hi, eins w�rde mich mal interessieren. Wie ermittelt Nmap das BS. Soviel ich gelesen habe, geschieht das auf die Art und Weise wie TP Pakete verarbeitet werden. dies f�hrt allerdings zu seltsamen Ergebnissen:
win2k root # nmap -O -v -sS 213.7.200.232 Starting nmap 3.30 ( http://www.insecure.org/nmap/ ) at 2003-08-10 20:52 CEST Host Bc8e8.pppool.de (213.7.200.232) appears to be up ... good. Initiating SYN Stealth Scan against Bc8e8.pppool.de (213.7.200.232) at 20:52 Adding open port 111/tcp Adding open port 13/tcp Adding open port 767/tcp Adding open port 9/tcp Adding open port 25/tcp Adding open port 4559/tcp Adding open port 515/tcp Adding open port 37/tcp The SYN Stealth Scan took 19 seconds to scan 1644 ports. For OSScan assuming that port 9 is open and port 1 is closed and neither are firewalled Interesting ports on Bc8e8.pppool.de (213.7.200.232): (The 1636 ports scanned but not shown below are in state: closed) Port State Service 9/tcp open discard 13/tcp open daytime 25/tcp open smtp 37/tcp open time 111/tcp open sunrpc 515/tcp open printer 767/tcp open phonebook 4559/tcp open hylafax Device type: PDA Running: Linux 2.4.X OS details: Linux 2.4.6 as on Sharp Zaurus PDA Uptime 0.004 days (since Sun Aug 10 20:47:27 2003) TCP Sequence Prediction: Class=random positive increments Difficulty=4407692 (Good luck!) IPID Sequence Generation: All zeros Nmap run completed -- 1 IP address (1 host up) scanned in 24.534 seconds Ich bezweifle sehr stark, das der Herr Bischof einen Sharp besitzt ;-) In Wirklichkeit is da ein Debian Woody i386 PC dahinter. -- cu denny Gnupg key can be found under pgp.mit.edu, key ID 0x73137598
signature.asc
Description: This is a digitally signed message part

