Code:
krieger:~ # nmap -v -v -O -sS -P0 62.140.29.50
Starting nmap 3.81 ( http://www.insecure.org/nmap/ ) at 2005-09-07 19:28 CEST
Initiating SYN Stealth Scan against 62.140.29.50 [1663 ports] at 19:28
Discovered open port 139/tcp on 62.140.29.50
Discovered open port 135/tcp on 62.140.29.50
Discovered open port 4000/tcp on 62.140.29.50
Discovered open port 1026/tcp on 62.140.29.50
Discovered open port 7000/tcp on 62.140.29.50
The SYN Stealth Scan took 0.52s to scan 1663 total ports.
For OSScan assuming port 135 is open, 1 is closed, and neither are firewalled
For OSScan assuming port 135 is open, 1 is closed, and neither are firewalled
For OSScan assuming port 135 is open, 1 is closed, and neither are firewalled
Host 62.140.29.50 appears to be up ... good.
Interesting ports on 62.140.29.50:
(The 1658 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE
135/tcp open msrpc
139/tcp open netbios-ssn
1026/tcp open LSA-or-nterm
4000/tcp open remoteanything
7000/tcp open afs3-fileserver
No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).
TCP/IP fingerprint:
SInfo(V=3.81%P=i586-suse-linux%D=9/7%Tm=431F2361%O=135%C=1)
TSeq(Class=TR%IPID=I%TS=0)
T1(Resp=Y%DF=Y%W=FFFF%ACK=S++%Flags=AS%Ops=MNWNNT)
T2(Resp=Y%DF=N%W=0%ACK=S%Flags=AR%Ops=)
T3(Resp=Y%DF=Y%W=FFFF%ACK=S++%Flags=AS%Ops=MNWNNT)
T3(Resp=Y%DF=Y%W=FFFF%ACK=O%Flags=A%Ops=NNT)
T4(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=)
T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=)
T6(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=)
T7(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=)
PU(Resp=Y%DF=N%TOS=0%IPLEN=38%RIPTL=148%RID=E%RIPCK=E%UCK=E%ULEN=134%DAT=E)
TCP Sequence Prediction: Class=truly random
Difficulty=9999999 (Good luck!)
TCP ISN Seq. Numbers: B811BA9B 70C068CD 1A65928F 98BFE7D1 E352BDC6 3169E6B8
IPID Sequence Generation: Incremental
Sieht so aus als wäre da ein Firewallrechner davor, das SUSE im Fingerprint ist höchstwahrscheinlich ein Fake, das macht man sehr gerne.
Ein offener Port 135 und 139 sagt mir Windows-Derivat, irgendeine NT Variante, vermutlich Windows 2000...