Starting Nmap 5.51 ( http://nmap.org ) at 2011-08-26 10:13 Уральское время (зима) NSE: Loaded 57 scripts for scanning. Initiating Ping Scan at 10:13 Scanning 192.168.88.136 [4 ports] Completed Ping Scan at 10:13, 0.19s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 10:13 Completed Parallel DNS resolution of 1 host. at 10:13, 0.22s elapsed Initiating SYN Stealth Scan at 10:13 Scanning 192.168.88.136 [65535 ports] Discovered open port 23/tcp on 192.168.88.136 Discovered open port 53/tcp on 192.168.88.136 Discovered open port 80/tcp on 192.168.88.136 SYN Stealth Scan Timing: About 28.91% done; ETC: 10:14 (0:01:16 remaining) Discovered open port 12667/tcp on 192.168.88.136 Discovered open port 8081/tcp on 192.168.88.136 SYN Stealth Scan Timing: About 39.72% done; ETC: 10:15 (0:01:33 remaining) Increasing send delay for 192.168.88.136 from 0 to 5 due to max_successful_tryno increase to 5 Increasing send delay for 192.168.88.136 from 5 to 10 due to max_successful_tryno increase to 6 Warning: 192.168.88.136 giving up on port because retransmission cap hit (6). SYN Stealth Scan Timing: About 58.75% done; ETC: 10:17 (0:01:48 remaining) SYN Stealth Scan Timing: About 72.33% done; ETC: 10:19 (0:01:41 remaining) SYN Stealth Scan Timing: About 80.04% done; ETC: 10:19 (0:01:22 remaining) Discovered open port 49152/tcp on 192.168.88.136 SYN Stealth Scan Timing: About 86.29% done; ETC: 10:20 (0:01:00 remaining) SYN Stealth Scan Timing: About 92.12% done; ETC: 10:20 (0:00:37 remaining) Completed SYN Stealth Scan at 10:21, 491.54s elapsed (65535 total ports) Initiating Service scan at 10:21 Scanning 6 services on 192.168.88.136 Completed Service scan at 10:23, 121.18s elapsed (6 services on 1 host) Initiating OS detection (try #1) against 192.168.88.136 Initiating Traceroute at 10:23 Completed Traceroute at 10:23, 0.02s elapsed Initiating Parallel DNS resolution of 1 host. at 10:23 Completed Parallel DNS resolution of 1 host. at 10:23, 0.12s elapsed NSE: Script scanning 192.168.88.136. Initiating NSE at 10:23 Completed NSE at 10:23, 30.01s elapsed Nmap scan report for 192.168.88.136 Host is up (0.0062s latency). Not shown: 65206 closed ports, 323 filtered ports PORT STATE SERVICE VERSION 23/tcp open telnet D-Link 524 or WBR-1310 WAP telnetd 53/tcp open domain ISC BIND 9.3.4-P1.2 80/tcp open http Mathopd httpd 1.5p6 |_http-methods: No Allow or Public header in OPTIONS response (status code 501) |_http-title: D-LINK | \xD0\x91\xD0\x95\xD0\xA1\xD0\x9F\xD0\xA0\xD0\x9E\xD0\x92\xD0\x9E\xD0\x94\xD0\x9D\xD0\x9E\xD0\x99 \xD0\x9C\xD0\x90\xD0\xA0\xD0\xA8\xD0\xA0\xD0\xA3\xD0\xA2\xD0\x98\xD0\x97\xD0\x90\xD0\xA2\xD0\x9E\xD0\xA0 |... 8081/tcp open blackice-icecap? 12667/tcp open unknown 49152/tcp open upnp D-Link DIR-300 WAP UPnP 1.05 (UPnP 1.0) 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port8081-TCP:V=5.51%I=7%D=8/26%Time=4E571F44%P=i686-pc-windows-windows% SF:r(GetRequest,385,"HTTP/1\.1\x20407\x20Proxy\x20Authentication\x20Requir SF:ed\x20\(HC\)\r\nServer:\x20HandyCache/1\.00\x20RC3\x20\(1\.0\.0\.303\)\ SF:r\nMime-Version:\x201\.0\r\nDate:\x20Fri,\x2026\x20Aug\x202011\x2010:21 SF::24\r\nContent-Type:\x20text/html\r\nContent-Length:\x20646\r\nProxy-Au SF:thenticate:\x20Basic\x20realm=\"HandyCache\"\r\nConnection:\x20close\r\ SF:n\r\n\r\n\r\nERROR:\x20Access\x20denied\.</TITL SF:E>\r\n<STYLE\x20type=\"text/css\"><!--BODY{background-color:#ffffff;fon SF:t-family:verdana,sans-serif}PRE{font-family:sans-serif}--></STYLE>\r\n< SF:/HEAD>\r\n<BODY>\r\n<H1>ERROR</H1>\r\n<H2>Access\x20denied</H2>\r\n<HR\ SF:x20noshade\x20size=\"1px\">\r\n<P>Excuse\x20me,\x20Proxy\x20Authenticat SF:ion\x20Required\.\r\n</P>\r\n<BR\x20clear=\"all\">\r\n<HR\x20noshade\x2 SF:0size=\"1px\">\r\n<ADDRESS>\r\nGenerated\x20Fri,\x2026\x20Aug\x202011\x SF:2010:21:24\x20by\x20HandyCache\x201\.00\x20RC3\x20\(1\.0\.0\.303\)\r\n< SF:/ADDRESS>\r\n</BODY></HTML>\r")%r(FourOhFourRequest,385,"HTTP/1\.1\x204 SF:07\x20Proxy\x20Authentication\x20Required\x20\(HC\)\r\nServer:\x20Handy SF:Cache/1\.00\x20RC3\x20\(1\.0\.0\.303\)\r\nMime-Version:\x201\.0\r\nDate SF::\x20Fri,\x2026\x20Aug\x202011\x2010:21:24\r\nContent-Type:\x20text/htm SF:l\r\nContent-Length:\x20646\r\nProxy-Authenticate:\x20Basic\x20realm=\" SF:HandyCache\"\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC SF:\x20\"-//W3C//DTD\x20HTML\x204\.01\x20Transitional//EN\"\x20\"http://ww SF:w\.w3\.org/TR/html4/loose\.dtd\">\r\n<HTML><HEAD><META\x20HTTP-EQUIV=\" SF:Content-Type\"\x20CONTENT=\"text/html;\x20charset=windows-1251\">\r\n<T SF:ITLE>ERROR:\x20Access\x20denied\.\r\n\r\n\r\n\r\n

ERROR\r\n

Access\x20denied

\r\n\r\n< SF:P>Excuse\x20me,\x20Proxy\x20Authentication\x20Required\.\r\n

\r\n
\r\n\r\n
\r\nG SF:enerated\x20Fri,\x2026\x20Aug\x202011\x2010:21:24\x20by\x20HandyCache\x SF:201\.00\x20RC3\x20\(1\.0\.0\.303\)\r\n
\r\n\r"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port12667-TCP:V=5.51%I=7%D=8/26%Time=4E571F79%P=i686-pc-windows-windows SF:%r(SMBProgNeg,119,"\xeb-QU\x8c\x82\xb9\xa8W`\x1b\x90w#\x13\"\x06>\xeef\ SF:xc6%\x96\xbd\xd8,\xbc\xe6\xc3\xbf\x8cL\x9c\x8e\x97\xb0\x9eM\x9b\xf8\xda SF:H@\xe5Y\x99\x0c\x0c&\x8f\xdcv\x04\"\xacZ\xe7\x83\^\xcd\t\)\x85~I\x13\x1 SF:5wn\x80\x0b\x8c\x86\nnk\xf8\xda7_\(\xcb\xa8\xfd\x85h:k\0\xeb\x06\x14u\x SF:d7\xd7\x89/C\x8e\x17%\0\xd5\xd5\xe5\xf3\xebg\(\xe7\xa1\xf5x\xf20\x10OW\ SF:xa1\xdfGp3\x82\xae-\x11v\xab\x98\xecO;\xaf\xef\xa2\xcbY\xc9\x05\x08\t\x SF:d8O\xb5\xfa\x87Z\xb3\"\xfc\xf5\xd3\xfc\xbf\xd9\xfa\x15a\x9e\xb0c\x15\x1 SF:b\x90U\x03\x1a\xffx0\xf9\xf7\xe4\xee\x97\xa2\]m\x9c\xa4\xe2\xea\xda\xe7 SF:\xa9\x8a=\xe1\xa0\x8db\xc0\x90L9\xed\x15\x80c\xb5\x830's\xc40\xc6\xdf5} SF:\x8e\x0c\xa4\xa5\x8a\xc6Qv;DOT\x1e\xf6TA\xbf\x20\xd7\xa1K~2\(n\xdb\(\x9 SF:3\xae\x19>\xbd\]\xc0\x07\xfav\x82\t\xce\x01\"\xc0>\xbd\x1d\xa8\\z\xd5=\ SF:xd0&\x20\xb5\xdd{\x96z\$o#\xf3\x1f\x8e\xd6\xdf\xba\$\x0b")%r(FourOhFour SF:Request,6C,"HTTP/1\.1\x20400\x20ERROR\r\nConnection:\x20keep-alive\r\nC SF:ontent-Length:\x2017\r\nContent-Type:\x20text/html\r\n\r\n\r\ninvalid\x SF:20request")%r(SIPOptions,108,"\xdd5\x01\xbe\xc7\$\x03\xdd\[\xfa\xb70\xd SF:c\xb6\x04\xbb\x810\xbfz\xbc\t\xb10\xf3\x07wX\xee\xb14dm\^si\xc6Cd\xec\x SF:f7\xbf4\xa3\x10\x06\xf0\xe8\xe8\":\*r\x03\xeb\xb3\x1c\x9ai\xfan\xbe\xcb SF:\x8bX\xc5\x19\xfa\0\xc4\x1b\xe0S-\xb1\x1b\xed\xa0\r\x91&\x97\xac\xfd\xc SF:bt\xde%\xaf\xf6\x82\x8b\xd2\xaea\x98H\xee\x07\xe1G\xe2lXDG\xd8\x99\xb3\ SF:xe3\x14\x0b\xdc\x1c\x1d,v\xed\xcb\xf20\xa5\^\xf8\x0b\x02\xb63B\x91L\xe2 SF:\xdb\xe8\x83G\x8f\xb5\n\x90\xe6\x8e\xdb\xa0\xf7\x0bn9\n\xa3\x92\?=DO\x8 SF:5\x0bL\xe1\xf9\xb8\xfd\xf2\xb8\xcc\xe2\x8a\x7f>\$\xe2\xe70\xdb\xd2'\xf4 SF:XF\xb7Q\x9aJj\xf5E\x1a\x84\xd0\?\xcc4\x93\xaa\x0e\x7f\x01\$\xf2g\xeb\x0 SF:8#KBU\0\xba\[!}\xf7\x85\xa2\xe6\x0b\xa2\x0b\xd9\|\x86\xe1,\x15\xdb\x87\ SF:x8fGS\xce\.\x90'QJ\x84\xb2!#_\x03\xbcj>g\xfej\x04<\xad;\]\x12\x07EYQ\x9 SF:3P\xaf\x86\x8a>s")%r(WMSRequest,AE,"B\xc3`\x0bu\xfa\xd2\xd2\x11\xb5y\xb SF:6\(\xa7e\)\xed\xba\x8e\xca\x80\x05E4%k\xcb\x87\xcc5\xb8;;2H\xb8\xdeW\xc SF:9\[l\x01\xc5\xbf\x86\xfd\xe5\xe3\xe6o{l&DOCI\xa9\xdel1\xedK\xe3mq\x0c\x SF:afP\xb3\?\)\x99\x9ew\xf4\|-k\(\x94\x9e_\x84\xda\x10K1\x8b%\xbb\xcf\xb5\ SF:xa4~\xe0\xb6\xe4\$\x0e\xfc\xa8\xc6\xe2\x03\x0e\x93\xa8c7\x1c\xd9\xc7\xb SF:3\xe3\]\?\xd4\xc70\xf8\xf4\xa1\xcb\xf5\xdax{\x88\xca\\\x06\x19\x04\xbe\ SF:xef\x85\x82Q\x9e\?_\xc4C\xb2\\jU\xa7\xb1p\x1e\xd8\x93\xfa\xb4\)\xad\x82 SF:3\x980\xba\x06Y52\x05\xc8\x81\xd4Q\x01\x15"); Device type: general purpose Running: Linux 2.4.X OS details: Linux 2.4.18 - 2.4.35 (likely embedded) Uptime guess: 0.048 days (since Fri Aug 26 09:14:17 2011) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=198 (Good luck!) IP ID Sequence Generation: All zeros Service Info: OSs: Unix, Linux; Device: WAP TRACEROUTE (using port 135/tcp) HOP RTT ADDRESS 1 9.00 ms 192.168.88.136 Read data files from: C:\Program Files (x86)\Nmap OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 646.36 seconds Raw packets sent: 67936 (2.990MB) | Rcvd: 66687 (2.711MB)