62 70 71 5c 61 75 74 68 2e kend\libpq\auth. 000000c0: 63 00 4c 34 37 39 00 52 43 6c 69 65 6e 74 41 75 c L479 RClientAu 000000d0: 74 68 65 6e 74 69 63 61 74 69 6f 6e 00 00 thentication NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE NSE: TCP 192.168.1.37:13680 > 192.168.1.46:5432 | CONNECT NSE: TCP 192.168.1.37:13680 > 192.168.1.46:5432 | 00000000: 00 00 00 21 00 03 00 00 75 73 65 72 00 54 65 73 ! user Tes 00000010: 74 00 64 61 74 61 62 61 73 65 00 54 65 73 74 00 t database Test 00000020: 00 NSE: TCP 192.168.1.37:13680 > 192.168.1.46:5432 | SEND NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 dd 53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280 00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con 00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f , 00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe 00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea 00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0 00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37" 00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb 00000080: ff 20 22 54 65 73 74 22 2c 20 e1 e0 e7 fb 20 e4 "Test", 00000090: e0 ed ed fb f5 20 22 54 65 73 74 22 2c 20 53 53 "Test", SS 000000a0: 4c 20 e2 fb ea eb 2e 00 46 73 72 63 5c 62 61 63 L . Fsrc\bac 000000b0: 6b 65 6e 64 5c 6c 69 62 70 71 5c 61 75 74 68 2e kend\libpq\auth. 000000c0: 63 00 4c 34 37 39 00 52 43 6c 69 65 6e 74 41 75 c L479 RClientAu 000000d0: 74 68 65 6e 74 69 63 61 74 69 6f 6e 00 00 thentication NSE: pgsql-brute: sendStartup returned: в pg_hba.conf нет записи, разрешающей подключение для репликации с компьютера "192.168.1.37" для пользователя "Test", базы данных "Test", SSL выкл. NSE: Trying netcheckadmin/1 ... NSE: TCP 192.168.1.37:13681 > 192.168.1.46:5432 | CONNECT NSE: TCP 192.168.1.37:13681 > 192.168.1.46:5432 | 00000000: 00 00 00 08 04 d2 16 2f / NSE: TCP 192.168.1.37:13681 > 192.168.1.46:5432 | SEND NSE: TCP unknown protocol:0 < unknown protocol:0 | N NSE: TCP unknown protocol:0 > unknown protocol:0 | 00000000: 00 00 00 33 00 03 00 00 75 73 65 72 00 6e 65 74 3 user net 00000010: 63 68 65 63 6b 61 64 6d 69 6e 00 64 61 74 61 62 checkadmin datab 00000020: 61 73 65 00 6e 65 74 63 68 65 63 6b 61 64 6d 69 ase netcheckadmi 00000030: 6e 00 00 n NSE: TCP unknown protocol:0 > unknown protocol:0 | SEND NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 ef 53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280 00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con 00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f , 00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe 00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea 00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0 00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37" 00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb 00000080: ff 20 22 6e 65 74 63 68 65 63 6b 61 64 6d 69 6e "netcheckadmin 00000090: 22 2c 20 e1 e0 e7 fb 20 e4 e0 ed ed fb f5 20 22 ", " 000000a0: 6e 65 74 63 68 65 63 6b 61 64 6d 69 6e 22 2c 20 netcheckadmin", 000000b0: 53 53 4c 20 e2 fb ea eb 2e 00 46 73 72 63 5c 62 SSL . Fsrc\b 000000c0: 61 63 6b 65 6e 64 5c 6c 69 62 70 71 5c 61 75 74 ackend\libpq\aut 000000d0: 68 2e 63 00 4c 34 37 39 00 52 43 6c 69 65 6e 74 h.c L479 RClient 000000e0: 41 75 74 68 65 6e 74 69 63 61 74 69 6f 6e 00 00 Authentication NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE NSE: TCP 192.168.1.37:13682 > 192.168.1.46:5432 | CONNECT NSE: TCP 192.168.1.37:13682 > 192.168.1.46:5432 | 00000000: 00 00 00 33 00 03 00 00 75 73 65 72 00 6e 65 74 3 user net 00000010: 63 68 65 63 6b 61 64 6d 69 6e 00 64 61 74 61 62 checkadmin datab 00000020: 61 73 65 00 6e 65 74 63 68 65 63 6b 61 64 6d 69 ase netcheckadmi 00000030: 6e 00 00 n NSE: TCP 192.168.1.37:13682 > 192.168.1.46:5432 | SEND NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 ef 53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280 00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con 00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f , 00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe 00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea 00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0 00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37" 00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb 00000080: ff 20 22 6e 65 74 63 68 65 63 6b 61 64 6d 69 6e "netcheckadmin 00000090: 22 2c 20 e1 e0 e7 fb 20 e4 e0 ed ed fb f5 20 22 ", " 000000a0: 6e 65 74 63 68 65 63 6b 61 64 6d 69 6e 22 2c 20 netcheckadmin", 000000b0: 53 53 4c 20 e2 fb ea eb 2e 00 46 73 72 63 5c 62 SSL . Fsrc\b 000000c0: 61 63 6b 65 6e 64 5c 6c 69 62 70 71 5c 61 75 74 ackend\libpq\aut 000000d0: 68 2e 63 00 4c 34 37 39 00 52 43 6c 69 65 6e 74 h.c L479 RClient 000000e0: 41 75 74 68 65 6e 74 69 63 61 74 69 6f 6e 00 00 Authentication NSE: pgsql-brute: sendStartup returned: в pg_hba.conf нет записи, разрешающей подключение для репликации с компьютера "192.168.1.37" для пользователя "netcheckadmin", базы данных "netcheckadmin", SSL выкл. NSE: Trying postgres/1 ... NSE: TCP 192.168.1.37:13683 > 192.168.1.46:5432 | CONNECT NSE: TCP 192.168.1.37:13683 > 192.168.1.46:5432 | 00000000: 00 00 00 08 04 d2 16 2f / NSE: TCP 192.168.1.37:13683 > 192.168.1.46:5432 | SEND NSE: TCP unknown protocol:0 < unknown protocol:0 | N NSE: TCP unknown protocol:0 > unknown protocol:0 | 00000000: 00 00 00 29 00 03 00 00 75 73 65 72 00 70 6f 73 ) user pos 00000010: 74 67 72 65 73 00 64 61 74 61 62 61 73 65 00 70 tgres database p 00000020: 6f 73 74 67 72 65 73 00 00 ostgres NSE: TCP unknown protocol:0 > unknown protocol:0 | SEND NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 e5 53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280 00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con 00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f , 00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe 00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea 00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0 00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37" 00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb 00000080: ff 20 22 70 6f 73 74 67 72 65 73 22 2c 20 e1 e0 "postgres", 00000090: e7 fb 20 e4 e0 ed ed fb f5 20 22 70 6f 73 74 67 "postg 000000a0: 72 65 73 22 2c 20 53 53 4c 20 e2 fb ea eb 2e 00 res", SSL . 000000b0: 46 73 72 63 5c 62 61 63 6b 65 6e 64 5c 6c 69 62 Fsrc\backend\lib 000000c0: 70 71 5c 61 75 74 68 2e 63 00 4c 34 37 39 00 52 pq\auth.c L479 R 000000d0: 43 6c 69 65 6e 74 41 75 74 68 65 6e 74 69 63 61 ClientAuthentica 000000e0: 74 69 6f 6e 00 00 tion NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE NSE: TCP 192.168.1.37:13684 > 192.168.1.46:5432 | CONNECT NSE: TCP 192.168.1.37:13684 > 192.168.1.46:5432 | 00000000: 00 00 00 29 00 03 00 00 75 73 65 72 00 70 6f 73 ) user pos 00000010: 74 67 72 65 73 00 64 61 74 61 62 61 73 65 00 70 tgres database p 00000020: 6f 73 74 67 72 65 73 00 00 ostgres NSE: TCP 192.168.1.37:13684 > 192.168.1.46:5432 | SEND NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 e5 53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280 00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con 00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f , 00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe 00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea 00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0 00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37" 00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb 00000080: ff 20 22 70 6f 73 74 67 72 65 73 22 2c 20 e1 e0 "postgres", 00000090: e7 fb 20 e4 e0 ed ed fb f5 20 22 70 6f 73 74 67 "postg 000000a0: 72 65 73 22 2c 20 53 53 4c 20 e2 fb ea eb 2e 00 res", SSL . 000000b0: 46 73 72 63 5c 62 61 63 6b 65 6e 64 5c 6c 69 62 Fsrc\backend\lib 000000c0: 70 71 5c 61 75 74 68 2e 63 00 4c 34 37 39 00 52 pq\auth.c L479 R 000000d0: 43 6c 69 65 6e 74 41 75 74 68 65 6e 74 69 63 61 ClientAuthentica 000000e0: 74 69 6f 6e 00 00 tion NSE: pgsql-brute: sendStartup returned: в pg_hba.conf нет записи, разрешающей подключение для репликации с компьютера "192.168.1.37" для пользователя "postgres", базы данных "postgres", SSL выкл. NSE: Trying SYSTEM/1 ... k_trace_handler_callback(): Callback: WRITE SUCCESS for EID 123 [(null):-1] NSOCK INFO [2.8600s] nsock_readbytes(): Read request for 2 bytes from IOD #4 [(null):-1] EID 130 NSOCK INFO [2.8610s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 130 [(null):-1] (222 bytes) NSOCK INFO [2.8620s] nsi_delete(): nsi_delete (IOD #4) NSOCK INFO [2.8620s] nsi_new2(): nsi_new (IOD #5) NSOCK INFO [2.8620s] nsock_connect_tcp(): TCP connection requested to 192.168.1.46:5432 (IOD #5) EID 136 NSOCK INFO [2.8620s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 136 [192.168.1.46:5432] NSOCK INFO [2.8630s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 147 [192.168.1.46:5432] NSOCK INFO [2.8630s] nsock_readbytes(): Read request for 2 bytes from IOD #5 [192.168.1.46:5432] EID 154 NSOCK INFO [2.8790s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 154 [(null):-1] (222 bytes) NSOCK INFO [2.8790s] nsi_new2(): nsi_new (IOD #6) NSOCK INFO [2.8790s] nsock_connect_tcp(): TCP connection requested to 192.168.1.46:5432 (IOD #6) EID 160 NSOCK INFO [2.8800s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 160 [192.168.1.46:5432] NSOCK INFO [2.8900s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 171 [192.168.1.46:5432] NSOCK INFO [2.8900s] nsock_readbytes(): Read request for 1 bytes from IOD #6 [192.168.1.46:5432] EID 178 NSOCK INFO [2.8900s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 178 [(null):-1] (1 bytes): N NSOCK INFO [2.8900s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 187 [(null):-1] NSOCK INFO [2.8900s] nsock_readbytes(): Read request for 2 bytes from IOD #6 [(null):-1] EID 194 NSOCK INFO [2.8920s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 194 [(null):-1] (240 bytes) NSOCK INFO [2.8920s] nsi_delete(): nsi_delete (IOD #6) NSOCK INFO [2.8920s] nsi_new2(): nsi_new (IOD #7) NSOCK INFO [2.8920s] nsock_connect_tcp(): TCP connection requested to 192.168.1.46:5432 (IOD #7) EID 200 NSOCK INFO [2.8920s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 200 [192.168.1.46:5432] NSOCK INFO [2.9020s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 211 [192.168.1.46:5432] NSOCK INFO [2.9020s] nsock_readbytes(): Read request for 2 bytes from IOD #7 [192.168.1.46:5432] EID 218 NSOCK INFO [2.9070s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 218 [(null):-1] (240 bytes) NSOCK INFO [2.9080s] nsi_new2(): nsi_new (IOD #8) NSOCK INFO [2.9080s] nsock_connect_tcp(): TCP connection requested to 192.168.1.46:5432 (IOD #8) EID 224 NSOCK INFO [2.9080s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 224 [192.168.1.46:5432] NSOCK INFO [2.9080s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 235 [192.168.1.46:5432] NSOCK INFO [2.9080s] nsock_readbytes(): Read request for 1 bytes from IOD #8 [192.168.1.46:5432] EID 242 NSOCK INFO [2.9220s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 242 [(null):-1] (1 bytes): N NSOCK INFO [2.9220s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 251 [(null):-1] NSOCK INFO [2.9220s] nsock_readbytes(): Read request for 2 bytes from IOD #8 [(null):-1] EID 258 NSOCK INFO [2.9230s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 258 [(null):-1] (230 bytes) NSOCK INFO [2.9240s] nsi_delete(): nsi_delete (IOD #8) NSOCK INFO [2.9240s] nsi_new2(): nsi_new (IOD #9) NSOCK INFO [2.9240s] nsock_connect_tcp(): TCP connection requested to 192.168.1.46:5432 (IOD #9) EID 264 NSOCK INFO [2.9240s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 264 [192.168.1.46:5432] NSOCK INFO [2.9240s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 275 [192.168.1.46:5432] NSOCK INFO [2.9240s] nsock_readbytes(): Read request for 2 bytes from IOD #9 [192.168.1.46:5432] EID 282 NSOCK INFO [2.9390s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 282 [(null):-1] (230 bytes) NSOCK INFO [2.9390s] nsi_new2(): nsi_new (IOD #10) NSOCK INFO [2NSE: TCP 192.168.1.37:13685 > 192.168.1.46:5432 | CONNECT NSE: TCP 192.168.1.37:13685 > 192.168.1.46:5432 | 00000000: 00 00 00 08 04 d2 16 2f / NSE: TCP 192.168.1.37:13685 > 192.168.1.46:5432 | SEND NSE: TCP unknown protocol:0 < unknown protocol:0 | N NSE: TCP unknown protocol:0 > unknown protocol:0 | 00000000: 00 00 00 25 00 03 00 00 75 73 65 72 00 53 59 53 % user SYS 00000010: 54 45 4d 00 64 61 74 61 62 61 73 65 00 53 59 53 TEM database SYS 00000020: 54 45 4d 00 00 TEM NSE: TCP unknown protocol:0 > unknown protocol:0 | SEND NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 e1 53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280 00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con 00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f , 00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe 00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea 00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0 00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37" 00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb 00000080: ff 20 22 53 59 53 54 45 4d 22 2c 20 e1 e0 e7 fb "SYSTEM", 00000090: 20 e4 e0 ed ed fb f5 20 22 53 59 53 54 45 4d 22 "SYSTEM" 000000a0: 2c 20 53 53 4c 20 e2 fb ea eb 2e 00 46 73 72 63 , SSL . Fsrc 000000b0: 5c 62 61 63 6b 65 6e 64 5c 6c 69 62 70 71 5c 61 \backend\libpq\a 000000c0: 75 74 68 2e 63 00 4c 34 37 39 00 52 43 6c 69 65 uth.c L479 RClie 000000d0: 6e 74 41 75 74 68 65 6e 74 69 63 61 74 69 6f 6e ntAuthentication 000000e0: 00 00 NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE NSE: TCP 192.168.1.37:13686 > 192.168.1.46:5432 | CONNECT NSE: TCP 192.168.1.37:13686 > 192.168.1.46:5432 | 00000000: 00 00 00 25 00 03 00 00 75 73 65 72 00 53 59 53 % user SYS 00000010: 54 45 4d 00 64 61 74 61 62 61 73 65 00 53 59 53 TEM database SYS 00000020: 54 45 4d 00 00 TEM NSE: TCP 192.168.1.37:13686 > 192.168.1.46:5432 | SEND NSE: TCP unknown protocol:0 < unknown protocol:0 | 00000000: 45 00 00 00 e1 53 c2 c0 c6 cd ce 00 43 32 38 30 E S C280 00000010: 30 30 00 4d e2 20 70 67 5f 68 62 61 2e 63 6f 6e 00 M pg_hba.con 00000020: 66 20 ed e5 f2 20 e7 e0 ef e8 f1 e8 2c 20 f0 e0 f , 00000030: e7 f0 e5 f8 e0 fe f9 e5 e9 20 ef ee e4 ea eb fe 00000040: f7 e5 ed e8 e5 20 e4 eb ff 20 f0 e5 ef eb e8 ea 00000050: e0 f6 e8 e8 20 f1 20 ea ee ec ef fc fe f2 e5 f0 00000060: e0 20 22 31 39 32 2e 31 36 38 2e 31 2e 33 37 22 "192.168.1.37" 00000070: 20 e4 eb ff 20 ef ee eb fc e7 ee e2 e0 f2 e5 eb 00000080: ff 20 22 53 59 53 54 45 4d 22 2c 20 e1 e0 e7 fb "SYSTEM", 00000090: 20 e4 e0 ed ed fb f5 20 22 53 59 53 54 45 4d 22 "SYSTEM" 000000a0: 2c 20 53 53 4c 20 e2 fb ea eb 2e 00 46 73 72 63 , SSL . Fsrc 000000b0: 5c 62 61 63 6b 65 6e 64 5c 6c 69 62 70 71 5c 61 \backend\libpq\a 000000c0: 75 74 68 2e 63 00 4c 34 37 39 00 52 43 6c 69 65 uth.c L479 RClie 000000d0: 6e 74 41 75 74 68 65 6e 74 69 63 61 74 69 6f 6e ntAuthentication 000000e0: 00 00 NSE: pgsql-brute: sendStartup returned: в pg_hba.conf нет записи, разрешающей подключение для репликации с компьютера "192.168.1.37" для пользователя "SYSTEM", базы данных "SYSTEM", SSL выкл. NSE: Finished 'pgsql-brute' (thread: 02C37678) against 192.168.1.46:5432. NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE NSE: TCP unknown protocol:0 > unknown protocol:0 | CLOSE Completed NSE at 09:28, 0.20s elapsed Nmap scan report for 192.168.1.46 Fetchfile found C:\Program Files (x86)\Nmap/nmap-mac-prefixes .9390s] nsock_connect_tcp(): TCP connection requested to 192.168.1.46:5432(IOD #10) EID 288 NSOCK INFO [2.9400s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 288 [192.168.1.46:5432] NSOCK INFO [2.9500s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 299 [192.168.1.46:5432] NSOCK INFO [2.9500s] nsock_readbytes(): Read request for 1 bytes from IOD #10 [192.168.1.46:5432] EID 306 NSOCK INFO [2.9510s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 306 [(null):-1] (1 bytes): N NSOCK INFO [2.9510s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 315 [(null):-1] NSOCK INFO [2.9510s] nsock_readbytes(): Read request for 2 bytes from IOD #10 [(null):-1] EID 322 NSOCK INFO [2.9520s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 322 [(null):-1] (226 bytes) NSOCK INFO [2.9530s] nsi_delete(): nsi_delete (IOD #10) NSOCK INFO [2.9530s] nsi_new2(): nsi_new (IOD #11) NSOCK INFO [2.9530s] nsock_connect_tcp(): TCP connection requested to 192.168.1.46:5432 (IOD #11) EID 328 NSOCK INFO [2.9530s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 328 [192.168.1.46:5432] NSOCK INFO [2.9630s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 339 [192.168.1.46:5432] NSOCK INFO [2.9630s] nsock_readbytes(): Read request for 2 bytes from IOD #11 [192.168.1.46:5432] EID 346 NSOCK INFO [2.9640s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 346 [(null):-1] (226 bytes) NSOCK INFO [2.9640s] nsi_delete(): nsi_delete (IOD #7) NSOCK INFO [2.9640s] nsi_delete(): nsi_delete (IOD #5) NSOCK INFO [2.9640s] nsi_delete(): nsi_delete (IOD #9) NSOCK INFO [2.9640s] nsi_delete(): nsi_delete (IOD #3) NSOCK INFO [2.9640s] nsi_delete(): nsi_delete (IOD #11) MAC prefix 0001C8 is duplicated in C:\Program Files (x86)\Nmap/nmap-mac-prefixes; ignoring duplicates. MAC prefix 080030 is duplicated in C:\Program Files (x86)\Nmap/nmap-mac-prefixes; ignoring duplicates. MAC prefix 080030 is duplicated in C:\Program Files (x86)\Nmap/nmap-mac-prefixes; ignoring duplicates. Host is up, received arp-response (0.00088s latency). Scanned at 2013-08-29 09:28:25 Московское время (зима) for 2s PORT STATE SERVICE REASON 5432/tcp open postgresql syn-ack MAC Address: 08:00:27:75:8D:0F (Cadmus Computer Systems) Final times for host: srtt: 875 rttvar: 4000 to: 100000 NSE: Script Post-scanning. NSE: Starting runlevel 1 (of 1) scan. Read from C:\Program Files (x86)\Nmap: nmap-mac-prefixes nmap-payloads nmap-services. Nmap done: 1 IP address (1 host up) scanned in 2.97 seconds Raw packets sent: 2 (72B) | Rcvd: 2 (72B) I really hope that you will help me. _______________________________________________ Sent through the dev mailing list http://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- pgsql-brute script doesn't work Alexander Fedintsev (Sep 01)
- Re: pgsql-brute script doesn't work Daniel Miller (Sep 02)