Nefuguje PPP
Vaclav Blaha
vblaha na iol.cz
Pondělí Říjen 11 22:17:44 CEST 1999
Petr Cech wrote:
> neni to lepsi pomoci CHAP ? IMHO IOL jede na WNT, takze bych to videl spis
> takhle.
INHO (In Nmap's Humble Opinion) jede na ciscu. Teda aspon ten router, na
kterem visim ja:
Starting nmap V. 2.12 by Fyodor (fyodor na dhp.com, www.insecure.org/nmap/)
Interesting ports on (194.228.191.218):
Port State Protocol Service
23 open tcp telnet
79 open tcp finger
2005 open tcp deslogin
2008 open tcp conf
2009 open tcp news
2012 open tcp ttyinfo
2014 open tcp troff
2015 open tcp cypress
2016 open tcp bootserver
2017 open tcp cypress-stat
2019 open tcp whosockami
2020 open tcp xinupageserver
2021 open tcp servexec
2023 open tcp xinuexpansion3
2024 open tcp xinuexpansion4
2025 open tcp ellpack
2027 open tcp shadowserver
2028 open tcp submitserver
2030 open tcp device2
4008 open tcp netcheque
6005 open tcp X11:5
TCP Sequence Prediction: Class=random positive increments
Difficulty=866 (Medium)
Remote OS guesses: Cisco IOS 11.3 - 12.0(2), Cisco IOS
v11.14(CA)/12.0.2aT1/v12.0.3T
Nmap run completed -- 1 IP address (1 host up) scanned in 24 seconds
No ziram, naposled tam byl jen telnet a finger. Dotazy typu "kde vzal tu
adresu" necht zodpovi ifconfig:
ppp0 Link encap:Point-to-Point Protocol
inet addr:194.228.147.145 P-t-P:194.228.191.218
Mask:255.255.255.255
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1500 Metric:1
RX packets:5630 errors:2 dropped:0 overruns:0 frame:2
TX packets:5700 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:10
--
NOTE FOR WINDOWS (TM) USERS: I AM NOT LIABLE TO YOU FOR ANY SOFTWARE OR
HARDWARE DAMAGE, SYSTEM MALFUNCTION OR DATA LOSS ARISING OUT WHILE YOU
ARE READING THIS TEXT.
Další informace o konferenci Linux