[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: ssh et autres :) !



Le 12660ième jour après Epoch,
nissuacfeneyrol-nospam@free.fr écrivait:

> Voilà ce que j'ai :( ! ?
>
> mezig@GNUDeb'Lin'Box:/$ nmap
> Nmap 3.55 Usage: nmap [Scan Type(s)] [Options] <host or net list>
> Some Common Scan Types ('*' options require root privileges)
> * -sS TCP SYN stealth port scan (default if privileged (root))
>   -sT TCP connect() port scan (default for unprivileged users)
> * -sU UDP port scan
>   -sP ping scan (Find any reachable machines)
> * -sF,-sX,-sN Stealth FIN, Xmas, or Null scan (experts only)
>   -sV Version scan probes open ports determining service & app
> names/versions
>   -sR/-I RPC/Identd scan (use with other scan types)
> Some Common Options (none are required, most can be combined):
> * -O Use TCP/IP fingerprinting to guess remote operating system
>   -p <range> ports to scan.  Example range: 1-1024,1080,6666,31337
>   -F Only scans ports listed in nmap-services
>   -v Verbose. Its use is recommended.  Use twice for greater effect.
>   -P0 Don't ping hosts (needed to scan www.microsoft.com and others)
> * -Ddecoy_host1,decoy2[,...] Hide scan using many decoys
>   -6 scans via IPv6 rather than IPv4
>   -T <Paranoid|Sneaky|Polite|Normal|Aggressive|Insane> General timing policy
>   -n/-R Never do DNS resolution/Always resolve [default: sometimes resolve]
>   -oN/-oX/-oG <logfile> Output normal/XML/grepable scan logs to <logfile>
>   -iL <inputfile> Get targets from file; Use '-' for stdin
> * -S <your_IP>/-e <devicename> Specify source address or network interface
>   --interactive Go into interactive mode (then press h for help)
> Example: nmap -v -sS -O www.my.com 192.168.0.0/16 '192.88-90.*.*'
> SEE THE MAN PAGE FOR MANY MORE OPTIONS, DESCRIPTIONS, AND EXAMPLES

Ben c'est pourtant clair: Lis le man de nmap, et utilise par exemple
la syntaxe proposée dans l'exemple. Tu peux faire

nmap -v -sS -O tamachine.ou.son.ip

ou alors apt-get install nmapfe si tu es feignant. Il a l'immense
avantage de te mettre l'équivalent des "clicks" que tu vas faire dans
un exemple de ligne de commande.

> mezig@GNUDeb'Lin'Box:/$ ssh -v
> OpenSSH_3.8.1p1 Debian 1:3.8.1p1-8, OpenSSL 0.9.7d 17 Mar 2004
> usage: ssh [-1246AaCfghkNnqsTtVvXxY] [-b bind_address] [-c cipher_spec]
>            [-D port] [-e escape_char] [-F configfile] [-i identity_file]
>            [-L port:host:hostport] [-l login_name] [-m mac_spec] [-o option]
>            [-p port] [-R port:host:hostport] [user@]hostname [command]
> mezig@GNUDeb'Lin'Box:/$ ssh -vp
> OpenSSH_3.8.1p1 Debian 1:3.8.1p1-8, OpenSSL 0.9.7d 17 Mar 2004
> ssh: option requires an argument -- p
> usage: ssh [-1246AaCfghkNnqsTtVvXxY] [-b bind_address] [-c cipher_spec]
>            [-D port] [-e escape_char] [-F configfile] [-i identity_file]
>            [-L port:host:hostport] [-l login_name] [-m mac_spec] [-o option]
>            [-p port] [-R port:host:hostport] [user@]hostname [command]
> mezig@GNUDeb'Lin'Box:/$ ssh -vp 22
> OpenSSH_3.8.1p1 Debian 1:3.8.1p1-8, OpenSSL 0.9.7d 17 Mar 2004
> usage: ssh [-1246AaCfghkNnqsTtVvXxY] [-b bind_address] [-c cipher_spec]
>            [-D port] [-e escape_char] [-F configfile] [-i identity_file]
>            [-L port:host:hostport] [-l login_name] [-m mac_spec] [-o option]
>            [-p port] [-R port:host:hostport] [user@]hostname [command]

Pareil. Pas de front-end graphique par contre ;)

-- 
Klatu barada nikto.



Reply to: