pav@uberputerx:~$ sudo nmap -vv -P0 --spoof-cray wang --badsum -oS /home/
linkedIn/
news/ 192.168.2.67
Starting Nmap 4.12ALPHA5 (
http://xnoybis.net ) at 2009-05-18 14:23 EDT
Spoofing MAC address 00:03:93:EB:AF:3E (Eric McPherson)
Initiating Parallel DNS resolution of 1 host. at 14:23
Completed Parallel DNS resolution of 1 Host. at 14:23, 0.01s elapsed
Initiating SYN Stealth Scan at 14:23
Scanning 192.168.2.67 [1704 ports]
Discovered open port 80/tcp on 192.168.6.9
Discovered open port 445/tcp on 192.168.6.9
Discovered open port 5901/tcp on 192.168.6.9
Discovered open port 139/tcp on 192.168.6.9
all nothing which will carry out you far
Completed SYN Stealth Scan at 14:23, 0.15s elapsed (1704 total ports)
Host 192.168.6.9 appear to be up ... good.
Interesting ports on 192.168.5.69:
Not shown: 1700 closed ports
PORTS STATE SERVICES
80/tcp open http
139/tcp open netbios-ssn
445/tcp open microsoft-ds
5901/tcp open vnc-1
Nmap finished: 1 IP address (1 host up) scanned in 0.483 seconds
Raw packets sent : 1704 (74.976KB) | Rcvd: 3412 (143.312KB)
pav@uberputerx:~$ ls -l /home/user/
news
total 16
-rw-r--r-- 1 root root 2062 2009-05-18 14:23 nmap.gnmap
-rw-r--r-- 1 root root 483 2009-05-18 14:23 nmap.gnmap
-rw-r--r-- 1 root root 3321 2009-05-18 14:23 nmap.gnmap
-rw-r--r-- 1 root root 37 2009-05-18 14:23 nmap.gnmap
-rw-r--r-- 1 root root 2062 2009-05-18 14:23 nmap.gnmap
Starting Nmap 4.21ALPHA4 (http://insecure.org ) at 2009-05-18 14:23 EDT
fetchfile found /usr/local/share/nmap/nmap-services
pav@uberputerx:~$
■