º¸¾È ÄÁÅÙÃ÷
¸ðÀÇÇØÅ· ¹× Ãë¾àÁ¡ ºÐ¼® |
º¸¾È ¿î¿µ °ü¸® >> Ãë¾à¼º °ü¸® | |
ÀÛ¼ºÀÚ | À±¼Ò¿µ | ÀÛ¼ºÀÏÀÚ | 2009-12-24 | ||
Ãß Ãµ | Á¶È¸¼ö | 10539 | |||
Æ÷ÀÎÆ® | ¹«·á | ´Ù¿î·Îµå¼ö | 246 | ||
ÆÄ ÀÏ | a005.pdf | ||||
»ó¼¼¼³¸í |
1. UDP Scan Starting nmap V. 3.00 ( www.insecure.org/nmap ) Warning: OS detection will be MUCH less reliable because we did not find at least 1 open and 1 closed TCP port Interesting ports on (168.126. . ): (The 1462 ports scanned but not shown below are in state: closed) Port State Service 111/udp open sunrpc 137/udp filtered netbios-ns 138/udp open netbios-dgm 139/udp open netbios-ssn 666/udp open doom 1434/udp open ms-sql-m Remote OS guesses: Linux 2.3.49 x86, Linux 2.3.47 - 2.3.99-pre2 x86, Linux Kernel 2.4.0 - 2.5.20, Linux 2.4.16 - 2.4.18, Linux Kernel 2.4.0 - 2.5.20 w/o tcp_timestamps, Linux Kernel 2.4.3 SMP (RedHat) Nmap run completed 1 IP address (1 host up) scanned in 1518 seconds |