{"id":214,"date":"2013-07-09T20:53:00","date_gmt":"2013-07-09T20:53:00","guid":{"rendered":"http:\/\/145@jodohost.com\/\/blog\/"},"modified":"2013-07-09T20:53:00","modified_gmt":"2013-07-09T20:53:00","slug":"nmap-scanning-open-ports-and-finding-out-info-about-the-operating-system","status":"publish","type":"post","link":"http:\/\/www.jodohost.com\/blog\/index.php\/2013\/07\/09\/nmap-scanning-open-ports-and-finding-out-info-about-the-operating-system\/","title":{"rendered":"Nmap: Scanning open ports and finding out info about the operating system"},"content":{"rendered":"<p>Nmap (&#8220;Network Mapper&#8221;) is a utility for network discovery and security auditing. It is useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.<\/p>\n<p>Using Nmap you can check the ports and service which are open against that port and information about the operating system installed on the machine. Use the command below from the Linux machine to get such information about the target machine :- <\/p>\n<p>nmap -O hostname or IP address <\/p>\n<p>For Ex- <\/p>\n<p>nmap -O 173.0.142.41<\/p>\n<p>Starting Nmap 5.51 ( http:\/\/nmap.org ) at 2013-07-09 20:39 CDT<br \/>Nmap scan report for mail5.gohsphere.com (173.0.142.41)<br \/>Host is up (0.00042s latency).<br \/>Not shown: 990 filtered ports<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<br \/>PORT\u00a0\u00a0\u00a0 STATE\u00a0 SERVICE<br \/>25\/tcp\u00a0 open\u00a0\u00a0 smtp<br \/>80\/tcp\u00a0 open\u00a0\u00a0 http<br \/>110\/tcp open\u00a0\u00a0 pop3<br \/>143\/tcp open\u00a0\u00a0 imap<br \/>443\/tcp open\u00a0\u00a0 https<br \/>465\/tcp open\u00a0\u00a0 smtps<br \/>587\/tcp open\u00a0\u00a0 submission<br \/>873\/tcp closed rsync<br \/>993\/tcp open\u00a0\u00a0 imaps<br \/>995\/tcp open\u00a0\u00a0 pop3s<br \/>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>Device type: general purpose|WAP|firewall|broadband router|webcam<br \/>Running (JUST GUESSING): Linux 2.6.X|2.4.X (97%), Linksys Linux 2.4.X (97%), Asus Linux 2.6.X (93%), Check Point Linux 2.4.X (92%), Netgear embedded (89%), AXIS Linux 2.6.X (88%)<br \/>Aggressive OS guesses: Linux 2.6.9 &#8211; 2.6.21 (97%), OpenWrt White Russian 0.9 (Linux 2.4.30) (97%), OpenWrt 0.9 &#8211; 7.09 (Linux 2.4.30 &#8211; 2.4.34) (97%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (97%), Linux 2.6.24 (94%), Asus RT-N16 WAP (Linux 2.6) (93%), Linux 2.6.18 (93%), OpenWrt Kamikaze 7.09 (Linux 2.6.17 &#8211; 2.6.21) (93%), Check Point NGX R65 firewall (Linux 2.4.21) (92%), Linux 2.6.20.6 (92%)<br \/>No exact OS matches for host (test conditions non-ideal).<\/p>\n<p>OS detection performed. Please report any incorrect results at http:\/\/nmap.org\/submit\/ .<br \/>Nmap done: 1 IP address (1 host up) scanned in 7.93 seconds<\/p>\n<p>It really helps to know about the open ports of the server which you&#8217;re using or to know about the services you can use on that port and also about the OS installed on the target machine.<\/p>\n<p> ]]><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nmap (&#8220;Network Mapper&#8221;) is a utility for network discovery and security auditing. It is useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Using Nmap you can check the ports and service which are open against that port and information about the operating system installed on the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"http:\/\/www.jodohost.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/214"}],"collection":[{"href":"http:\/\/www.jodohost.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.jodohost.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.jodohost.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.jodohost.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=214"}],"version-history":[{"count":0,"href":"http:\/\/www.jodohost.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/214\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.jodohost.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.jodohost.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=214"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.jodohost.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}