Parameter

Dishnetwork “Joey” Nmap Scan

tarting Nmap 6.40 ( http://nmap.org ) at 2014-02-15 09:02 Central Standard Time
NSE: Loaded 110 scripts for scanning.
NSE: Script Pre-scanning.
Initiating ARP Ping Scan at 09:02
Scanning 192.168.255.249 [1 port]
Completed ARP Ping Scan at 09:02, 0.33s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 09:02
Completed Parallel DNS resolution of 1 host. at 09:03, 16.50s elapsed
Initiating SYN Stealth Scan at 09:03
Scanning 192.168.255.249 [1000 ports]
Discovered open port 53/tcp on 192.168.255.249
Discovered open port 8008/tcp on 192.168.255.249
Discovered open port 8009/tcp on 192.168.255.249
Completed SYN Stealth Scan at 09:03, 1.57s elapsed (1000 total ports)
Initiating Service scan at 09:03
Scanning 3 services on 192.168.255.249
Completed Service scan at 09:03, 32.29s elapsed (3 services on 1 host)
Initiating OS detection (try #1) against 192.168.255.249
NSE: Script scanning 192.168.255.249.
Initiating NSE at 09:03
Completed NSE at 09:03, 6.72s elapsed
Nmap scan report for 192.168.255.249
Host is up (0.0020s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
53/tcp open domain dnsmasq 2.51
| dns-nsid:
|_ bind.version: dnsmasq-2.51
8008/tcp open http Web-Based Enterprise Management CIM serverOpenPegasus WBEM httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 404)
|_http-title: Site doesn’t have a title (text/html).
8009/tcp open ssl/ajp13?
|_ajp-methods: Failed to get a valid response for the OPTION request
MAC Address: FA:8F:CA:8B:DB:69 (Unknown)
Device type: general purpose
Running: Linux 2.6.X|3.X
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
OS details: Linux 2.6.32 – 3.9
Uptime guess: 0.245 days (since Sat Feb 15 03:10:45 2014)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=261 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE
HOP RTT ADDRESS
1 2.01 ms 192.168.255.249

NSE: Script Post-scanning.
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 64.97 seconds
Raw packets sent: 1023 (45.806KB) | Rcvd: 1017 (41.370KB)