Zenmap掃自家內網ip
阿新 • • 發佈:2019-01-25
用kali linux 自帶的Zenmap掃了一下華為榮耀盒子的ip,得到以下結果。
Starting Nmap 7.01 ( https://nmap.org ) at 2016-04-22 22:06 CST
NSE: Loaded 132 scripts for scanning.NSE: Script Pre-scanning.
Initiating NSE at 22:06
Completed NSE at 22:06, 0.00s elapsed
Initiating NSE at 22:06
Completed NSE at 22:06, 0.00s elapsed
Initiating ARP Ping Scan at 22:06
Scanning 192.168.2.2 [1 port]
Completed ARP Ping Scan at 22:06, 0.03s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 22:06
Completed Parallel DNS resolution of 1 host. at 22:06, 6.53s elapsed
Initiating SYN Stealth Scan at 22:06
Scanning 192.168.2.2 [1000 ports]
Discovered open port 49155/tcp on 192.168.2.2
Discovered open port 49153/tcp on 192.168.2.2
Discovered open port 49152/tcp on 192.168.2.2
Discovered open port 7100/tcp on 192.168.2.2
Discovered open port 4000/tcp on 192.168.2.2
Discovered open port 1443/tcp on 192.168.2.2
Discovered open port 49154/tcp on 192.168.2.2
Completed SYN Stealth Scan at 22:06, 0.15s elapsed (1000 total ports)
Initiating Service scan at 22:06
Scanning 7 services on 192.168.2.2
Service scan Timing: About 14.29% done; ETC: 22:11 (0:04:24 remaining)
Service scan Timing: About 71.43% done; ETC: 22:08 (0:00:42 remaining)
Completed Service scan at 22:08, 136.08s elapsed (7 services on 1 host)
Initiating OS detection (try #1) against 192.168.2.2
NSE: Script scanning 192.168.2.2.
Initiating NSE at 22:08
Completed NSE at 22:08, 1.81s elapsed
Initiating NSE at 22:08
Completed NSE at 22:08, 0.00s elapsed
Nmap scan report for 192.168.2.2
Host is up (0.00093s latency).
Not shown: 993 closed ports
PORT STATE SERVICE VERSION
1443/tcp open ies-lm?
4000/tcp open remoteanything?
7100/tcp open font-service?
49152/tcp open upnp
49153/tcp open upnp
49154/tcp open upnp
49155/tcp open upnp
5 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port4000-TCP:V=7.01%I=7%D=4/22%Time=571A2FEC%P=x86_64-pc-linux-gnu%r(Ge
SF:tRequest,86,"HTTP/1\.1\x20200\x20OK\x20\r\nContent-Type:\x20text/html\r
SF:\nDate:\x20Fri,\x2022\x20Apr\x202016\x2014:06:35\x20GMT\r\nConnection:\
SF:x20keep-alive\r\nContent-Length:\x209\r\n\r\nurl\x20error")%r(GenericLi
SF:nes,C0,"HTTP/1\.1\x20400\x20Bad\x20Request\x20\r\nContent-Type:\x20text
SF:/plain\r\nDate:\x20Fri,\x2022\x20Apr\x202016\x2014:06:40\x20GMT\r\nConn
SF:ection:\x20keep-alive\r\nContent-Length:\x2056\r\n\r\nBAD\x20REQUEST:\x
SF:20Syntax\x20error\.\x20Usage:\x20GET\x20/example/file\.html")%r(HTTPOpt
SF:ions,86,"HTTP/1\.1\x20200\x20OK\x20\r\nContent-Type:\x20text/html\r\nDa
SF:te:\x20Fri,\x2022\x20Apr\x202016\x2014:06:40\x20GMT\r\nConnection:\x20k
SF:eep-alive\r\nContent-Length:\x209\r\n\r\nurl\x20error")%r(RTSPRequest,8
SF:6,"HTTP/1\.1\x20200\x20OK\x20\r\nContent-Type:\x20text/html\r\nDate:\x2
SF:0Fri,\x2022\x20Apr\x202016\x2014:06:45\x20GMT\r\nConnection:\x20keep-al
SF:ive\r\nContent-Length:\x209\r\n\r\nurl\x20error")%r(FourOhFourRequest,8
SF:D,"HTTP/1\.1\x20200\x20OK\x20\r\nContent-Type:\x20text/html\r\nDate:\x2
SF:0Fri,\x2022\x20Apr\x202016\x2014:07:36\x20GMT\r\nConnection:\x20keep-al
SF:ive\r\nContent-Length:\x2015\r\n\r\nparameter\x20error")%r(SIPOptions,8
SF:D,"HTTP/1\.1\x20200\x20OK\x20\r\nContent-Type:\x20text/html\r\nDate:\x2
SF:0Fri,\x2022\x20Apr\x202016\x2014:07:50\x20GMT\r\nConnection:\x20keep-al
SF:ive\r\nContent-Length:\x2015\r\n\r\nparameter\x20error");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port49152-TCP:V=7.01%I=7%D=4/22%Time=571A2FE8%P=x86_64-pc-linux-gnu%r(F
SF:ourOhFourRequest,CA,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSERVER:\x20L
SF:inux/3\.10\.0_s40\x20UPnP/1\.0\x20HUAWEI_iCOS/iCOS\x20V1R1C00\r\nCONNEC
SF:TION:\x20close\r\nCONTENT-LENGTH:\x2050\r\nCONTENT-TYPE:\x20text/html\r
SF:\n\r\n<html><body><h1>400\x20Bad\x20Request</h1></body></html>")%r(GetR
SF:equest,CA,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSERVER:\x20Linux/3\.10
SF:\.0_s40\x20UPnP/1\.0\x20HUAWEI_iCOS/iCOS\x20V1R1C00\r\nCONNECTION:\x20c
SF:lose\r\nCONTENT-LENGTH:\x2050\r\nCONTENT-TYPE:\x20text/html\r\n\r\n<htm
SF:l><body><h1>400\x20Bad\x20Request</h1></body></html>")%r(HTTPOptions,D2
SF:,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nSERVER:\x20Linux/3\.10\.0_s
SF:40\x20UPnP/1\.0\x20HUAWEI_iCOS/iCOS\x20V1R1C00\r\nCONNECTION:\x20close\
SF:r\nCONTENT-LENGTH:\x2054\r\nCONTENT-TYPE:\x20text/html\r\n\r\n<html><bo
SF:dy><h1>501\x20Not\x20Implemented</h1></body></html>");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port49153-TCP:V=7.01%I=7%D=4/22%Time=571A2FED%P=x86_64-pc-linux-gnu%r(G
SF:etRequest,CA,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSERVER:\x20Linux/3\
SF:.10\.0_s40\x20UPnP/1\.0\x20HUAWEI_iCOS/iCOS\x20V1R1C00\r\nCONNECTION:\x
SF:20close\r\nCONTENT-LENGTH:\x2050\r\nCONTENT-TYPE:\x20text/html\r\n\r\n<
SF:html><body><h1>400\x20Bad\x20Request</h1></body></html>")%r(HTTPOptions
SF:,D2,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nSERVER:\x20Linux/3\.10\.
SF:0_s40\x20UPnP/1\.0\x20HUAWEI_iCOS/iCOS\x20V1R1C00\r\nCONNECTION:\x20clo
SF:se\r\nCONTENT-LENGTH:\x2054\r\nCONTENT-TYPE:\x20text/html\r\n\r\n<html>
SF:<body><h1>501\x20Not\x20Implemented</h1></body></html>")%r(FourOhFourRe
SF:quest,CA,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSERVER:\x20Linux/3\.10\
SF:.0_s40\x20UPnP/1\.0\x20HUAWEI_iCOS/iCOS\x20V1R1C00\r\nCONNECTION:\x20cl
SF:ose\r\nCONTENT-LENGTH:\x2050\r\nCONTENT-TYPE:\x20text/html\r\n\r\n<html
SF:><body><h1>400\x20Bad\x20Request</h1></body></html>");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port49154-TCP:V=7.01%I=7%D=4/22%Time=571A2FED%P=x86_64-pc-linux-gnu%r(G
SF:etRequest,CA,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSERVER:\x20Linux/3\
SF:.10\.0_s40\x20UPnP/1\.0\x20HUAWEI_iCOS/iCOS\x20V1R1C00\r\nCONNECTION:\x
SF:20close\r\nCONTENT-LENGTH:\x2050\r\nCONTENT-TYPE:\x20text/html\r\n\r\n<
SF:html><body><h1>400\x20Bad\x20Request</h1></body></html>")%r(HTTPOptions
SF:,D2,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nSERVER:\x20Linux/3\.10\.
SF:0_s40\x20UPnP/1\.0\x20HUAWEI_iCOS/iCOS\x20V1R1C00\r\nCONNECTION:\x20clo
SF:se\r\nCONTENT-LENGTH:\x2054\r\nCONTENT-TYPE:\x20text/html\r\n\r\n<html>
SF:<body><h1>501\x20Not\x20Implemented</h1></body></html>")%r(FourOhFourRe
SF:quest,CA,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSERVER:\x20Linux/3\.10\
SF:.0_s40\x20UPnP/1\.0\x20HUAWEI_iCOS/iCOS\x20V1R1C00\r\nCONNECTION:\x20cl
SF:ose\r\nCONTENT-LENGTH:\x2050\r\nCONTENT-TYPE:\x20text/html\r\n\r\n<html
SF:><body><h1>400\x20Bad\x20Request</h1></body></html>");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port49155-TCP:V=7.01%I=7%D=4/22%Time=571A2FED%P=x86_64-pc-linux-gnu%r(G
SF:etRequest,CA,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSERVER:\x20Linux/3\
SF:.10\.0_s40\x20UPnP/1\.0\x20HUAWEI_iCOS/iCOS\x20V1R1C00\r\nCONNECTION:\x
SF:20close\r\nCONTENT-LENGTH:\x2050\r\nCONTENT-TYPE:\x20text/html\r\n\r\n<
SF:html><body><h1>400\x20Bad\x20Request</h1></body></html>")%r(HTTPOptions
SF:,D2,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nSERVER:\x20Linux/3\.10\.
SF:0_s40\x20UPnP/1\.0\x20HUAWEI_iCOS/iCOS\x20V1R1C00\r\nCONNECTION:\x20clo
SF:se\r\nCONTENT-LENGTH:\x2054\r\nCONTENT-TYPE:\x20text/html\r\n\r\n<html>
SF:<body><h1>501\x20Not\x20Implemented</h1></body></html>")%r(FourOhFourRe
SF:quest,CA,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSERVER:\x20Linux/3\.10\
SF:.0_s40\x20UPnP/1\.0\x20HUAWEI_iCOS/iCOS\x20V1R1C00\r\nCONNECTION:\x20cl
SF:ose\r\nCONTENT-LENGTH:\x2050\r\nCONTENT-TYPE:\x20text/html\r\n\r\n<html
SF:><body><h1>400\x20Bad\x20Request</h1></body></html>");
MAC Address: BC:25:E0:40:0C:55 (Huawei Technologies)
Device type: general purpose
Running: Linux 2.6.X|3.X
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
OS details: Linux 2.6.32 - 3.10
Uptime guess: 0.134 days (since Fri Apr 22 18:55:47 2016)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=262 (Good luck!) //難度262是什麼意思?
IP ID Sequence Generation: All zeros
TRACEROUTE
HOP RTT ADDRESS
1 0.93 ms 192.168.2.2
NSE: Script Post-scanning.
Initiating NSE at 22:08
Completed NSE at 22:08, 0.00s elapsed
Initiating NSE at 22:08
Completed NSE at 22:08, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 147.03 seconds
Raw packets sent: 1023 (45.806KB) | Rcvd: 1015 (41.306KB)