Valaki nmap-olná az android-os telóját?

 ( gbor | 2011. március 15., kedd - 13:00 )

Ha lehet, valaki egy nem rootolt [és friss verziójú] android-al csatlakozna pl.: mobilneten a 'zinternethez, utána a saját linuxos gépén remove-olná ideiglenesen az összes tűzfal szabályát, majd egy:

http://checkip.dyndns.org/

nmap -A -v -T5 -p 1-65535 ANDROIDOSTELOIPCIME

-kimenetet be tudna copyzni http://paste.ubuntu.com/ v. http://pastebin.mozilla.org/-re, v. ide cenzúrázva [mac címek]?

Megköszönném! [tudom sokáig futhat az nmap:\ ]

Ha mégis rootolt, azt esetleg odaírná?

Köszi!!

Indok: megtudni, h. mégis mi az elgondolása az Android készítőinek, KISS, v. nem :)

Hozzászólás megjelenítési lehetőségek

A választott hozzászólás megjelenítési mód a „Beállítás” gombbal rögzíthető.

Hello,
van egy root-olt ZTE tabletem, szerintem nem friss az andorid, de nem vagyok benne igazán otthon... viszont tudom az otthoni wifire csatlakoztatni és onnan nmap-olni... ha ez így jó neked bármire... csak szólj.

ha nagyon akarom a root-ot vissza csinálja a root-olós progi... :)

persze! köszi!!! majd ha lesz szabadidőd :)

bocsi, tegnap elmaradt, ma feltétlen megnézem. (ráírtam a notira postittel :D)

Semmi használhatót nem látok rajta...
Valamit rosszul csinálok ?

Android 2.1-update1
kernel: 2.6.29 zte-kernel@Zdroid-SMT
Rootolás nélkül.


[0|0] marczis@sonya:~$ nmap -A -v -T5 -p 1-65535 10.10.10.52

Starting Nmap 5.21 ( http://nmap.org ) at 2011-03-16 20:52 EET
NSE: Loaded 36 scripts for scanning.
Initiating Ping Scan at 20:52
Scanning 10.10.10.52 [2 ports]
Completed Ping Scan at 20:52, 0.16s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 20:52
Completed Parallel DNS resolution of 1 host. at 20:52, 0.05s elapsed
Initiating Connect Scan at 20:52
Scanning 10.10.10.52 [65535 ports]
Warning: 10.10.10.52 giving up on port because retransmission cap hit (2).
Connect Scan Timing: About 33.36% done; ETC: 20:54 (0:01:02 remaining)
Completed Connect Scan at 20:54, 84.02s elapsed (65535 total ports)
Initiating Service scan at 20:54
NSE: Script scanning 10.10.10.52.
NSE: Script Scanning completed.
Nmap scan report for 10.10.10.52
Host is up (0.025s latency).
All 65535 scanned ports on 10.10.10.52 are closed (58390) or filtered (7145)

Read data files from: /usr/share/nmap
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 84.43 seconds

ha az nmap-ot felhasználva kell válaszolni, akkor:

az a jó, h. nem hagynak rajta 1000 féle nyitot portot, ha egyszer nem kell, KISS.

másrészről nem lehetett megmondani, h. milyen oprendszer van az ip mögött

And root-tal...


[0|0] marczis@sonya:~$ nmap -A -v -T5 -p 1-65535 10.10.10.52

Starting Nmap 5.21 ( http://nmap.org ) at 2011-03-16 21:03 EET
NSE: Loaded 36 scripts for scanning.
Initiating Ping Scan at 21:03
Scanning 10.10.10.52 [2 ports]
Completed Ping Scan at 21:03, 0.04s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 21:03
Completed Parallel DNS resolution of 1 host. at 21:03, 0.08s elapsed
Initiating Connect Scan at 21:03
Scanning 10.10.10.52 [65535 ports]
Warning: 10.10.10.52 giving up on port because retransmission cap hit (2).
Connect Scan Timing: About 38.77% done; ETC: 21:04 (0:00:49 remaining)
Completed Connect Scan at 21:04, 89.62s elapsed (65535 total ports)
Initiating Service scan at 21:04
NSE: Script scanning 10.10.10.52.
NSE: Script Scanning completed.
Nmap scan report for 10.10.10.52
Host is up (0.031s latency).
All 65535 scanned ports on 10.10.10.52 are closed (56297) or filtered (9238)

Read data files from: /usr/share/nmap
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 89.90 seconds

Bocs, most néztem meg megint... én wifin csináltam ezt... szóval a konfig, itthoni hálóra wifivel fel és másik ugyan csak ebbe a hálóba lévő gépről ment az nmap... nincs mobil net előfizum :)

Rootolt ZTE blade, android 2.1-el:

Starting Nmap 5.21 ( http://nmap.org ) at 2011-03-15 12:15 CET
NSE: Loaded 36 scripts for scanning.
Initiating ARP Ping Scan at 12:16
Scanning 192.168.1.100 [1 port]
Completed ARP Ping Scan at 12:16, 0.05s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 12:16
Completed Parallel DNS resolution of 1 host. at 12:16, 0.03s elapsed
Initiating SYN Stealth Scan at 12:16
Scanning 192.168.1.100 [65535 ports]
Warning: 192.168.1.100 giving up on port because retransmission cap hit (2).
SYN Stealth Scan Timing: About 16.39% done; ETC: 12:19 (0:02:38 remaining)
SYN Stealth Scan Timing: About 36.58% done; ETC: 12:19 (0:02:12 remaining)
SYN Stealth Scan Timing: About 40.82% done; ETC: 12:20 (0:02:34 remaining)
SYN Stealth Scan Timing: About 40.92% done; ETC: 12:21 (0:03:16 remaining)
SYN Stealth Scan Timing: About 54.48% done; ETC: 12:21 (0:02:19 remaining)
SYN Stealth Scan Timing: About 71.67% done; ETC: 12:20 (0:01:17 remaining)
SYN Stealth Scan Timing: About 80.44% done; ETC: 12:20 (0:00:56 remaining)
Completed SYN Stealth Scan at 12:20, 292.35s elapsed (65535 total ports)
Initiating Service scan at 12:20
Initiating OS detection (try #1) against 192.168.1.100
NSE: Script scanning 192.168.1.100.
NSE: Script Scanning completed.
Nmap scan report for 192.168.1.100
Host is up (0.091s latency).
All 65535 scanned ports on 192.168.1.100 are closed (62475) or filtered (3060)
MAC Address: A0:0B:BA:12:EC:83 (Unknown)
Device type: general purpose|broadband router|remote management|bridge|WAP
Running: FreeBSD 8.X, GlobespanVirata embedded, Huawei embedded, Solwise embedded, HP iLO, Linksys embedded, Linux 2.4.X|2.6.X, Microsoft Windows XP
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop

HOP RTT ADDRESS
1 91.15 ms 192.168.1.100

Read data files from: /usr/share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 296.17 seconds
Raw packets sent: 74676 (3.288MB) | Rcvd: 65625 (2.625MB)

Moto Milestone 2.1, nincs rootolva: http://pastebin.com/iw0sVVu8
Ugyanaz már 2.2-essel: http://pastebin.com/qUdwzJQ4

Sony Ericsson X10 Mini Pro (Android 2.1, nincs rootolva)


Starting Nmap 5.00 ( http://nmap.org ) at 2011-03-15 13:40 CET
NSE: Loaded 30 scripts for scanning.
Initiating ARP Ping Scan at 13:40
Scanning 192.168.0.149 [1 port]
Completed ARP Ping Scan at 13:40, 0.19s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 13:40
Completed Parallel DNS resolution of 1 host. at 13:40, 0.15s elapsed
Initiating SYN Stealth Scan at 13:40
Scanning 192.168.0.149 [65535 ports]
Warning: Giving up on port early because retransmission cap hit.
SYN Stealth Scan Timing: About 26.97% done; ETC: 13:42 (0:01:24 remaining)
SYN Stealth Scan Timing: About 51.31% done; ETC: 13:42 (0:00:58 remaining)
SYN Stealth Scan Timing: About 71.23% done; ETC: 13:42 (0:00:37 remaining)
Completed SYN Stealth Scan at 13:42, 143.70s elapsed (65535 total ports)
Initiating Service scan at 13:42
Initiating OS detection (try #1) against 192.168.0.149
Retrying OS detection (try #2) against 192.168.0.149
NSE: Script scanning 192.168.0.149.
NSE: Script Scanning completed.
Host 192.168.0.149 is up (0.059s latency).
All 65535 scanned ports on 192.168.0.149 are closed
MAC Address: B8:F9:34:18:63:BE (Unknown)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop

Read data files from: /usr/share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 149.20 seconds
Raw packets sent: 67590 (2.975MB) | Rcvd: 67232 (2.690MB)

security rulez

--------------------------------------------------------------------------
színes

Hali,

ilyen tesztelésre én inkább a wifi-t javaslom.
A mobilneten megfoghatnak portokat (akár egy nmapot, mint portsan kisérlet..) a netszolgáltató gépei is..
Szóval az a tuti, hogy nincs senki a gép és az android között (csak a wifi..)

Starting Nmap 5.21 ( http://nmap.org ) at 2011-03-17 10:10 CET
NSE: Loaded 36 scripts for scanning.
Initiating Ping Scan at 10:10
Scanning 192.168.2.199 [4 ports]
Completed Ping Scan at 10:10, 0.08s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 10:10
Completed Parallel DNS resolution of 1 host. at 10:10, 0.00s elapsed
Initiating SYN Stealth Scan at 10:10
Scanning 192.168.2.199 [65535 ports]
Discovered open port 21/tcp on 192.168.2.199
Warning: 192.168.2.199 giving up on port because retransmission cap hit (2).
Increasing send delay for 192.168.2.199 from 0 to 5 due to 301 out of 752 dropped probes since last increase.
SYN Stealth Scan Timing: About 3.97% done; ETC: 10:23 (0:12:31 remaining)
SYN Stealth Scan Timing: About 12.21% done; ETC: 10:18 (0:07:19 remaining)
SYN Stealth Scan Timing: About 20.16% done; ETC: 10:17 (0:06:00 remaining)
SYN Stealth Scan Timing: About 27.99% done; ETC: 10:17 (0:05:11 remaining)
SYN Stealth Scan Timing: About 35.70% done; ETC: 10:17 (0:04:32 remaining)
SYN Stealth Scan Timing: About 43.67% done; ETC: 10:17 (0:03:53 remaining)
SYN Stealth Scan Timing: About 51.34% done; ETC: 10:17 (0:03:20 remaining)
SYN Stealth Scan Timing: About 59.16% done; ETC: 10:17 (0:02:46 remaining)
SYN Stealth Scan Timing: About 66.93% done; ETC: 10:17 (0:02:14 remaining)
SYN Stealth Scan Timing: About 74.88% done; ETC: 10:17 (0:01:41 remaining)
SYN Stealth Scan Timing: About 82.63% done; ETC: 10:17 (0:01:10 remaining)
SYN Stealth Scan Timing: About 90.39% done; ETC: 10:17 (0:00:38 remaining)
Completed SYN Stealth Scan at 10:17, 401.71s elapsed (65535 total ports)
Initiating Service scan at 10:17
Scanning 1 service on 192.168.2.199
Completed Service scan at 10:17, 0.05s elapsed (1 service on 1 host)
Initiating OS detection (try #1) against 192.168.2.199
Retrying OS detection (try #2) against 192.168.2.199
Initiating Traceroute at 10:17
Completed Traceroute at 10:17, 0.06s elapsed
Initiating Parallel DNS resolution of 2 hosts. at 10:17
Completed Parallel DNS resolution of 2 hosts. at 10:17, 0.00s elapsed
NSE: Script scanning 192.168.2.199.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 10:17
Completed NSE at 10:17, 0.01s elapsed
NSE: Script Scanning completed.
Nmap scan report for 192.168.2.199
Host is up (0.034s latency).
Not shown: 60340 closed ports, 5194 filtered ports
PORT   STATE SERVICE    VERSION
21/tcp open  tcpwrapped
Device type: WAP|general purpose|webcam|firewall|router
Running (JUST GUESSING) : Linux 2.6.X|2.4.X (93%), Linksys Linux 2.4.X (92%), NetBSD 4.X (87%), AXIS Linux 2.6.X (86%), Secure Computing Linux 2.4.X (86%), MikroTik RouterOS 3.X (86%)
Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (93%), OpenWrt White Russian 0.9 (Linux 2.4.30) (92%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (92%), Linux 2.6.22 (90%), Linux 2.6.17 - 2.6.26 (89%), Linux 2.6.20 - 2.6.25 (89%), Linux 2.6.25 (89%), Linux 2.6.18 - 2.6.24 (87%), Linux 2.6.22 (Fedora 7) (87%), Linux 2.6.22 (Ubuntu 7.04, x86, SMP) (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops

TRACEROUTE (using port 8888/tcp)
HOP RTT      ADDRESS
1   0.34 ms  10.0.20.3
2   59.97 ms 192.168.2.199

Read data files from: /usr/share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 407.33 seconds
           Raw packets sent: 69366 (3.054MB) | Rcvd: 65264 (2.684MB)

A trace azert ilyen furi, mert csak elszeparalt halon volt keznel nmap.

Ja, es ez mar egy csunyasitott Android 2.1 (asszem), ezTerry MyTouch3G AOSP pakkja. Azota MyTouch 3G-nek mondja magat a G1-em, de ez legyen a legnagyobb baj ezzel a ROM-mal. Cserebe gyors.
--
Ki oda vagyik, hol szall a galamb, elszalasztja a kincset itt alant. | Gentoo Portal