LINUX.ORG.RU
ФорумAdmin

Nmap не может просканировать IP, узнать открытый порт.

 , ,


0

1

Привет. Нужна ваша помощь. Когда сканирую удалённый IP адрес, выдаёт такой вот результат:

nmap {IP} -sU -sV -sT -A -v -Pn

Starting Nmap 6.47 ( http://nmap.org ) at 2015-08-05 12:14 EET

NSE: Loaded 118 scripts for scanning.

NSE: Script Pre-scanning.

Initiating Parallel DNS resolution of 1 host. at 12:14

Completed Parallel DNS resolution of 1 host. at 12:14, 0.02s elapsed

Initiating UDP Scan at 12:14

Scanning {IP} [1000 ports]

UDP Scan Timing: About 15.20% done; ETC: 12:18 (0:02:53 remaining)

UDP Scan Timing: About 30.35% done; ETC: 12:18 (0:02:20 remaining)

UDP Scan Timing: About 44.60% done; ETC: 12:18 (0:01:53 remaining)

UDP Scan Timing: About 59.60% done; ETC: 12:18 (0:01:22 remaining)

UDP Scan Timing: About 74.60% done; ETC: 12:18 (0:00:51 remaining)

Completed UDP Scan at 12:18, 201.48s elapsed (1000 total ports)

Initiating Connect Scan at 12:18

Scanning {IP} [1000 ports] Connect Scan Timing: About 15.30% done; ETC: 12:21 (0:02:52 remaining)

Connect Scan Timing: About 30.20% done; ETC: 12:21 (0:02:21 remaining)

Connect Scan Timing: About 45.20% done; ETC: 12:21 (0:01:50 remaining)

Connect Scan Timing: About 60.15% done; ETC: 12:21 (0:01:20 remaining)

Connect Scan Timing: About 75.30% done; ETC: 12:21 (0:00:50 remaining)

Completed Connect Scan at 12:21, 201.70s elapsed (1000 total ports)

Initiating Service scan at 12:21

Scanning 1000 services on {IP}

Service scan Timing: About 0.40% done

Service scan Timing: About 2.10% done; ETC: 14:32 (2:08:12 remaining)

Service scan Timing: About 4.10% done; ETC: 14:02 (1:36:41 remaining)

Service scan Timing: About 6.10% done; ETC: 13:51 (1:24:40 remaining)

Service scan Timing: About 8.10% done; ETC: 13:46 (1:18:06 remaining)

Service scan Timing: About 10.10% done; ETC: 13:43 (1:13:35 remaining)

Service scan Timing: About 13.90% done; ETC: 13:31 (1:00:11 remaining)

Service scan Timing: About 14.10% done; ETC: 13:39 (1:07:07 remaining)

Service scan Timing: About 17.90% done; ETC: 13:31 (0:57:11 remaining)

Service scan Timing: About 18.10% done; ETC: 13:37 (1:02:18 remaining)

Service scan Timing: About 21.90% done; ETC: 13:31 (0:54:20 remaining)

Service scan Timing: About 22.10% done; ETC: 13:36 (0:58:13 remaining)

Service scan Timing: About 25.80% done; ETC: 13:31 (0:52:06 remaining)

Service scan Timing: About 31.80% done; ETC: 13:31 (0:47:41 remaining)

Service scan Timing: About 37.80% done; ETC: 13:31 (0:43:23 remaining)

Service scan Timing: About 43.80% done; ETC: 13:31 (0:39:08 remaining)

Service scan Timing: About 49.80% done; ETC: 13:31 (0:34:55 remaining)

Service scan Timing: About 55.80% done; ETC: 13:30 (0:30:42 remaining)

Service scan Timing: About 61.80% done; ETC: 13:30 (0:26:31 remaining)

Service scan Timing: About 67.80% done; ETC: 13:30 (0:22:20 remaining)

Service scan Timing: About 73.70% done; ETC: 13:31 (0:18:17 remaining)

Service scan Timing: About 79.70% done; ETC: 13:30 (0:14:06 remaining)

Service scan Timing: About 85.20% done; ETC: 13:31 (0:10:20 remaining)

Service scan Timing: About 91.20% done; ETC: 13:31 (0:06:08 remaining)

Service scan Timing: About 97.20% done; ETC: 13:31 (0:01:57 remaining)

Completed Service scan at 13:30, 4151.95s elapsed (1000 services on 1 host)

Initiating OS detection (try #1) against {IP}

Retrying OS detection (try #2) against {IP}

Initiating Traceroute at 13:30

Completed Traceroute at 13:31, 9.06s elapsed

Initiating Parallel DNS resolution of 2 hosts. at 13:31

Completed Parallel DNS resolution of 2 hosts. at 13:31, 0.02s elapsed

NSE: Script scanning {IP}.

Initiating NSE at 13:31

NSE Timing: About 0.50% done

NSE Timing: About 2.53% done; ETC: 14:11 (0:39:06 remaining)

NSE Timing: About 4.53% done; ETC: 14:04 (0:31:57 remaining)

NSE Timing: About 6.56% done; ETC: 14:02 (0:28:44 remaining)

NSE Timing: About 8.58% done; ETC: 14:00 (0:26:48 remaining)

NSE Timing: About 12.44% done; ETC: 13:56 (0:21:35 remaining)

NSE Timing: About 14.75% done; ETC: 13:58 (0:22:55 remaining)

NSE Timing: About 18.51% done; ETC: 13:56 (0:20:06 remaining)

NSE Timing: About 24.59% done; ETC: 13:56 (0:18:36 remaining)

NSE Timing: About 30.86% done; ETC: 13:56 (0:17:04 remaining)

NSE Timing: About 36.93% done; ETC: 13:56 (0:15:34 remaining)

NSE Timing: About 43.11% done; ETC: 13:56 (0:14:01 remaining)

NSE Timing: About 48.12% done; ETC: 13:55 (0:12:44 remaining)

NSE Timing: About 53.81% done; ETC: 13:55 (0:11:21 remaining)

NSE Timing: About 59.31% done; ETC: 13:56 (0:10:04 remaining)

NSE Timing: About 64.22% done; ETC: 13:56 (0:08:49 remaining)

NSE Timing: About 69.72% done; ETC: 13:56 (0:07:27 remaining)

NSE Timing: About 74.64% done; ETC: 13:55 (0:06:12 remaining)

NSE Timing: About 79.85% done; ETC: 13:56 (0:04:58 remaining)

NSE Timing: About 84.96% done; ETC: 13:55 (0:03:42 remaining)

NSE Timing: About 90.26% done; ETC: 13:55 (0:02:24 remaining)

NSE Timing: About 95.27% done; ETC: 13:55 (0:01:10 remaining)

Completed NSE at 13:56, 1480.33s elapsed

Nmap scan report for {IP}

Host is up.

All 2000 scanned ports on {IP} are filtered (1000) or open|filtered (1000)

Too many fingerprints match this host to give specific OS details

TRACEROUTE (using proto 1/icmp)

HOP RTT ADDRESS

1 5.16 ms 192.168.1.1

2 ... 9

10 31.94 ms {URL} {IP})

11 991.04 ms {URL} {IP})

12 ...

13 6.21 ms {URL} ({IP})

14 ... 30

NSE: Script Post-scanning.

Read data files from: /usr/bin/../share/nmap

OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 6080.88 seconds

Raw packets sent: 2131 (66.530KB) | Rcvd: 4 (344B)

Всё что {IP} и {URL} могу дать, если понадобиться. Другие адреса сканирует нормально, если нужно будет, скажу провайдера, спасибо.

Хост шифруется. Главное не оборачивайся. Он не любит, когда на него смотрят.
Можно попробовать стелс.

-sF -sX -sN
Stealth FIN, Xmas Tree, or Null scan modes: There are times when
even  SYN  scanning isn’t clandestine enough. Some firewalls and
packet filters watch for SYNs to restricted ports, and  programs
like Synlogger and Courtney are available to detect these scans.
These advanced scans, on the other hand, may  be  able  to  pass
through unmolested.
Но не факт, что сработает.

anonymous
()
Ответ на: комментарий от anonymous

попробую этими ключами прогнать

nmap {IP} -sF -v -A -Pn
nmap {IP} -sX -v -A -Pn
nmap {IP} -sN -v -A -Pn

-Pn указываю, потому что если не указывать, то

Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn

emovoilence
() автор топика

После 3 ключей

nmap {IP} -sF -v -A -Pn
nmap {IP} -sX -v -A -Pn
nmap {IP} -sN -v -A -Pn

All 1000 scanned ports on are open|filtered

emovoilence
() автор топика
Ответ на: комментарий от emovoilence

Так оно это, может ноль в диапазоне не воспринимает/как вариант с 50% вероятностью сканирует, в этом же недочёт!?

anonymous
()

Если добавлять в ключ -p80 к примеру, выдаёт open|filtered

но если я удалённый IP пингую на 80 порт, то всё ок, а те Ip , что мне надо, молчат.

emovoilence
() автор топика
Ответ на: комментарий от anonymous

именно так, в определённом диапазоне нет отклика.

emovoilence
() автор топика
25 мая 2016 г.
Вы не можете добавлять комментарии в эту тему. Тема перемещена в архив.