On Sunday 15 August 2004 12:01 pm, Kastus wrote:
On Sun, Aug 15, 2004 at 01:45:37AM -0700, David Uvalle wrote:
Im trying to run nmap as root to use some features i need but it doesnt scan anything, as user it scan normally
am on suse 9.1, with kernel 2.6.5-7.104-default have all the patches from Yast/Online Update until today, maybe the last kernel upgrade broke something i dont know
It works here just fine:
sudo nmap -v -O localhost Password:
if you scan localhost it runs well but try an external host $ sudo nmap -v -O www.cofradia.org Starting nmap 3.50 ( http://www.insecure.org/nmap/ ) at 2004-08-15 14:10 PDT Host 69.93.121.179 appears to be down, skipping it. Note: Host seems down. If it is really up, but blocking our ping probes, try -P0 Nmap run completed -- 1 IP address (0 hosts up) scanned in 12.118 seconds now trying to scan localhost: $ sudo nmap -v localhost Starting nmap 3.50 ( http://www.insecure.org/nmap/ ) at 2004-08-15 14:13 PDT Host localhost (127.0.0.1) appears to be up ... good. Initiating SYN Stealth Scan against localhost (127.0.0.1) at 14:13 Adding open port 22/tcp Adding open port 80/tcp The SYN Stealth Scan took 0 seconds to scan 1659 ports. Interesting ports on localhost (127.0.0.1): (The 1657 ports scanned but not shown below are in state: closed) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http Nmap run completed -- 1 IP address (1 host up) scanned in 1.027 seconds
Starting nmap 3.50 ( http://www.insecure.org/nmap/ ) at 2004-08-15 11:57 PDT Host localhost (127.0.0.1) appears to be up ... good. Initiating SYN Stealth Scan against localhost (127.0.0.1) at 11:57 Adding open port 22/tcp Adding open port 25/tcp Adding open port 80/tcp Adding open port 631/tcp Adding open port 111/tcp The SYN Stealth Scan took 0 seconds to scan 1659 ports. For OSScan assuming that port 22 is open and port 1 is closed and neither are firewalled Interesting ports on localhost (127.0.0.1): (The 1654 ports scanned but not shown below are in state: closed) PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 80/tcp open http 111/tcp open rpcbind 631/tcp open ipp Device type: general purpose Running: Linux 2.4.X|2.5.X OS details: Linux 2.5.25 - 2.5.70 or Gentoo 1.2 Linux 2.4.19 rc1-rc7) Uptime 3.583 days (since Wed Aug 11 21:58:45 2004) TCP Sequence Prediction: Class=random positive increments Difficulty=3378748 (Good luck!) IPID Sequence Generation: All zeros
Nmap run completed -- 1 IP address (1 host up) scanned in 5.717 seconds
kernel 2.6.5-7.104-default, nmap-3.50-71
Regards, -Kastus
-- */*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/* David Uvalle Zepeda Chief Security Officer. Radikal Systems S.A de C.V. http://www.radikalsystems.com