Scan of a local network
nmap -O -sV 192.168.10.*
#...
#Nmap scan report for 192.168.10.100
#Host is up (0.074s latency).
#Nmap scan report for 192.168.10.102
#Host is up (0.0015s latency).
#Nmap scan report for 192.168.10.104
#Host is up (0.11s latency).
#...
Identify OS on remote host
sudo nmap -O -sV 192.168.10.20
#Starting Nmap 6.00 ( http://nmap.org ) at 2013-01-15 10:29 FET
#Nmap scan report for 192.168.10.20
#Host is up (0.00032s latency).
#Not shown: 980 closed ports
#PORT STATE SERVICE VERSION
#80/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
#89/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
#135/tcp open msrpc Microsoft Windows RPC
#139/tcp open netbios-ssn
#443/tcp open skype2 Skype
#445/tcp open netbios-ssn
#912/tcp open vmware-auth VMware Authentication Daemon 1.0 (Uses VNC, SOAP)
#1025/tcp open msrpc Microsoft Windows RPC
#1026/tcp open msrpc Microsoft Windows RPC
#1027/tcp open msrpc Microsoft Windows RPC
#1028/tcp open msrpc Microsoft Windows RPC
#1062/tcp open msrpc Microsoft Windows RPC
#1104/tcp open memcache memcached
#1192/tcp open msrpc Microsoft Windows RPC
#1248/tcp open msrpc Microsoft Windows RPC
#1433/tcp open ms-sql-s Microsoft SQL Server 2008 R2 10.50.2500; SP1
#2003/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
#3389/tcp open ms-wbt-server?
#8009/tcp open ajp13 Apache Jserv (Protocol v1.3)
#8181/tcp open http Apache Tomcat/Coyote JSP engine 1.1
#MAC Address: 1C:6F:65:8C:34:B3 (Giga-byte Technology Co.)
#Device type: general purpose
#Running: Microsoft Windows 7|2008
#OS CPE: cpe:/o:microsoft:windows_7 cpe:/o:microsoft:windows_server_2008::sp1
#OS details: Microsoft Windows 7 or Windows Server 2008 SP1
#Network Distance: 1 hop
#Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
#
#OS and Service detection performed. Please report any incorrect results at #http://nmap.org/submit/ .
#Nmap done: 1 IP address (1 host up) scanned in 101.33 seconds
The same technique can be also used for all over the WAN remote hosts. Scanning for OS version on a remote host can be quite handy to you as an administrator. On the other hand, this technique can also be abused by hackers. They can target any host with their exploitation attack based on quite accurate information of a running OS and its patch level. Let this be just a quick reminder for all of us to keep all our systems up to date.
http://how-to.linuxcareer.com/how-to-determine-os-of-the-remote-computer
No comments:
Post a Comment