16 June 2009

Nmap scan of Red Flag Linux (live cd)

Starting Nmap 4.85BETA9 ( http://nmap.org ) at 2009-06-14 17:34 UTC
NSE: Loaded 28 scripts for scanning.
Initiating ARP Ping Scan at 17:34
Scanning 192.168.1.151 [1 port]
Completed ARP Ping Scan at 17:34, 0.01s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 17:34
Completed Parallel DNS resolution of 1 host. at 17:34, 0.04s elapsed
Initiating SYN Stealth Scan at 17:34
Scanning 192.168.1.151 [1000 ports]
Discovered open port 111/tcp on 192.168.1.151
Completed SYN Stealth Scan at 17:34, 1.91s elapsed (1000 total ports)
Initiating Service scan at 17:34
Scanning 1 service on 192.168.1.151
Completed Service scan at 17:35, 6.02s elapsed (1 service on 1 host)
Initiating OS detection (try #1) against 192.168.1.151
NSE: Script scanning 192.168.1.151.
NSE: Starting runlevel 1 scan
Initiating NSE at 17:35
Completed NSE at 17:35, 0.08s elapsed
NSE: Script Scanning completed.
Host 192.168.1.151 is up (0.0048s latency).
Interesting ports on 192.168.1.151:
Not shown: 999 closed ports
PORT STATE SERVICE VERSION
111/tcp open rpcbind
| rpcinfo:
| 100000 2,3,4 111/udp rpcbind
| 100024 1 51586/udp status
| 100000 2,3,4 111/tcp rpcbind
|_ 100024 1 52983/tcp status
MAC Address: 00:0C:29:35:59:37 (VMware)
Device type: general purpose
Running: Linux 2.6.X
OS details: Linux 2.6.9 - 2.6.27
Uptime guess: 0.016 days (since Sun Jun 14 17:12:20 2009)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=204 (Good luck!)
IP ID Sequence Generation: All zeros

Read data files from: /usr/share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.65 seconds
Raw packets sent: 1021 (45.684KB) | Rcvd: 1017 (41.408KB)
Post a Comment