Aide Zenmap
Résolu
sdidine
Messages postés
102
Date d'inscription
Statut
Membre
Dernière intervention
-
sdidine Messages postés 102 Date d'inscription Statut Membre Dernière intervention -
sdidine Messages postés 102 Date d'inscription Statut Membre Dernière intervention -
Bonjour,
voila je veux essayer de "hacker" mon propre réseau (si vous me demandez pourquoi je ne saurais quoi vous répondre a part la curiosité) et pour cela j'utilise Zenmap. Alors voilà ce qu'il me dit après un scan :
Starting Nmap 5.51 ( https://nmap.org/ ) at 2011-05-10 20:05 CEST
NSE: Loaded 57 scripts for scanning.
Initiating Ping Scan at 20:05
Scanning 82.67.xxx.xxx [4 ports]
Completed Ping Scan at 20:05, 0.01s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 20:05
Completed Parallel DNS resolution of 1 host. at 20:05, 0.03s elapsed
Initiating SYN Stealth Scan at 20:05
Scanning gre92-1-xx-xx-xxx-xxx.fbx.proxad.net (82.xxx.xxx.xxx) [1000 ports]
Discovered open port 554/tcp on 82.xxx.xxx.xxx
Discovered open port 80/tcp on 82.xxx.xxx.xxx
Discovered open port 9100/tcp on 82.xxx.xxx.xxx
Completed SYN Stealth Scan at 20:05, 4.82s elapsed (1000 total ports)
Initiating Service scan at 20:05
Scanning 2 services on gre92-1-xx-xx-xxx-xxx.fbx.proxad.net (82.67.174.162)
Completed Service scan at 20:05, 6.02s elapsed (3 services on 1 host)
Initiating OS detection (try #1) against gre92-1-xx-xx-xxx-xxx.fbx.proxad.net (82.xx.xxx.xxx)
Initiating Traceroute at 20:05
Completed Traceroute at 20:05, 0.02s elapsed
NSE: Script scanning 82.xx.xxx.xxx.
Initiating NSE at 20:05
Completed NSE at 20:05, 0.04s elapsed
Nmap scan report for gre92-1-xx-xx-xxx-xxx.fbx.proxad.net (82.xx.xxx.xxx)
Host is up (0.0037s latency).
Not shown: 997 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http Cheyenne httpd 2.2.8
|_http-methods: No Allow or Public header in OPTIONS response (status code 501)
|_http-title: Site doesn't have a title (text/html).
554/tcp open rtsp Freebox rtspd 1.2
9100/tcp open jetdirect?
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 2.6.X
OS details: Linux 2.6.13 - 2.6.31, Linux 2.6.18
Uptime guess: 6.694 days (since Wed May 4 03:25:36 2011)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=195 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Host: localhost; Device: media device
TRACEROUTE (using port 554/tcp)
HOP RTT ADDRESS
1 8.41 ms gre92-1-xx-xx-xxx-xxx.fbx.proxad.net (82.xx.xxx.xxx)
Read data files from: /usr/local/share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.43 seconds
Raw packets sent: 2043 (91.626KB) | Rcvd: 28 (1.594KB)
Voilà alors est-ce possible de hacker mon propre reseau avec Zenmap ?
Merci de m'accorder un peu de votre temps
voila je veux essayer de "hacker" mon propre réseau (si vous me demandez pourquoi je ne saurais quoi vous répondre a part la curiosité) et pour cela j'utilise Zenmap. Alors voilà ce qu'il me dit après un scan :
Starting Nmap 5.51 ( https://nmap.org/ ) at 2011-05-10 20:05 CEST
NSE: Loaded 57 scripts for scanning.
Initiating Ping Scan at 20:05
Scanning 82.67.xxx.xxx [4 ports]
Completed Ping Scan at 20:05, 0.01s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 20:05
Completed Parallel DNS resolution of 1 host. at 20:05, 0.03s elapsed
Initiating SYN Stealth Scan at 20:05
Scanning gre92-1-xx-xx-xxx-xxx.fbx.proxad.net (82.xxx.xxx.xxx) [1000 ports]
Discovered open port 554/tcp on 82.xxx.xxx.xxx
Discovered open port 80/tcp on 82.xxx.xxx.xxx
Discovered open port 9100/tcp on 82.xxx.xxx.xxx
Completed SYN Stealth Scan at 20:05, 4.82s elapsed (1000 total ports)
Initiating Service scan at 20:05
Scanning 2 services on gre92-1-xx-xx-xxx-xxx.fbx.proxad.net (82.67.174.162)
Completed Service scan at 20:05, 6.02s elapsed (3 services on 1 host)
Initiating OS detection (try #1) against gre92-1-xx-xx-xxx-xxx.fbx.proxad.net (82.xx.xxx.xxx)
Initiating Traceroute at 20:05
Completed Traceroute at 20:05, 0.02s elapsed
NSE: Script scanning 82.xx.xxx.xxx.
Initiating NSE at 20:05
Completed NSE at 20:05, 0.04s elapsed
Nmap scan report for gre92-1-xx-xx-xxx-xxx.fbx.proxad.net (82.xx.xxx.xxx)
Host is up (0.0037s latency).
Not shown: 997 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http Cheyenne httpd 2.2.8
|_http-methods: No Allow or Public header in OPTIONS response (status code 501)
|_http-title: Site doesn't have a title (text/html).
554/tcp open rtsp Freebox rtspd 1.2
9100/tcp open jetdirect?
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 2.6.X
OS details: Linux 2.6.13 - 2.6.31, Linux 2.6.18
Uptime guess: 6.694 days (since Wed May 4 03:25:36 2011)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=195 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Host: localhost; Device: media device
TRACEROUTE (using port 554/tcp)
HOP RTT ADDRESS
1 8.41 ms gre92-1-xx-xx-xxx-xxx.fbx.proxad.net (82.xx.xxx.xxx)
Read data files from: /usr/local/share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.43 seconds
Raw packets sent: 2043 (91.626KB) | Rcvd: 28 (1.594KB)
Voilà alors est-ce possible de hacker mon propre reseau avec Zenmap ?
Merci de m'accorder un peu de votre temps
2 réponses
Nmap (Zenmap n'est qu'une interface graphique de Nmap) ne permet pas de hacker, ça sert à trouver des failles sur son installation pour pouvoir se protéger, ou au contraire, les utiliser pour attaquer.
Par exemple, en lisant le rapport de Nmap, on voit que tu as une serveur web et un serveur de flux, peut-être du streaming.
Par exemple, en lisant le rapport de Nmap, on voit que tu as une serveur web et un serveur de flux, peut-être du streaming.