2023年信息安全实验报告2.pdf

上传人:奔*** 文档编号:89817626 上传时间:2023-05-13 格式:PDF 页数:40 大小:5.17MB
返回 下载 相关 举报
2023年信息安全实验报告2.pdf_第1页
第1页 / 共40页
2023年信息安全实验报告2.pdf_第2页
第2页 / 共40页
点击查看更多>>
资源描述

《2023年信息安全实验报告2.pdf》由会员分享,可在线阅读,更多相关《2023年信息安全实验报告2.pdf(40页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。

1、本科实验报告课程名称:信息安全技术与应用实验地点:实验机房110_专业班级:计 Z1303_学 号:_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _学生姓名:杨朝辉_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _指导教师:张辉_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _成 绩:_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _20 2 3 年 6 月 5 日太原理工大学学生实验报告学院名称计算机

2、科学与技术学院专业班级计 Z 1 303学号学生姓名杨朝辉实验11期5 月 3 1 日成绩课程名称信息安全技术与应用实验题目实验一常用网络安全命令一、实验目的和规定1.熟悉并掌握使用常用网络安全命令2.由于常用网络安全命令功能强大、参数众多,在有限时间内不也许对所有命令参数进行实验。但规定每个命令至少选择两个参数进行实验,命令参数可以任意选择。命令执行后将执行结果复制到实验报告表格中,并对命令执行结果进行解释。二、实验内容1.i p c o n f i g 命令重要功能:显示本地主机I P 地址、子网掩码、默认网关、M A C 地址等。例 1:C :i p c o n f i g/a 1 12

3、.p i n g 命令重要功能:目的主机的可达性、名称、I P 地址、路由跳数、往返时间等。例 2:C :p i n g 19 2.16 8.0.1 o r t a r g e t _n a m e3.t r a c e r t 命令重要功能:路由跟踪、节 点 I P 地址、节点时延、域名信息等。例 3:C:t r a c e r t w w.b a i d u.c o m o r 1 9 2.16 8.0.14.n e t s t a t 命令。重要功能:显示协议记录信息和当前T C P/I P 网络连接。例 4:C:n e t s t a t -a;C:n e t s t a t -n ;

4、5.n b t s t a t 命令重要功能:显示使用N B T (N e t B I O S o v e r T C P /I P)的协议记录和当前T C P /息,可获得远程或本机的组名和机器名。例 5:C:n b t s tat-a 1 9 2.16 8.0.1;C :n b t s t a t -nI P 网络连接信6.n e t 命令重要功能:网络查询、在线主机、共享资源、磁盘映射、启动服务、关闭服务、发送消息、建立用户等。n e t 命令功能十分强大,输入n e t h e l p c o m m a n d 可获得c o m m a n d 的具体功能及使用方法。例 5:C:n

5、e t v i e w;C:n e t v i e w t a r g e t _ n a m e ;n e t s e n d /d o m a i n:计算机名(*为域内广播)消息三、重要仪器设备W i n 7 0 s 的 P C四、实验环节按照实验内容进行五、实验结果1.ipc o nfig 命令icro so ft Windows 4本 6.1.76011 2009 M icrosoft Corporation o 保留所有权示I1:M isersn yth ip con fig/allI P 配置nytn-PC狙入在 匕 口否.呆缀用启已已理名Nscsd机D点MNS主主HTIPUI本

6、地连接:媒 隹 状 态.茂 接 侑 定 的 DNS后缀相 述.物 理 地 址.DHCP-自 动 配 能 启 用.媒体已断开Realtek PCIe FE Family C ontroller74-86-7A-2B-13-A7i7E无线局域网适配器无线网络连接:连掾特定的D N S后缀抽述.物理地址.D H C P已尼用一自动配翻启用.IPv6地 址.矗到天链士掩网-地U4网认本IP子默选D N S服务第TCPIP上的NetBIOS:Dell Wireless 1705 802.11b/g/n(:BC-85-56-C5-88-25-不:S-7E:2001:250:c01:6191:ldd8:65

7、6:5f80:i:2001:250:c01:6191:8097:93fe:fcl5:e80:ldd8:656:580:62c5zl4M:101.7.186.117 首选:255.255.255.0:fe80:3e8a:b0f:fe30:f0zl4101.7.186.1:202.207.240.225:已启用以太网适配器Bluetooth网络连接:媒 隹 状 态.察权存定的D N S后 缀.工 赢 正:D H C P兼 用.自动配配启用.媒体已断开Bluetooth设备 个人区域网)BC-85-56-C5-88-26以.太网适配器 UMware Network Adapter UMnetl:连描

8、后 缀.:.:UMware Uirtual Ethernet Adapter址饕矗的天I客地已配链掩网U6U6理CP桀U4网认CPCP物DH自本IP子默DHDH用6启PU:.:005056C00001.不.:g.7E地址.:fe80:1066:8ac:477c:df42zi8(首选.:192.168.2 2 0,首选).:255.255.255.0山而立ID户.:503337046D U I D.:00-01-00-01-lE-97-BF-D9-BC-85-56-D N S服务器TCPIP 上的 NetBIOSec0:0:0:ff:1Z1fec0:0:0:ffff:2zlfec0:0:0:ff

9、ff:3zl已启用iL太网适酉己器 UMware Network A dapter UMnet8:8接述理CP桀U4网认CPCP连描物DH自本IP子默DHDH后缀T矗的圣配链掩网U6U6用6-启PU:地址:UMware U ir tu a l E th ern et A dapter f:0 0-5 0-5 6-C 0-0 0-0 8.不:1小:f e 8 0:a908:f 13e:1092:c5 4czl9:1 9 2.2 6 8.8 5 4.4 1首选:2 5 5.2 5 5.2 5 5.0.瑞ID户IA客DUID5201142620 0-0 1-0 0-0 1-1E-97-B F-D 9

10、-B C-85-56D N S服务器TCPIP 上的 NetBIOSf e c 0:0:0:f f f f:l z lf e c 0:0:0:f f f f:2 z lf e c 0:0:0:f f f f:3 z l已启用隧道适配器 isatap.:瞿疆DH自状特由西&述理CP动态定地址.用书启B器 is a ta p.媒体已断开M icro so ft ISATAP A dapter00 00 00 00 00 00 00 E0瞿疆DH自靠述理CP动态定地址用书启B:上;.:媒体已断开后 缀.:M icro so ft ISATAP A dapter00 00 00 00 00 00 00

11、 E0杳是isatap.:媒+在描物DH自&述理CP动t-FT态定地址用用建媒体已断开M icro so ft ISATAP A dapter#300 00 00 00 00 00 00 E0Teredo T unneling P se u d o-In te r fa c e:瞿疆DH自媒体已断开Teredo T unneling P se u d o-In te r fa c00 00 00 00 00 00 00 E0隧道适配器 isatap.:次畤出酉襄述理CP动媒连描物DH自缀一后S-ND的态定用媒体已断开M icrosoft ISATAP Adapter*500 00 00 00

12、00 00 00 E0隧道适配器 isatap.:媒连描物DH自士酉自述理CP动.缀后S-DN的态定地址用书启片n1墨=t已媒体已断开M icrosoft ISATAP Adapter#600-00-00-00-00-00-00-E 02.ping命令:Usei*sjnytiping 101.7.1 8 6.1 1 9J=2 2二一JTTN二一EH.Ping 101.7.1861 0 1.7.186.119101.7.186.119101.7.186.119101.7.186.1191 9回回E回1hybyhyhvJIYA二Z.,二1 4二像=rrr-m=m、-m、+BL2222l-f3333

13、=3 2节节节节有事李具a 据261 8TTL=64TTL=64TTL=64TTL=64L01.186的备ms9已计811:1估1,取 长=2659ns4,丢 失=0 ti*acert wwu.baidu com鸣过最多3 0个跃点跟踪至v/ww.a.s h if en.con 61.135.169.1 2 5 3的路由:11 RS2 ns1 ns1 0 1.7.1 8 6.121 ns1 RS1 ns219.226.127.22532 ns1 ns2 ns219.226.127.214411ms6 ns11ns2 4 1.9 6.2 6.2 1 8.in te r n e t.sx.c n2

14、 1 8.2 6.9 6.528ns9 ns9 RS2 0 5.1 7 6.2 6.2 1 8.in te r n e t.sx.c n218.26.1764 ns3 ns18ns1 2 5.1 2 4.2 6.2 1 8.in te r n e t.sx.c n218.26.12710 ns9 ns5 ms2 4 1.1 2 4.2 6.2 1 8.in te r n e t.sx.c n218.26.1283 RS3 RS3 ms2.1 3 1.2 6.2 1 8.r o u te r-sw itc (218.26937 ns37RS37ns1 8 5.1 5 1.2 6.2 1 8.in

15、 te r n e t.sx.c n218,26.151015RS13RS13ns219.15 8.1 4.1 9 71113ns14ns人C4.n e t s t a t 命令C:M Jsersnyth netstat-a活动连接协议本地地址外部地址 状态TCP0.0.0.0::135nyth-PC:0LISTENINGTCP0.0.0.0::443nyth-PC:0LISTENINGTCP0.0.0.0::445nyth-PC:0LISTENINGTCP0.0.0.0::554nyth-PC:0LISTENINGTCP0.0.0.0::902nyth-PC:0LISTENINGTCP0.0

16、.0.0::912nyth-PC:0LISTENINGTCP0.0.0.0::3306nyth-PC:0LISTENINGTCP0.0.0.0::535?nyth-PC:0LISTENINGTCP0.0.0.0::5678nyth-PC:0LISTENINGTCP0.0.0.0::10000nyth-PC:0LISTENINGTCP0.0.0.0::12703nyth-PC:0LISTENINGTCP0.0.0.0:49160nyth-PC:0LISTENINGTCP0.0.0.0:49161nyth-PC:0LISTENINGTCP0.0.0.0:49162nyth-PC:0LISTENIN

17、GTCP0.0.0.0:49163nyth-PC:0LISTENINGTCP0.0.0.0:49182nyth-PC:0LISTENINGTCP101.7.186.117:139nyth-PC:0LISTENINGTCP101.7.186.117:495911 8 3.6 1.7 0.1 6 6:h ttpCLOSE_WAITTCP101.7.186.117:496214 3:h ttpCLOSE_V/AITTCP101.7.186.117:49704ec2-54 223 69 4 9-h ttpCLOSE_V/AITTCP101.7.186.117:49909cncln 二h ttpCLOS

18、E_WAITTCP101.7.186.117:499102 1 8.5 8.2 0 9.1 0 6:h ttpCLOSEJ/AITTCP101.7.186.117:499112 1 8.5 8.2 0 9.1 0 6:h ttpCLOSE_WAITTCP101.7.186.117:499122 1 8.5 8.2 0 9.1 0 6:h ttpCLOSE蛆 ITTCP101.7.186.117:499132 1 8.5 8.2 0 9.1 0 6:h ttpCLOSEjmiTTCP101.7.186.117:499142 1 8.5 8.2 0 9.1 0 6:h ttpCLOSE.WAITT

19、CP 101.7.186.117:49916 218.58.209.106:http CLOSE_WAITTCP 101.7.186.117:50199 220.170.186.216:http CLOSE_WAITTCP 127.0.0.1:4000 nyth-PC:0 LISTENINGTCP 127.0.0.1:8307 nyth-PC:0 LISTENINGTCP 127.0.0.1:10000 nyth-PC:0 LISTENINGTCP 127.0.0.1:30003 nyth-PC:50198 TIME.WAITTCP 127.0.0.1:48303 nyth-PC:0 LIST

20、ENINGTCP 127.0.0.1:48303 nyth-PC:49183 ESTABLISHEDTCP 127.0.0.1:49183 nyth-PC:48303 ESTABLISHEDTCP 127.0.0.1:50198 nyth-PC:30003 TIME_WAITTCP 192.168.154.1:139 nyth-PC:0 LISTENINGTCP 192.168.220.1:139 nyth-PC:0 LISTENINGTCP :3:135 nyth-PC:0 LISTENINGTCP :443 nyth-PC:0 LISTENINGTCP :445 nyth-PC:0 LIS

21、TENINGTCP :554 nyth-PC:0 LISTENINGTCP :5357 myth-PC:0 LISTENINGTCP :49160 nyth-PC:0 LISTENINGTCP :49161 myth-PC:0 LISTENINGTCP :49162 Ryth-PC:0 LISTENINGTCP :J:49163 nyth-PC:0 LISTENINGTCP :J:49182 nyth-PC:0 LISTENINGTCP :1:8307 nyth-PC:0 LISTENINGTCP 2001:250:c01:6191:809?:93fe:fcl5:efc7:50188 2606

22、:2800:10c:1:94b:c0f:14d:https CLOSE_WAITTCP 2001:250:c01:6191:8097:93fe:fcl5:efc7:50189 2606:2800:10c:1:94b:c0f:14d:https CLOSE_WAITUDP 0.0.0.0:123*:*UDP 0.0.0.0:3702*:*UDP 0.0,0.0:3702*:*UDP 0.0.0.0:3702*:*UDP0.0.0.0:3702*UDP0.0.0.0:5004*MUDP0.0.0.0:5005*UDP0.0.0.0:5678*UDP0.0.0.0:8367*UDP0.0.0.0:1

23、5005UDP0.0.0.0:16662*UDP0.0.0.0:49218MUDP0.0.0.0:52214UDP0.0.0.0:52700*MUDP0.0.0.0:57617UDP0.0.0.0:58072M.UDP0.0.0.0:65139UDP101.7.186.117:13?MUDP101.7.186.117:138UDP101.7.186.117:1900MUDP101.7.186.117:50371UDP127.0.0.1:1900*MUDP127.0.0.1:50372MUDP127.0.0.1:58284*UDP127.0.0.1:61292*UDP127.0.0.1:6147

24、2*UDP192.168.154.1:137*UDP192.168.154.1:138UDP192.168.154.1:1900*UDP192.168.220.1:137MUDP192.168.220.1:138W*UDP192.168.220.1:1900M*UDP:U:50370*:*UDPfe80:1066:8ac:477c:df42x18:546*:*UDPfe80:1066:8ac:477c:df42x18:1900*:*UDPfe80:ldd8:656:5f80:62c5zl4:1900*:*UDPfe80:ldd8:656:5f80:62c5zl4:50369*:*UDPfe80

25、:a908:fl3e:1092:c54czl9J:546*:*UDPfe80:a908:13e:1092:c54cz19:1900*:*5.nb t stat 命令:XUsers jnyth nbtstat-n本地连接:节 点I P址址:0.0.0.0范 围ID:门缓存中没有名称UMware Network Adapter UMnetl:节点 IP 址址:1 1 92.1 68.220.1 范围 I D:NetBIOS本地名称表名称 类型状态MVTH-PCWORKGROUPMVTH-PCWORKGROUPWORKGROUP._MS BROWS E _-年nrj年rrrj年nrj册册册册册册注注

26、注注注注已已已已已已Unv/are Network Adapter UMnet8:节占 IP 址址:1 1 92:1,68.1,54.1.范闱 ID:NetBIOS本地名称表名称 类型 状态-生rnjdHrnjdfHmJ2b2 rMVTH-PCWORKGROUPMVTH-PCWORKGROUPWORKGROUP_ MS BROWSE.册册册册册册注注注注注注已已已已已已无线网络连棒:一下点 IP 址址:C1 01.7.1 86.1 1 7J 氾围 ID:JNetBIOS本地名称表名称 类型 状态MVTH-PCWORKGROUPMVTH-PCWORKGROUP-生rrrjJj+1rrrj册册册册

27、注注注注已已已已Bluetooth网络连接:节 点I P址址:P0.0.0.0 1范 围ID:缓存中没有名称6.n e t 命令C:Usei*sjnsFthnet uiew服务器名称 注解3 0 1-0 1WBOSSERUERELAB42WELAB43ELAB44ELAB47WELAB61WELAB63WELAB65ELAB66ELAB67WELAB68ELAB69WELAB72WELAB73WELAB77ELAB78WELAB79WELAB83WELAB84ELAB87WMVTH-PC命令成功完成。实验地点 实验机房110 指导教师 张辉6太原理工大学学生实验报告学院名称计算机科学与技术学院

28、专业班级计 Z 1 3 03学号学生姓名杨朝辉实验日期5 月 3 1 日成绩课程名称信息安全技术与应用实验题目实验二端口扫描与安全审计一、实验目的和规定1.掌握使用n m ap软件来进行端口扫描和安全审计的操作2.由于Nma p 扫描功能强大、命令参数众多,在有限时间内不也许对所有命令参数进行实验。但实验内容中列举的扫描命令必须完毕,也可以任意选择其他命令参数进行实验。命令执行后将执行结果复制到实验报告表格中,并对命令执行结果进行解释。二、实验内容和原理1.安装 nmap4.01 s et u p.e x e 软件注意事项:采 用 nmap 4.01 s etup.e x e 时将自动安装W

29、i n P cap分组捕获库,采用解压缩nmap-4.01-Win32.z ip 时需事先安装W inPcap分组捕获库。2 .局域网主机发现。列表扫描:nm ap-s L 局域网地址3 .扫描目的主机端口连续扫描目的主机端口:nmap-r 目的主机IP 地址或名称4.服务和版本检测目的主机服务和版本检测:n m ap-sV 目的主机IP 地址或名称5.操作系统检测目的主机操作系统检测:nmap-0 目的主机I P 地址或名称6.端口扫描组合应用n map-v-A scanme.nmap.o r gnmap-v-s P 19 2.1 6 8.0.0/16 10.0.0.0/8nmap-v-iR

30、 10 0 00-P 0-p-8 0三、重要仪器设备W in70s 的 PC四、实验环节按照实验内容进行五、实验结果1.列表扫描 nm ap-s L 1 9 2.168.1.109Starting Nmap 5.21(http:/nmap.org)at 2016-06-01 11:00 中国标准时间Nmap scan report for 192.168.1.109Failed to resolve given hcstname/IP:孰挎L Note that you can*t use Vmask*AND*1-4,7,100-*style IP rangesHost is up(0.023

31、s latency).MAC Address:AC:E0:10:58:96:IE(Unknown)Not shown:993 filtered portsPORT135/tcpSTATE SERVICEopenmsrpc139/tcpopennetbios-ssn445/tcpopenmicrosoft-ds554/tcpopenrtsp2869/tcpopenunknown5357八cpopenunknown10243/tcp openunknownItoap done:1 IP address(1 host up)scanned in 11.99 seconds2.连续扫描目的主机端口 n

32、map-r 1 92.1 6 8.1.109nmap-r 192.168.1.109Starting Nmap 5.21(http:/nmap.org)at 2016-06-01 10:58 中国标准时间Nmap scan report for 192.168.1.109Failed to resolve given hostname/IP:皴 揖.Note that you cant use/mask*AND 1-4,7,100-style IP rangesHost is up(0.038s latency).MAC Address:AC:EO:1O:58:96:1E(Unknown)No

33、t shown:L 993 filtered portsPORTSTATESERVICE135/tcpopenmsrpc139/tcpopennetbios-ssn445/tcpopenmicrosoft-ds554/tcpopenrtsp2869/tcpopenunknown5357/tcpopenunknown10243/tcp openunknownNmap done:1 IP address(1 host up)scanned in 12.28 seconds3.目的主机服务和版本检测nm ap-s V 1 9 2.16 8.1.10 0nmap-sV 192.168.1,100Sta

34、rting Nmap 5.21(http:/nmap.org)at 2016-06-01 11:05 中国标准时间Nmap scan report for 192.168.1.100Failed to resolve given hostname/IP:貌挎V.Note that you cant use Vmask AND 1-4,7,100-*style IP rangesHost is up(0.010s latency).MAC Address:2C:D0:5A:44:9E:70(Unknown)Not shown:991 closed portsPORTSTATE SERVICE13

35、5/tcpopenmsrpc139/tcpopennetbios-ssn445/tcpopenmicrosoft-ds1025/tcp openNFS-or-IIS1026八cp openLSA-or-ntenn1027/tcp openIIS1028/tcp openunknown10317tcp openiad21032八cp openiad3Nmap done:1 IP address(1 host up)scanned in 6.03 seconds4.nma p-0 192.168.1.1 0 8nmap-O 192.168.1.1088.1.1088.1.18.1,1008.1,1

36、048.1,1458.1.158.1,1098.1.107Nmap Output Ports/Hosts Topology|Host Details:Scansnmap-O 192.168.1,108Starting Kmap 5.21(http:/nnsap.org)at 2016-06-01 11:46 中国标准时间Skipping SYN Stealch Scan against 192.168.1.108 because Windows does noc support scanning your own machine(localhost)this way.Neap scan rep

37、ort for 192.168.1.108Failed to resolve given hostnane/IP:效 潟.Note that you can t use/mask AND*1-4,7,100-style IP rangesHost is up.PORT STATE SERVICEl/tq unknown tcpmux3/tcp unknown compresanet4/tcp unknown unknown6/tcp unknown unknown7/tcp unknown echo9/tcp unlcnown discard13/tcp unknown daytime17/t

38、cp unknown qotd19/tcp unknown chargen20/tcp unknown ftp-data21/tcp unknown ftp22/tcp unknown sshOa/T/r nnlmnwn rl nr5.nma p-v-A sc a n me.nmap.o r gnma p-v-sP 192.16 8.0.0/16 10.0.0.0/8nmap-v-iR 10 0 00-P0-p-80nmap-v-A scanme.nmap.orgS tarting Nmap 5.21(http:/nm ap.org)at 2016-06-01 13:21 中国标准时间NSE:

39、Loaded 36 scrip ts for scanning.In itia tin g Ping Scan at 13:21Scanning scamne.nmap.org(45.33.32.156)4 portsCoirpleted Ping Scan at 13:21,0.63s elapsed(1 to ta l hosts)In itia tin g P arallel DNS resolution of 1 host,at 13:21Completed P arallel DNS resolution of 1 host,a t 13:21,0.36s elapsedIn iti

40、a tin g SYN S tealth Scan a t 13:21Scanning scanine.nmap.org(45.33.32.156)1000 portsDiscovered open port 22/tcp on 45.33.32.156Discovered open port 80/tcp on 45.33.32.156Increasing send delay for 45.33.32.156 from 0 to 5 due to 20 out of 65 dropped probes since la s t increaseDiscovered open port 31

41、337八cp on 45.33.32.156Completed SYN S tealth Scan at 13:21,38.86s elapsed(1000 to ta l ports)In itia tin g Service scan a t 13:21Scanning 3 services on scanme.nmap.org(45.33.32.156)Completed Service scan at 13:22,6.47s elapsed(3 services on 1 host)In itia tin g OS detection(try 11)against scanme.nma

42、p.org(45.33.32.156)Retrying OS detection(try#2)against scanme.nmap.org(45.33.32.156)In itia tin g Traceroute a t 13:22Completed Traceroute a t 13:22,3.20s elapsedIn itia tin g P arallel DNS resolution of 13 hosts,at 13:22Conleted P arallel DNS resolution of 13 hosts,a t 13:22,0.33s elapsedNSE:S crip

43、t scanning 45.33.32.156.NSE:S tarting runlevel 1(of 1)scan.In itia tin g NSE a t 13:22Completed NSE at 13:22,3.84s elapsedNSE:S cript Scanning completed.Nmap scan report for scanme.nmap.org(45.33.32.156)Host is up(0.18s laten cy).Not shown:986 closed portsPORT STATE22/tcp openSERVICEsshVERSION(proto

44、col 2.0)I ssh-ho3tkey:1024 ac:00:aO:la:8 2:ff:cc:55:99:de:67:2b:34:97:6b:75(DSA)l_2048 20:3d:2d:44:62:2a:b0:5a:9d:b5:b3:05:14:c2:a6:b2(RSA)42/tcp filte re d nameserver8 0/ts open h ttpApache httpd 2.4.7(Ubuntu)Go ahead and ScanMe!F http-favicon:UnJmown favicon MD5:156515DA3C0F7DC6B2493BD5CE43F795135

45、 八 cp139/tcp445/tcp593/tcp1025/tcp1068/tcp1434/tcp3128/tcp4444/tcp6669/tcp31337/tcp1 servicefilte re dfilte re dfilte re dfilte re dfilte re dfilte re dfilte re dfilte re dfilte re dfilte re dopenmsrpenetbios-ssnffiicrosoft-dshttp-rpe-epmapNFS-or-IISinstl_bootcms-sql-msquid-httpkrb524iretepwrappedun

46、recognized despite returning data.If you know the service/version,please submit the following fingerprint at http:/wsubmit.cgi:SF-Port22-TCP:V-5.21%I-7%D-6/llTime-574E70F9%P-i686-pc-window3-windows%r(NSF:ULL.2BrSSH-2.0-OpenSSH_6.6.lplx20Ubuntu-2ubuntu2.3 rn);Device type;general purpose IW AP I broad

47、band routerRunning(JUST GUESSING):Linux 2.6.XI2.4.X(90%)Agaressive OS guesses:Linux 2.6.15-2.6.26(90%),Linux 2.6.18(89%),Linux 2.6.18-2.6.28(87%),Linux 2.6.9-2.6.27(86%)r DEOpenWrt Kamikaze 8.09(Linux 2.6.25.20)(85%)r Linux 2.6.15(Ubuntu)(85%)r Linux 2.6.23(85%),Linux 2.6.27.21-grsec(85%)No exact OS

48、 matches for host(te st conditions non-ideal).Uptime guess:28.570 days(since Tue May 03 23:41:51 2016)Network D istance:15 hopsTCP Sequence Prediction:Difficulty=260(Good luck!)IP ID Sequence Generation:A ll zerosIRACEROUTE(using port 53/tcp)HOP RTT1 0.00 nsADDRESS192.168.1.12 0.00 ms 110.177.144.13

49、.45 31.00 ms 202.97.54.1176127.00 ms 202.97.53.1467143.00 ms 202.97.53.708410.00 ms 202.97.52.69410.00 ms 202.97.90.11410205.00 ms 10ge5-ll.core!.I(64.62.244.61)11425.00 ms 100ge8-2.core!(184.105.81.237)12189.00 ms 10ge4-(184.105.222.89)13425.00 ms 172.18.0.3814173.00 ms 173.230.159.315267.00 ms sca

50、nme.nmap.erg(45.33.32.156)Read data file s from:D:NmapOS and Service detection performed.Please report any incorrect resu lts at h ttp:Z/nziap.org/submit/.ttoap done:1 IP address(1 host up)scanned in 63.65 secondsRaw packets sent:1183(S3.960KB)I Rcvd:1129(48.282KB)nm ap,-sP 192.168.0.0/1610.0.0.0/8S

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 教育专区 > 教案示例

本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

工信部备案号:黑ICP备15003705号© 2020-2023 www.taowenge.com 淘文阁