hi,

eins w�rde mich mal interessieren. Wie ermittelt Nmap das BS. Soviel ich
gelesen habe, geschieht das auf die Art und Weise wie TP Pakete
verarbeitet werden. dies f�hrt allerdings zu seltsamen Ergebnissen:

win2k root # nmap -O -v -sS 213.7.200.232

Starting nmap 3.30 ( http://www.insecure.org/nmap/ ) at 2003-08-10 20:52
CEST
Host Bc8e8.pppool.de (213.7.200.232) appears to be up ... good.
Initiating SYN Stealth Scan against Bc8e8.pppool.de (213.7.200.232) at
20:52
Adding open port 111/tcp
Adding open port 13/tcp
Adding open port 767/tcp
Adding open port 9/tcp
Adding open port 25/tcp
Adding open port 4559/tcp
Adding open port 515/tcp
Adding open port 37/tcp
The SYN Stealth Scan took 19 seconds to scan 1644 ports.
For OSScan assuming that port 9 is open and port 1 is closed and neither
are firewalled
Interesting ports on Bc8e8.pppool.de (213.7.200.232):
(The 1636 ports scanned but not shown below are in state: closed)
Port       State       Service
9/tcp      open        discard
13/tcp     open        daytime
25/tcp     open        smtp
37/tcp     open        time
111/tcp    open        sunrpc
515/tcp    open        printer
767/tcp    open        phonebook
4559/tcp   open        hylafax
Device type: PDA
Running: Linux 2.4.X
OS details: Linux 2.4.6 as on Sharp Zaurus PDA
Uptime 0.004 days (since Sun Aug 10 20:47:27 2003)
TCP Sequence Prediction: Class=random positive increments
                         Difficulty=4407692 (Good luck!)
IPID Sequence Generation: All zeros

Nmap run completed -- 1 IP address (1 host up) scanned in 24.534 seconds


Ich bezweifle sehr stark, das der Herr Bischof einen Sharp besitzt ;-)
In Wirklichkeit is da ein Debian Woody i386 PC dahinter.


-- 
cu denny

Gnupg key can be found under pgp.mit.edu, key ID 0x73137598

Attachment: signature.asc
Description: This is a digitally signed message part

Antwort per Email an