Listing 2: nmap scan of a Solaris system
# nmap -O 10.1.194.98
Starting nmap V. 2.3BETA12 by Fyodor (fyodor@dhp.com, \
www.insecure.org/nmap/)
WARNING: OS didn't match until the 2 try
Interesting ports on <hostname_1> (10.1.194.98):
Port State Protocol Service
7 open tcp echo
9 open tcp discard
13 open tcp daytime
19 open tcp chargen
21 open tcp ftp
22 open tcp sshd
23 open tcp telnet
25 open tcp smtp
37 open tcp time
111 open tcp sunrpc
512 open tcp exec
513 open tcp login
514 open tcp shell
515 open tcp printer
540 open tcp uucp
6000 open tcp X11
6112 open tcp dtspc
7100 open tcp font-service
32771 open tcp sometimes-rpc5
32772 open tcp sometimes-rpc7
32773 open tcp sometimes-rpc9
32774 open tcp sometimes-rpc11
32775 open tcp sometimes-rpc13
32776 open tcp sometimes-rpc15
TCP Sequence Prediction: Class=random positive increments
Difficulty=15402 (Worthy challenge)
Remote OS guesses: Solaris 2.6 - 2.7, Solaris 7
Nmap run completed -- 1 IP address (1 host up) scanned in 14 seconds
|