pav@uberputerx:~$ sudo nmap -vv -P0 --spoof-cray wang --badsum -oS /home/linkedIn/news/ 192.168.2.67

Starting Nmap 4.12ALPHA5 ( http://xnoybis.net ) at 2009-05-18 14:23 EDT
Spoofing MAC address 00:03:93:EB:AF:3E (Eric McPherson)
Initiating Parallel DNS resolution of 1 host. at 14:23
Completed Parallel DNS resolution of 1 Host. at 14:23, 0.01s elapsed
Initiating SYN Stealth Scan at 14:23
Scanning 192.168.2.67 [1704 ports]
Discovered open port 80/tcp on 192.168.6.9
Discovered open port 445/tcp on 192.168.6.9
Discovered open port 5901/tcp on 192.168.6.9
Discovered open port 139/tcp on 192.168.6.9
all nothing which will carry out you far
Completed SYN Stealth Scan at 14:23, 0.15s elapsed (1704 total ports)
Host 192.168.6.9 appear to be up ... good.
Interesting ports on 192.168.5.69:
Not shown: 1700 closed ports
PORTS    STATE  SERVICES
80/tcp   open   http
139/tcp  open   netbios-ssn
445/tcp  open   microsoft-ds
5901/tcp open   vnc-1

Nmap finished: 1 IP address (1 host up) scanned in 0.483 seconds
     Raw packets sent : 1704 (74.976KB) | Rcvd: 3412 (143.312KB)
pav@uberputerx:~$ ls -l /home/user/news
total 16
-rw-r--r-- 1 root root 2062 2009-05-18 14:23 nmap.gnmap
-rw-r--r-- 1 root root  483 2009-05-18 14:23 nmap.gnmap
-rw-r--r-- 1 root root 3321 2009-05-18 14:23 nmap.gnmap
-rw-r--r-- 1 root root   37 2009-05-18 14:23 nmap.gnmap
-rw-r--r-- 1 root root 2062 2009-05-18 14:23 nmap.gnmap

Starting Nmap 4.21ALPHA4 (http://insecure.org ) at 2009-05-18 14:23 EDT
fetchfile found /usr/local/share/nmap/nmap-services

pav@uberputerx:~$