1
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
LOL autopwn.P.S the netbios method didn't Work cause he have a firewall and he turned off network discovery..and i can't see him in network..even i can't Ping his device..
Also why are you attacking skype? that'll never work... try thinking out of the box.
His computer run windows and has netbios enabled... RTFM bro.
msf > nmap -sV -T4 -A -v -Pn 192.168.1.2
[*] exec: nmap -sV -T4 -A -v -Pn 192.168.1.2
Starting Nmap 6.40 ( [url=http://nmap.org]http://nmap.org[/url] ) at 2013-11-02 21:00 Standard Time
NSE: Loaded 110 scripts for scanning.
NSE: Script Pre-scanning.
Initiating ARP Ping Scan at 21:00
Scanning 192.168.1.2 [1 port]
Completed ARP Ping Scan at 21:00, 0.53s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 21:00
Completed Parallel DNS resolution of 1 host. at 21:00, 0.00s elapsed
Initiating SYN Stealth Scan at 21:00
Scanning Ghazal-PC.Home (192.168.1.2) [1000 ports]
Discovered open port 443/tcp on 192.168.1.2
Discovered open port 80/tcp on 192.168.1.2
Completed SYN Stealth Scan at 21:00, 4.90s elapsed (1000 total ports)
Initiating Service scan at 21:00
Scanning 2 services on Ghazal-PC.Home (192.168.1.2)
Service scan Timing: About 50.00% done; ETC: 21:03 (0:01:44 remaining)
Completed Service scan at 21:02, 106.87s elapsed (2 services on 1 host)
Initiating OS detection (try #1) against Ghazal-PC.Home (192.168.1.2)
NSE: Script scanning 192.168.1.2.
Initiating NSE at 21:02
Completed NSE at 21:02, 20.30s elapsed
Nmap scan report for Ghazal-PC.Home (192.168.1.2)
Host is up (0.0069s latency).
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http?
|_http-title: Site doesn't have a title.
443/tcp open skype2 Skype
|_http-title: Site doesn't have a title.
1 service unrecognized despite returning data. If you know the service/version,
please submit the following fingerprint at [url=http://www.insecure.org/cgi-bin/servicefp-submit.cgi]http://www.insecure.org/cgi-bin/servicefp-submit.cgi[/url] :
SF-Port80-TCP:V=6.40%I=7%D=11/2%Time=52754BC6%P=i686-pc-windows-windows%r(
SF:GetRequest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(HTTPOptions
SF:,3B,"\xc4\x9f\x0boo\xb1I\xf0}\xf7\x10\xb5zIg\xc2\xc4\x86\xf5\xa5\|\x88~
SF:\xda\x166\x05b\xc7\xd7\xdeu\x8d\|d_\xfd\xe2\xc1&\xec\xafW\x89\xba\xf9%I
SF:\xc6\xff\xa4\xc52{\xf0\xa1\^\xb7\xfc")%r(RTSPRequest,5F,"Y\x9c\xc5\xbc\
SF:xf6\xc8\xe60\xeecT\xf8\xd8\x86>\xad\xa2SI\xe4\xd4\(\xbdV\xc2\x8a\xea\xa
SF:0\x88o}l\x9a\x89\x15\xbf\x9d\xf9p\xad\x8bUa\x05k\x9en\xc4\xeb\xa0\x91\x
SF:8e'\xac-z#x\x89&\xdf\x04\xa5\x92\[P\x81\xbe\x97\\\x1d\xaa\x93\(yVO\xb4\
SF:x95\xc2\xcb\0q\xee\x07\x0c\r\xda\x03\xd8i\x86\xbfd\x85")%r(FourOhFourRe
SF:quest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(RPCCheck,37,"\xc
SF:8q/\xdc\x16v\xe3\xe3Q\xb5k\xc2\xae\x06\xd3\x08\x0e\x8e-Z\x9fcs\xc3\xc5C
SF:z\xf8\x16\x14\xacNo\xa2\x88~\x1d}4=\xbd\$\xf7\xc9\xa9`NF\xc01\xae\xc7\x
SF:cc\xcd\x9a")%r(DNSVersionBindReq,69,"\x91\x8e~\x02\xa1N\xacn\.I\xe0%\xe
SF:e\x13\xc0\x8c/\xe7B\x83#\x9eS\x8e4\xe8\xf5\xf9\x9fu\xc9\xf6\xb1\[K\xc3\
SF:xc7\xb7~b\x84\xdb\x134c\xae\*\x1ff\x1fD\xe5\xd2\x9b\x90\xc1\xfe\xd7\x9c
SF:\]\xea\xd3h\xb9\x96\x8f\xf4\xd5\x02\x0b@\xb1\.GLM\x1aC\x18\xa9\xc6\xff\
SF:xa4\xc52{\xf0\xa1\^\xb7\xfc=J\xb3\xc8\x99\xf6oT\xb5b\xeb\xa0\x91\x8e")%
SF:r(DNSStatusRequest,30,"m\x15\xe6\xca\x91y>\xe8\xb2n\xe0G\x10\xd5C\xa8\x
SF:9d\xd0\)&\xc8\xc0\xc4\xecn\x13\x83UA\xfb\xc9c\xc92\xb4Tj\+MD\x01\x0ejzE
SF:VV\xdc")%r(SSLSessionReq,43,"\x1b\x8f\$\xe4\xc2\x8e2\xd3\x8b#\xbd\x16\x
SF:86\xb9\xbbA\xbbBc\x8aOh\xc6\x8eC\xf7\xf5\x85\$;\x06M\x89'\x12t\x9e0c0\x
SF:cc\x1a\xea\xdf{G\xfa\xd8\xb8\xc9f\x1fD\xe5\xd2\x9b\x90\xc1\xfe\x8d\xec\
SF:xd6\xd8\x90\xd8\xf4-")%r(Kerberos,6C,"Z\x15\x02\x0f6\xcf\.\$8r\xacs\x01
SF:z\xffE>\xb7SsIuO\xe1\x14\x01\xe2Lk\xc3\xe3Y\$\xf3\xa14uT-\x90\x20\xdaE;
SF:z\xd3e\xc8\xa1\^\xb7\xfc=J\xb3\xc8\x99\xf6oT\xb5b\xeb\xa0\x91\x8e'\xac-
SF:z#x\x89&\xdf\x04\xa5\x92\[P\x81\xbe\x97\\\x1d\xaa\x93\(yVO\xb4\x95\xc2\
SF:xcb\0q\xee\x07\x0c\x1c\xaa\xc96\x94\xad\x9aB")%r(SMBProgNeg,5E,"\x8dz\+
SF:~L\x1c\x0e{\\'\xe3\x1fW\x88\^\$t\xd0\xc7\xd7-6\?\xcd\xfc\xbe\xf2`SX\x8d
SF:wa_\xa0\x18M>\xb6\xa7\xa8q\(r\xbf\xb0\xdac\xd8i\x86\xbfd\x85\xf2;\xb0a\
SF:x1ew\xbc\xfd\ns\x88Y\xb6/\x14u\"\xab`QN\xe7l\xed:\xe38I\xe6\x9f\xc4eR\x
SF:1b\x10A~W\x1c\xdd");
MAC Address: 02:08:E8:36:E7:C0 (Unknown)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Microsoft Windows 2008|7|Vista
OS CPE: cpe:/o:microsoft:windows_server_2008::beta3 cpe:/o:microsoft:windows_7::-:professional cpe:/o:microsoft:windows_vista::- cpe:/o:microsoft:windows_vista::sp1
OS details: Microsoft Windows Server 2008 Beta 3, Microsoft Windows 7 Professional, Microsoft Windows Vista SP0 or SP1, Windows Server 2008 SP1, or Windows 7, Microsoft Windows Vista SP2, Windows 7 SP1, or Windows Server 2008
Uptime guess: 0.544 days (since Sat Nov 02 07:58:25 2013)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=256 (Good luck!)
IP ID Sequence Generation: Incremental
TRACEROUTE
HOP RTT ADDRESS
1 6.87 ms Ghazal-PC.Home (192.168.1.2)
NSE: Script Post-scanning.
Read data files from: D:\metasploit\nmap
OS and Service detection performed. Please report any incorrect results at [url=http://nmap.org/submit/]http://nmap.org/submit/[/url] .
Nmap done: 1 IP address (1 host up) scanned in 143.88 seconds
Raw packets sent: 2044 (92.488KB) | Rcvd: 16 (780B)