Originally posted by: drag
Well normally you can't. You can run a port scan. This will reveal the services that are running on that computer. Lots of services are OS specific. Like if you have port 13 (used for daytime service.) open then they are probably running a Unix or Linux OS. If they have netbios stuff running then they are probably running Windows.
Also nicer port scanners run whats called "tcp fingerprinting" (I think that's what they are called). Different OSes run different tcp/ip stacks and these leave a veriaty of indicators in how the packets they produce are structured. As long as they stick to standards there is no problem with compatability, but there still is room for creativity.
So using these differences you can figure out to a sort-of level of what OS they are running. For instance one scan may say that it is using linux 2.2.4-2.4.12 or maybe Win95/98/NT 4.0. So you can get a so-so indication.
Also if they are running a ftp server, a web server, a e-mail or or anything you can access using a telnet client it will often just go and straight out tell you the OS and a bunch of other information.
Like this: http://forums.anandtech.com/adffasdfasdf
From that link to a default 404 page you can see that anandtech is using a microsoft server to run these forums. Of course If I was running a Apache webserver I could take a copy of the MS 404 webpage and use that to hide the indentity of my server. Lots of times people will replace these pages and ftp-style headers to hide information or simply to make it more pleasent or informational.
A good free software port scanner is nmap.
Becarefull when using it. It is considured very rude to port scan people. As is it is sometimes a prelude to a cracker attack. People keep track of logs and look for that sort of activity. If you make yourself a nusience then they will probably e-mail your ISP. Lots of times this sort of thing would violate your user agreements and get you kicked off your ISP.
Also it can be considured "hacker" behavior and is legally frowned apon. Which is silly because everytime you connect to a server you are doing a port scan. Of course the difference is that your only accessign 1 port instead of a few hundred key ports at a time.
So use common sense. It's like sneeking a peak thru someone's living room window.
Originally posted by: n0cmonkey
People pay attention to port scans?
Originally posted by: Ruckas
Yeah, I'm not trying to be l33t. I just want to impress someone that might give me a job..Heh...
So when you say "port scan," does that mean ping 'IP' in dos? I'm using a windows ME box, and a windows 2000 box.. Could you elaborate on port scanning? Thanks...
Originally posted by: drag
Originally posted by: n0cmonkey
People pay attention to port scans?
Sure. Firewalls can be set up to detect port scans. Repeated scans over and over again can cause them to alert.
Most firewalls can detect normal scans, most can't detect stuff like nmap's stealth scanning, but some can. I doubt there are many people that sit there and detect things normally, but plenty of firewalls can be configured to record alerts about stuff like that.
Annoy them enough and they'd probably fire off a e-mail to the originating ISP.
Also it is sometimes a nice things to do. If you can trace the originator of the port scan and figure out if it is a zombie machine or not. I've done that a couple times when I got bored. Looked thru my firewall logs and scanned some of the people that scanned me. If it looks like there was a trojan installed on it, then I'd sent out a e-mail to the abuse/admin type person as indicated in the whois look-ups. If I was a admin for a network I'd probably be a bit more pro-active about it, but right now it is just more of a occasional amusement. If one of my computers was hacked and was annoying people, I'd like to know about it.
I figure 95% of admins would be to lazy to double check things, but they should. Repeated port scanning can indicate that someone is purposly probing your network for vunerablities, probably be a good idea to block them. Of course they could just be curious to find out what services your offering to the internet, which is entertaining to visit places that aren't advertised on the web.
Originally posted by: drag
Oh sure you exactly right. Nobody will care about a couple port scans, but after 20-30 scans from the same person might start to annoy some people.![]()
Originally posted by: Ruckas
I get the sense you guys are avoiding the question. Or simply don't know... On the other hand, I could be totally wrong and I just made a complete ass of myself...
Using dos, can I 'port scan' my other computer that's on my network, and be able to figure out what OS it's using?!
Perhaps by a read out in dos or something? I guess when you say "have more specific questions" you asume I know more than I do.
Thanks, anyways...
Ruckas-
Originally posted by: Ruckas
I get the sense you guys are avoiding the question. Or simply don't know... On the other hand, I could be totally wrong and I just made a complete ass of myself...
Using dos, can I 'port scan' my other computer that's on my network, and be able to figure out what OS it's using?!
Perhaps by a read out in dos or something? I guess when you say "have more specific questions" you asume I know more than I do.
Thanks, anyways...
Ruckas-
Starting nmap 3.45 ( http://www.insecure.org/nmap/ ) at 2003-12-08 14:39 CET
Host litovel (x.x.x.x) appears to be up ... good.
Initiating SYN Stealth Scan against litovel (x.x.x.x) at 14:39
Adding open port 6000/tcp
Adding open port 21/tcp
Adding open port 22/tcp
Adding open port 1241/tcp
The SYN Stealth Scan took 1 second to scan 1657 ports.
For OSScan assuming that port 21 is open and port 1 is closed and neither are firewalled
Interesting ports on litovel (x.x.x.x):
(The 1653 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
1241/tcp open nessus
6000/tcp open X11
Device type: general purpose
Running: Linux 2.4.X|2.5.X
OS details: Linux Kernel 2.4.0 - 2.5.20, Linux 2.5.25 - 2.5.70 or Gentoo 1.2 Linux 2.4.19 rc1-rc7)
OS Fingerprint:
TSeq(Class=RI%gcd=1%SI=2CCAD1%IPID=Z)
T1(Resp=Y%DF=Y%W=7FFF%ACK=S++%Flags=AS%Ops=MNNTNW)
T2(Resp=N)
T3(Resp=Y%DF=Y%W=7FFF%ACK=S++%Flags=AS%Ops=MNNTNW)
T4(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=)
T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=)
T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=)
T7(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=)
PU(Resp=Y%DF=N%TOS=C0%IPLEN=164%RIPTL=148%RID=E%RIPCK=E%UCK=E%ULEN=134%DAT=E)
TCP Sequence Prediction: Class=random positive increments
Difficulty=2935505 (Good luck!)
TCP ISN Seq. Numbers: 14972658 14BF8D59 148F182F 150B884A 1497535C 14A131F7
IPID Sequence Generation: All zeros
Nmap run completed -- 1 IP address (1 host up) scanned in 5.865 seconds