Raw packets sent: 1110 (52.890KB) | Rcvd: 2212 nmap -sV -v -A localhostĬompleted SYN Stealth Scan at 15:49, 0.14s elapsed (1000 total ports)Ĭompleted Service scan at 15:49, 6.03s elapsed (2 services on 1 host) Nmap done: 1 IP address (1 host up) scanned in 28.03 seconds Read data files from: /usr/bin/./share/nmap Service Info: OS: Linux CPE: cpe:/o:linux:kernel TCP Sequence Prediction: Difficulty=258 (Good luck!) No exact OS matches for host (If you know what OS is running on it, see ). |_http-title: Site doesn’t have a title (text/html). Nmap scan report for localhost (127.0.0.1)Ģ2/tcp open ssh OpenSSH 6.0p1 Debian 4+deb7u1 (protocol 2.0) Retrying OS detection (try #5) against localhost (127.0.0.1) Retrying OS detection (try #4) against localhost (127.0.0.1) Retrying OS detection (try #3) against localhost (127.0.0.1) Retrying OS detection (try #2) against localhost (127.0.0.1) Initiating OS detection (try #1) against localhost (127.0.0.1) Scanning 2 services on localhost (127.0.0.1)Ĭompleted Service scan at 15:42, 6.04s elapsed (2 services on 1 host) Scanning localhost (127.0.0.1) Ĭompleted SYN Stealth Scan at 15:42, 0.14s elapsed (1000 total ports) Linux arm 3.8.13-bone56 #1 SMP Wed Jun 4 23:59: armv7l lsb_release -aĭescription: Debian GNU/Linux 7.5 (wheezy) This is what an NMAP port scan of a BeagleBone Black Rev C running Debian 7 Linux looks apt-get -y updateįetched 725 kB in 4s (173 apt-get -y install nmap
0 Comments
Leave a Reply. |