Script Nmap Kelompok 6

Written By V - Net Kudukeras on Senin, 09 Februari 2009 | 06.37

Starting Nmap 4.68 ( http://nmap.org/ ) at 2009-10-27 11:14 SE Asia Standard TimeInitiating Ping Scan at 11:14Scanning 72.14.203.191 [2 ports]Completed Ping Scan at 11:14, 0.56s elapsed (1 total hosts)Initiating Parallel DNS resolution of 1 host. at 11:14Completed Parallel DNS resolution of 1 host. at 11:14, 0.08s elapsedInitiating SYN Stealth Scan at 11:14Scanning tx-in-f191.1e100.net (72.14.203.191) [1715 ports]Discovered open port 443/tcp on 72.14.203.191Discovered open port 80/tcp on 72.14.203.191SYN Stealth Scan Timing: About 12.83% done; ETC: 11:18 (0:03:27 remaining)Completed SYN Stealth Scan at 11:16, 110.83s elapsed (1715 total ports)Initiating Service scan at 11:16Scanning 2 services on tx-in-f191.1e100.net (72.14.203.191)Completed Service scan at 11:16, 24.75s elapsed (2 services on 1 host)Initiating OS detection (try #1) against tx-in-f191.1e100.net (72.14.203.191)Retrying OS detection (try #2) against tx-in-f191.1e100.net (72.14.203.191)Initiating Traceroute at 11:1772.14.203.191: guessing hop distance at 12Completed Traceroute at 11:17, 13.58s elapsedInitiating Parallel DNS resolution of 14 hosts. at 11:17Completed Parallel DNS resolution of 14 hosts. at 11:17, 13.00s elapsedSCRIPT ENGINE: Initiating script scanning.Initiating SCRIPT ENGINE at 11:17Completed SCRIPT ENGINE at 11:18, 30.07s elapsedHost tx-in-f191.1e100.net (72.14.203.191) appears to be up ... good.Interesting ports on tx-in-f191.1e100.net (72.14.203.191):Not shown: 1712 filtered portsPORT STATE SERVICE VERSION80/tcp open http Google httpd 2.0 (GFE) robots.txt: has 1 disallowed entry _ /search_ HTML title: wellcome to my blog113/tcp closed auth443/tcp open ssl/http Google httpd 2.0 (GFE) robots.txt: has 192 disallowed entries (15 shown) /search /groups /images /catalogs /catalogues /news /nwshp /news?btcid=*& /news?btaid=*& /setnewsprefs? _ /index.html? /? /addurl/image? /pagead/ /relpage/_ HTML title: Site doesn't have a title.No OS matches for hostUptime: 0.001 days (since Tue Oct 27 11:17:17 2009)TCP Sequence Prediction: Difficulty=257 (Good luck!)IP ID Sequence Generation: RandomizedService Info: OS: Linux TRACEROUTE (using port 80/tcp)HOP RTT ADDRESS1 0.00 192.168.1.12 16.00 ip65.123.ez.net.id (202.80.123.65)3 32.00 202.80.112.2094 47.00 202.80.112.1935 1109.00 anubias.ez.net.id (202.80.112.33)6 1109.00 IP-121-241.MCS.napinfo.net (119.110.121.241)7 1110.00 IP-112-249.MCS.napinfo.net (119.110.112.249)8 1125.00 IP-114-134.MCS.napinfo.net (119.110.114.134)9 891.00 209.85.254.16610 938.00 209.85.241.22111 937.00 209.85.250.10112 953.00 209.85.241.16213 ... 14 no response15 844.00 tx-in-f191.1e100.net (72.14.203.191) Read data files from: C:\Program Files\NmapOS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in 244.279 seconds Raw packets sent: 5268 (236.688KB) Rcvd: 683 (419.731KB)

0 komentar:

Posting Komentar