LinuxSir.cn,穿越时空的Linuxsir!

 找回密码
 注册
搜索
热搜: shell linux mysql
12
返回列表 发新帖
楼主: aran

Deban 官方什么时候换成unix主机了??

[复制链接]
发表于 2007-4-9 06:33:38 | 显示全部楼层
Post by blkf
nmap -O cdimage.debian.org

Starting nmap 3.81 ( http://www.insecure.org/nmap/ ) at 2007-04-08 21:15 CST
Interesting ports on tutankhamon.acc.umu.se (130.239.18.137):
(The 1656 ports scanned but not shown below are in state: closed)
PORT    STATE    SERVICE
21/tcp  open     ftp
22/tcp  filtered ssh
80/tcp  open     http
111/tcp open     rpcbind
113/tcp open     auth
445/tcp filtered microsoft-ds
873/tcp open     rsync
Device type: general purpose
Running: Linux 2.4.X|2.5.X
OS details: Linux 2.4.0 - 2.5.20, Linux 2.4.20 (Itanium)

Nmap finished: 1 IP address (1 host up) scanned in 463.547 seconds

你的版本太老了--都nmap 4.20了--
nmap -sV -v -O cdimage.debian.org

Starting Nmap 4.20 ( http://insecure.org ) at 2007-04-09 06:27 CST
Initiating Parallel DNS resolution of 1 host. at 06:27
Completed Parallel DNS resolution of 1 host. at 06:27, 0.63s elapsed
Initiating SYN Stealth Scan at 06:27
Scanning tutankhamon.acc.umu.se (130.239.18.137) [1697 ports]
Discovered open port 21/tcp on 130.239.18.137
Discovered open port 113/tcp on 130.239.18.137
Discovered open port 80/tcp on 130.239.18.137
Discovered open port 111/tcp on 130.239.18.137
Discovered open port 873/tcp on 130.239.18.137
Initiating RPCGrind Scan against tutankham at 06:29
Completed RPCGrind Scan against tutankham at 06:29, 0.80s elapsed (1 port)
Host tutankhamon.acc.umu.se (130.239.18.137) appears to be up ... good.
Interesting ports on tutankhamon.acc.umu.se (130.239.18.137):
Not shown: 1682 closed ports
PORT     STATE    SERVICE        VERSION
21/tcp   open     ftp            vsftpd 2.0.5
22/tcp   filtered ssh
80/tcp   open     http           Apache httpd 2.2.4 ((Unix))
111/tcp  open     rpcbind         2 (rpc #100000)
113/tcp  open     ident          OpenBSD identd
135/tcp  filtered msrpc
136/tcp  filtered profile
137/tcp  filtered netbios-ns
138/tcp  filtered netbios-dgm
139/tcp  filtered netbios-ssn
445/tcp  filtered microsoft-ds
593/tcp  filtered http-rpc-epmap
707/tcp  filtered unknown
873/tcp  open     rsync           (protocol version 29)
4444/tcp filtered krb524
Device type: general purpose|WAP|VoIP gateway|security-misc|storage-misc|broadband router
Running (JUST GUESSING) : Linux 2.4.X|2.6.X (93%), Siemens linux (90%), Occam embedded (90%), Aladdin Linux 2.4.X (88%), Linksys Linux 2.4.X (88%), Asus Linux 2.4.X (88%), Maxtor Linux 2.4.X (88%), Netgear embedded (88%)
Aggressive OS guesses: Linux 2.4.31 w/grsec (x86) (93%), Linux 2.4.33 (92%), Linux 2.4.32 (x86) (91%), Linux 2.6.15-27-686 (Ubuntu Dapper, X86) (91%), Siemens Gigaset SE515dsl wireless broadband router (90%), Linux 2.6.9-42.(x86, SMP) (90%), Occam ONT ON2342 Voice/Video over IP box (90%), Linux 2.6.15.4 (89%), Linux 2.6.18-em64t (x86-64) (89%), Aladdin eSafe security gateway (runs Linux 2.4.21) (88%)
No exact OS matches for host (test conditions non-ideal).
Uptime: 12.492 days (since Tue Mar 27 18:41:59 2007)
Network Distance: 18 hops
TCP Sequence Prediction: Difficulty=0 (Trivial joke)
IPID Sequence Generation: All zeros
Service Info: OSs: Unix, OpenBSD

OS and Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .
Nmap finished: 1 IP address (1 host up) scanned in 171.390 seconds
               Raw packets sent: 2128 (96.660KB) | Rcvd: 1763 (83.678KB)
回复 支持 反对

使用道具 举报

发表于 2007-4-9 08:42:54 | 显示全部楼层
nmap有时扫出来的不一定准, nmap本身的原因,还有系统管理员也可以伪装的。
回复 支持 反对

使用道具 举报

发表于 2007-4-9 09:35:33 | 显示全部楼层
  1. ]#HEAD cdimage.debian.org
  2. 200 OK
  3. Cache-Control: max-age=86400
  4. Connection: close
  5. Date: Mon, 09 Apr 2007 01:29:14 GMT
  6. Accept-Ranges: bytes
  7. ETag: "3fbc006-2598-f76bdfc0"
  8. Server: Apache/2.0.54 (Debian GNU/Linux)
  9. Vary: negotiate,accept-language
  10. Content-Language: en-gb
  11. Content-Length: 9624
  12. Content-Location: index.en-gb.html
  13. Content-Type: text/html
  14. Expires: Tue, 10 Apr 2007 01:29:14 GMT
  15. Last-Modified: Sun, 08 Apr 2007 18:19:51 GMT
  16. Client-Date: Mon, 09 Apr 2007 01:29:54 GMT
  17. Client-Peer: 194.109.137.218:80
  18. Client-Response-Num: 1
  19. TCN: choice

  20. #nmap -vv -O cdimage.debian.org

  21. Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2007-04-09 09:30 CST
  22. DNS resolution of 1 IPs took 0.71s.
  23. Initiating SYN Stealth Scan against [b]tutankhamon.acc.umu.se[/b] (130.239.18.137) [1680 ports] at 09:30
  24. Discovered open port 21/tcp on 130.239.18.137
  25. Discovered open port 80/tcp on 130.239.18.137
  26. Discovered open port 113/tcp on 130.239.18.137
  27. SYN Stealth Scan Timing: About 42.33% done; ETC: 09:31 (0:00:41 remaining)
  28. Discovered open port 111/tcp on 130.239.18.137
  29. Discovered open port 873/tcp on 130.239.18.137
  30. The SYN Stealth Scan took 99.52s to scan 1680 total ports.
  31. For OSScan assuming port 21 is open, 1 is closed, and neither are firewalled
  32. For OSScan assuming port 21 is open, 1 is closed, and neither are firewalled
  33. For OSScan assuming port 21 is open, 1 is closed, and neither are firewalled
  34. Host tutankhamon.acc.umu.se (130.239.18.137) appears to be up ... good.
  35. Interesting ports on tutankhamon.acc.umu.se (130.239.18.137):
  36. Not shown: 1665 closed ports
  37. PORT     STATE    SERVICE
  38. 21/tcp   open     ftp
  39. 22/tcp   filtered ssh
  40. 80/tcp   open     http
  41. 111/tcp  open     rpcbind
  42. 113/tcp  open     auth
  43. 135/tcp  filtered msrpc
  44. 136/tcp  filtered profile
  45. 137/tcp  filtered netbios-ns
  46. 138/tcp  filtered netbios-dgm
  47. 139/tcp  filtered netbios-ssn
  48. 445/tcp  filtered microsoft-ds
  49. 593/tcp  filtered http-rpc-epmap
  50. 707/tcp  filtered unknown
  51. 873/tcp  open     rsync
  52. 4444/tcp filtered krb524
  53. No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).
  54. TCP/IP fingerprint:
  55. SInfo(V=4.11%P=i686-redhat-linux-gnu%D=4/9%Tm=4619979A%O=21%C=1)
  56. TSeq(Class=TR%IPID=I%TS=0)
  57. T1(Resp=Y%DF=N%W=4000%ACK=S++%Flags=AS%Ops=MNWNNT)
  58. T2(Resp=N)
  59. T3(Resp=N)
  60. T4(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=)
  61. T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=)
  62. T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=)
  63. T7(Resp=N)
  64. PU(Resp=Y%DF=N%TOS=0%IPLEN=164%RIPTL=148%RID=E%RIPCK=E%UCK=F%ULEN=134%DAT=E)


  65. TCP Sequence Prediction: Class=truly random
  66.                          Difficulty=9999999 (Good luck!)
  67. IPID Sequence Generation: Incremental

  68. Nmap finished: 1 IP address (1 host up) scanned in 124.415 seconds
  69.                Raw packets sent: 1956 (87.728KB) | Rcvd: 1743 (81.458KB)
复制代码



tutankhamon.acc.umu.se

图坦卡门 ? :eek: :eek:
回复 支持 反对

使用道具 举报

发表于 2007-4-9 11:14:05 | 显示全部楼层
管他服务器用的什么操作系统。微软自己的服务器还用其它的操作系统。哈哈
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 注册

本版积分规则

快速回复 返回顶部 返回列表