Network Scans using NMAP with Debian 7 ARM SBC BeagleBone Black Rev C BBB

This is what an NMAP port scan of a BeagleBone Black Rev C running Debian 7 Linux looks like.

root@arm:~# apt-get -y update
Fetched 725 kB in 4s (173 kB/s)

root@arm:~# apt-get -y install nmap
Setting up nmap (6.00-0.3+deb7u1) …

root@arm:~# uname -a
Linux arm 3.8.13-bone56 #1 SMP Wed Jun 4 23:59:23 UTC 2014 armv7l GNU/Linux

root@arm:~# lsb_release -a
Distributor ID: Debian
Description: Debian GNU/Linux 7.5 (wheezy)
Release: 7.5
Codename: wheezy

root@arm:~# nmap -v -A localhost

Starting Nmap 6.00 ( http://nmap.org ) at 2014-06-25 15:42 UTC
NSE: Loaded 93 scripts for scanning.
NSE: Script Pre-scanning.
Initiating SYN Stealth Scan at 15:42
Scanning localhost (127.0.0.1) [1000 ports]
Discovered open port 22/tcp on 127.0.0.1
Discovered open port 80/tcp on 127.0.0.1
Completed SYN Stealth Scan at 15:42, 0.14s elapsed (1000 total ports)
Initiating Service scan at 15:42
Scanning 2 services on localhost (127.0.0.1)
Completed Service scan at 15:42, 6.04s elapsed (2 services on 1 host)
Initiating OS detection (try #1) against localhost (127.0.0.1)
Retrying OS detection (try #2) against localhost (127.0.0.1)
Retrying OS detection (try #3) against localhost (127.0.0.1)
Retrying OS detection (try #4) against localhost (127.0.0.1)
Retrying OS detection (try #5) against localhost (127.0.0.1)
NSE: Script scanning 127.0.0.1.
Initiating NSE at 15:43
Completed NSE at 15:43, 0.46s elapsed
Nmap scan report for localhost (127.0.0.1)
Host is up (0.00023s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.0p1 Debian 4+deb7u1 (protocol 2.0)
| ssh-hostkey: 1024 ef:5c:be:af:6f:16:75:b6:81:d6:57:cb:98:98:07:6e (DSA)
|_2048 21:dd:16:73:1a:97:81:40:80:ce:07:b4:6d:70:dd:8f (RSA)
80/tcp open http Apache httpd 2.2.22 ((Debian))
|_http-methods: GET HEAD POST OPTIONS
|_http-title: Site doesn’t have a title (text/html).
No exact OS matches for host (If you know what OS is running on it, see http://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=6.00%E=4%D=6/25%OT=22%CT=1%CU=39115%PV=N%DS=0%DC=L%G=Y%TM=53AAEE0
OS:9%P=armv7l-unknown-linux-gnueabi)SEQ(SP=102%GCD=1%ISR=10A%TI=Z%CI=Z%II=I
OS:%TS=9)OPS(O1=MFFD7ST11NW6%O2=MFFD7ST11NW6%O3=MFFD7NNT11NW6%O4=MFFD7ST11N
OS:W6%O5=MFFD7ST11NW6%O6=MFFD7ST11)WIN(W1=AAAA%W2=AAAA%W3=AAAA%W4=AAAA%W5=A
OS:AAA%W6=AAAA)ECN(R=Y%DF=Y%T=41%W=AAAA%O=MFFD7NNSNW6%CC=Y%Q=)T1(R=Y%DF=Y%T
OS:=41%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=41%W=0%S=A%A=Z%F=R
OS:%O=%RD=0%Q=)T5(R=Y%DF=Y%T=41%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=
OS:41%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=41%W=0%S=Z%A=S+%F=AR%O=%RD=0
OS:%Q=)U1(R=Y%DF=N%T=41%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R
OS:=Y%DFI=N%T=41%CD=S)

Uptime guess: 0.018 days (since Wed Jun 25 15:16:53 2014)
Network Distance: 0 hops
TCP Sequence Prediction: Difficulty=258 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: OS: Linux; CPE: cpe:/o:linux:kernel

NSE: Script Post-scanning.
Initiating NSE at 15:43
Completed NSE at 15:43, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 28.03 seconds
Raw packets sent: 1110 (52.890KB) | Rcvd: 2212 (98.988KB)

root@arm:~# nmap -sV -v -A localhost

Starting Nmap 6.00 ( http://nmap.org ) at 2014-06-25 15:49 UTC
NSE: Loaded 93 scripts for scanning.
NSE: Script Pre-scanning.
Initiating SYN Stealth Scan at 15:49
Scanning localhost (127.0.0.1) [1000 ports]
Discovered open port 80/tcp on 127.0.0.1
Discovered open port 22/tcp on 127.0.0.1
Completed SYN Stealth Scan at 15:49, 0.14s elapsed (1000 total ports)
Initiating Service scan at 15:49
Scanning 2 services on localhost (127.0.0.1)
Completed Service scan at 15:49, 6.03s elapsed (2 services on 1 host)
Initiating OS detection (try #1) against localhost (127.0.0.1)
Retrying OS detection (try #2) against localhost (127.0.0.1)
Retrying OS detection (try #3) against localhost (127.0.0.1)
Retrying OS detection (try #4) against localhost (127.0.0.1)
Retrying OS detection (try #5) against localhost (127.0.0.1)
NSE: Script scanning 127.0.0.1.
Initiating NSE at 15:49
Completed NSE at 15:49, 0.45s elapsed
Nmap scan report for localhost (127.0.0.1)
Host is up (0.00024s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.0p1 Debian 4+deb7u1 (protocol 2.0)
| ssh-hostkey: 1024 ef:5c:be:af:6f:16:75:b6:81:d6:57:cb:98:98:07:6e (DSA)
|_2048 21:dd:16:73:1a:97:81:40:80:ce:07:b4:6d:70:dd:8f (RSA)
80/tcp open http Apache httpd 2.2.22 ((Debian))
|_http-methods: GET HEAD POST OPTIONS
|_http-title: Site doesn’t have a title (text/html).
No exact OS matches for host (If you know what OS is running on it, see http://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=6.00%E=4%D=6/25%OT=22%CT=1%CU=42709%PV=N%DS=0%DC=L%G=Y%TM=53AAEF8
OS:D%P=armv7l-unknown-linux-gnueabi)SEQ(SP=106%GCD=1%ISR=10E%TI=Z%CI=Z%II=I
OS:%TS=9)OPS(O1=MFFD7ST11NW6%O2=MFFD7ST11NW6%O3=MFFD7NNT11NW6%O4=MFFD7ST11N
OS:W6%O5=MFFD7ST11NW6%O6=MFFD7ST11)WIN(W1=AAAA%W2=AAAA%W3=AAAA%W4=AAAA%W5=A
OS:AAA%W6=AAAA)ECN(R=Y%DF=Y%T=41%W=AAAA%O=MFFD7NNSNW6%CC=Y%Q=)T1(R=Y%DF=Y%T
OS:=41%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=41%W=0%S=A%A=Z%F=R
OS:%O=%RD=0%Q=)T5(R=Y%DF=Y%T=41%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=
OS:41%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=41%W=0%S=Z%A=S+%F=AR%O=%RD=0
OS:%Q=)U1(R=Y%DF=N%T=41%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R
OS:=Y%DFI=N%T=41%CD=S)

Uptime guess: 0.023 days (since Wed Jun 25 15:16:53 2014)
Network Distance: 0 hops
TCP Sequence Prediction: Difficulty=262 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: OS: Linux; CPE: cpe:/o:linux:kernel

NSE: Script Post-scanning.
Initiating NSE at 15:49
Completed NSE at 15:49, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 28.22 seconds
Raw packets sent: 1110 (52.890KB) | Rcvd: 2212 (98.988KB)
root@arm:~#

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s