Results 1 to 7 of 7

Thread: some help in scanning the sites by Nmap ???

  1. #1
    Just burned his ISO
    Join Date
    Jan 2007
    Posts
    5

    Exclamation some help in scanning the sites by Nmap ???

    Hello ... i'v see a subject for Nmap tool and how to scan servers for any Vulnerability and ports ...

    so please some Expert in this to help me in install it here ...
    i've installed the nmap in my vps box

    Code:
    [root@BOX public_html]# yum install nmap
    Setting up Install Process
    Setting up repositories
    update                    100% |=========================|  951 B    00:00
    base                      100% |=========================| 1.1 kB    00:00
    addons                    100% |=========================|  951 B    00:00
    extras                    100% |=========================| 1.1 kB    00:00
    Reading repository metadata in from local files
    Excluding Packages in global exclude list
    Finished
    Parsing package install arguments
    Resolving Dependencies
    --> Populating transaction set with selected packages. Please wait.
    ---> Downloading header for nmap to pack into transaction set.
    nmap-3.70-1.i386.rpm      100% |=========================| 8.3 kB    00:00
    ---> Package nmap.i386 2:3.70-1 set to be updated
    --> Running transaction check
    
    Dependencies Resolved
    
    =============================================================================
    Package                 Arch       Version          Repository        Size
    =============================================================================
    Installing:
    nmap                    i386       2:3.70-1         base              486 k
    
    Transaction Summary
    =============================================================================
    Install      1 Package(s)
    Update       0 Package(s)
    Remove       0 Package(s)
    Total download size: 486 k
    Is this ok [y/N]: y
    Downloading Packages:
    (1/1): nmap-3.70-1.i386.r 100% |=========================| 486 kB    00:00
    Running Transaction Test
    Finished Transaction Test
    Transaction Test Succeeded
    Running Transaction
      Installing: nmap                         ######################### [1/1]
    
    Installed: nmap.i386 2:3.70-1
    Complete!
    [root@BOX public_html]#
    and then i scann my box like this command !

    Code:
    [root@BOX ~]# nmap localhost
    
    Starting nmap 3.70 ( xxxxxxxxxxxxxx ) at 2007-11-08 16:03 MSK
    Interesting ports on localhost (127.0.0.1):
    (The 1646 ports scanned but not shown below are in state: closed)
    PORT     STATE SERVICE
    21/tcp   open  ftp
    22/tcp   open  ssh
    25/tcp   open  smtp
    53/tcp   open  domain
    80/tcp   open  http
    110/tcp  open  pop3
    143/tcp  open  imap
    443/tcp  open  https
    465/tcp  open  smtps
    783/tcp  open  hp-alarm-mgr
    953/tcp  open  rndc
    993/tcp  open  imaps
    995/tcp  open  pop3s
    3306/tcp open  mysql
    
    Nmap run completed -- 1 IP address (1 host up) scanned in 0.793 seconds
    [root@BOX ~]#
    now when i scan others sites its take a time and then show me this Messege !

    Code:
    [root@BOX ~]# nmap -sS -P0 -sV xxxxxxxxxxxxxxxxxx
    
    Starting nmap 3.70Hello ... i'v see a subject for Nmap tool and how to scan servers for any Vulnerability and ports ...
    
    so please some Expert in this to help me in install it here ...
    i've installed the nmap in my vps box
    
    
    Code:
    [root@BOX public_html]# yum install nmap
    Setting up Install Process
    Setting up repositories
    update                    100% |=========================|  951 B    00:00
    base                      100% |=========================| 1.1 kB    00:00
    addons                    100% |=========================|  951 B    00:00
    extras                    100% |=========================| 1.1 kB    00:00
    Reading repository metadata in from local files
    Excluding Packages in global exclude list
    Finished
    Parsing package install arguments
    Resolving Dependencies
    --> Populating transaction set with selected packages. Please wait.
    ---> Downloading header for nmap to pack into transaction set.
    nmap-3.70-1.i386.rpm      100% |=========================| 8.3 kB    00:00
    ---> Package nmap.i386 2:3.70-1 set to be updated
    --> Running transaction check
    
    Dependencies Resolved
    
    =============================================================================
    Package                 Arch       Version          Repository        Size
    =============================================================================
    Installing:
    nmap                    i386       2:3.70-1         base              486 k
    
    Transaction Summary
    =============================================================================
    Install      1 Package(s)
    Update       0 Package(s)
    Remove       0 Package(s)
    Total download size: 486 k
    Is this ok [y/N]: y
    Downloading Packages:
    (1/1): nmap-3.70-1.i386.r 100% |=========================| 486 kB    00:00
    Running Transaction Test
    Finished Transaction Test
    Transaction Test Succeeded
    Running Transaction
      Installing: nmap                         ######################### [1/1]
    
    Installed: nmap.i386 2:3.70-1
    Complete!
    [root@BOX public_html]#
    and then i scann my box like this command !
    Code:
    [root@BOX ~]# nmap localhost
    
    Starting nmap 3.70 ( xxxxxxxxxxxxxxxxxxx/ ) at 2007-11-08 16:03 MSK
    Interesting ports on localhost (127.0.0.1):
    (The 1646 ports scanned but not shown below are in state: closed)
    PORT     STATE SERVICE
    21/tcp   open  ftp
    22/tcp   open  ssh
    25/tcp   open  smtp
    53/tcp   open  domain
    80/tcp   open  http
    110/tcp  open  pop3
    143/tcp  open  imap
    443/tcp  open  https
    465/tcp  open  smtps
    783/tcp  open  hp-alarm-mgr
    953/tcp  open  rndc
    993/tcp  open  imaps
    995/tcp  open  pop3s
    3306/tcp open  mysql
    
    Nmap run completed -- 1 IP address (1 host up) scanned in 0.793 seconds
    [root@BOX ~]#
    now when i scan others sites its take a time and then show me this Messege !
    Code:
    [root@BOX ~]# nmap -sS -P0 -sV www[dot]*************[dot]com
    
    Starting nmap 3.70 ( insecure[dot]org/nmap/ ) at 2007-11-09 01:34 MSK
    All 1660 scanned ports on 112.9.233.72[dot]static[dot]reverse[dot]ltdomains[dot]com (xxxxxxxxxxx) are: filtered
    
    Nmap run completed -- 1 IP address (1 host up) scanned in 333.771 seconds
    [root@BOX ~]#
    is there a way to scaner a sites faster ? without the errors ? and is there any future tools from B|T to scanner the site like Nmap ? Cheers ! at 2007-11-09 01:34 MSK All 1660 scanned ports on xxxxxxxxxx[dot]static[dot]reverse[dot]ltdomains[dot]xxx (xxxxxxxxxxxxx) are: filtered Nmap run completed -- 1 IP address (1 host up) scanned in 333.771 seconds [root@BOX ~]#
    is there a way to scaner a sites faster ? without the errors ?

    and is there any future tools from B|T to scanner the site like Nmap ?

    Cheers !

  2. #2
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    What server are you trying to hack into??
    Us experts need more detail than just
    Code:
    nmap -sS -P0 -sV xxxxxxxxxxxxxxxxxx
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  3. #3
    Jenkem Addict imported_wyze's Avatar
    Join Date
    Jul 2007
    Posts
    1,543

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    What server are you trying to hack into??
    Us experts need more detail than just
    Code:
    nmap -sS -P0 -sV xxxxxxxxxxxxxxxxxx
    And also, do you think that the server you're trying to h4ck is firewalled....?
    dd if=/dev/swc666 of=/dev/wyze

  4. #4
    Just burned his ISO
    Join Date
    Jan 2007
    Posts
    5

    Default

    am not looking for some server to hack it ! am looking to the way to figure the ports and Programs installed like Sql Vesrion ; Kernel ; etc ....

    So how can we do that by Nmap Tools ?

    hope u get my point ExploitZ

    Cheers !

  5. #5
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by J0RD4N14N.R1Z View Post
    am not looking for some server to hack it ! am looking to the way to figure the ports and Programs installed like Sql Vesrion ; Kernel ; etc ....

    So how can we do that by Nmap Tools ?

    hope u get my point ExploitZ

    Cheers !
    Did you try man nmap? Or read the dozens of webpages out there that describe how to use nmap?
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  6. #6
    Just burned his ISO
    Join Date
    Jan 2007
    Posts
    5

    Default

    i did Serously but i dot know why i scan other sites [ victoms ] its take a 5 mnts or more then its show me

    Code:
    [root@BOX ~]# nmap -sS -P0 -sV www[dot]*************[dot]com
    
    Starting nmap 3.70 ( insecure[dot]org/nmap/ ) at 2007-11-09 01:34 MSK
    All 1660 scanned ports on 112.9.233.72[dot]static[dot]reverse[dot]ltdomains[dot]com (xxxxxxxxxxx) are: filtered
    
    Nmap run completed -- 1 IP address (1 host up) scanned in 333.771 seconds
    [root@BOX ~]#
    try to scan any site and see what u reserve !!

  7. #7
    My life is this forum thorin's Avatar
    Join Date
    Jan 2010
    Posts
    2,629

    Default

    Are you seriously asking why other (non local) servers respond more slowly than localhost?

    http://insecure.org/nmap/man/man-por...ng-basics.html

    Since you haven't figured this out since June:
    http://www.webhostingtalk.com/showthread.php?p=4798038

    Do you think maybe you're in over your head?

    am not looking for some server to hack it ! am looking to the way to figure the ports and Programs installed like Sql Vesrion ; Kernel ; etc ....
    If they're your machines you wouldn't need to do this via nmap.
    So how can we do that by Nmap Tools ?
    Assuming there wasn't a firewall between you and the target then "nmap -sS -A -P0 xxx.xxx.xxx.xxx" would be sufficient, but this would still only give you "best guess" information on OS and Services Versions. (Note -A is the same as -sV and -O) Since they're supposedly your machines there are much better ways to get the actual version information (uname -a, uname -r, mysql -V, java -version, etc...).
    I'm a compulsive post editor, you might wanna wait until my post has been online for 5-10 mins before quoting it as it will likely change.

    I know I seem harsh in some of my replies. SORRY! But if you're doing something illegal or posting something that seems to be obvious BS I'm going to call you on it.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •