How To Use A Port Scanner: Learn Latest Computer And Mobile Hacking Tricks


To demonstrate the capabilities of the Nmap port scanner, we ran the following scan.
The output of the scan reveals the services running on the machine. Nmap’s ability
to identify the OS running on the system is particularly useful because it can
significantly reduce the time required to launch a successful attack against the
machine.
Based on the Nmap results, this system appears to be a fully loaded Solaris 2.6 or 7
OE system running most of the default services.

12 How Hackers Do It: Tricks, Tools, and Techniques • May 2002
The Nmap output is as follows:
# /usr/local/nmap -O ganassi
Starting nmap V. 2.53 (www.insecure.org/nmap/)
Interesting ports on ganassi (10.8.10.231):
(The 1515 ports scanned but not shown below are in state: closed)
Port State Service
7/tcp open echo
9/tcp open discard
13/tcp open daytime
19/tcp open chargen
21/tcp open ftp
23/tcp open telnet
25/tcp open smtp
37/tcp open time
79/tcp open finger
111/tcp open sunrpc
512/tcp open exec
513/tcp open login
514/tcp open shell
515/tcp open printer
540/tcp open uucp
1103/tcp open xaudio
4045/tcp open lockd
6112/tcp open dtspc
7100/tcp open font-service
32771/tcp open sometimes-rpc5
32772/tcp open sometimes-rpc7
32773/tcp open sometimes-rpc9
32774/tcp open sometimes-rpc11
32775/tcp open sometimes-rpc13
32776/tcp open sometimes-rpc15
32777/tcp open sometimes-rpc17
32778/tcp open sometimes-rpc19
Remote operating system guess: Solaris 2.6 - 2.7
Uptime 0.054 days (since Wed Sep 12 09:41:59 2001)
Nmap run completed -- 1 IP address (1 host up) scanned in 37 seconds

0 Responses to “How To Use A Port Scanner: Learn Latest Computer And Mobile Hacking Tricks”

Post a Comment