Starting Nmap 5.51 ( http://nmap.org ) at 2011-08-28 16:53 Hora verano, Montañas (México)NSE: Loaded 57 scripts for scanning.Initiating ARP Ping Scan at 16:53Scanning 192.168.0.131 [1 port]Completed ARP Ping Scan at 16:53, 4.99s elapsed (1 total hosts)Initiating Parallel DNS resolution of 1 host. at 16:53Completed Parallel DNS resolution of 1 host. at 16:53, 5.25s elapsedInitiating SYN Stealth Scan at 16:53Scanning 192.168.0.131 [1000 ports]Discovered open port 135/tcp on 192.168.0.131Discovered open port 139/tcp on 192.168.0.131Discovered open port 445/tcp on 192.168.0.131Completed SYN Stealth Scan at 16:53, 1.36s elapsed (1000 total ports)Initiating Service scan at 16:53Scanning 3 services on 192.168.0.131Completed Service scan at 16:55, 109.17s elapsed (3 services on 1 host)Initiating OS detection (try #1) against 192.168.0.131NSE: Script scanning 192.168.0.131.Initiating NSE at 16:55Completed NSE at 16:55, 22.07s elapsedNmap scan report for 192.168.0.131Host is up (0.00040s latency).Not shown: 997 closed portsPORT STATE SERVICE VERSION135/tcp open msrpc?139/tcp open netbios-ssn445/tcp open microsoft-ds Microsoft Windows XP microsoft-dsMAC Address: 00:0C:29:A6:7E:3B (VMware)Device type: general purposeRunning: Microsoft Windows XP|2003OS details: Microsoft Windows XP SP2 or SP3, or Windows Server 2003Network Distance: 1 hopTCP Sequence Prediction: Difficulty=256 (Good luck!)IP ID Sequence Generation: IncrementalService Info: OS: WindowsHost script results:| nbstat: | NetBIOS name: DARHACK-07, NetBIOS user: <unknown>, NetBIOS MAC: 00:0c:29:a6:7e:3b (VMware)| Names| DARHACK-07<00> Flags: <unique><active>| DARHACK-07<20> Flags: <unique><active>| UNIDO<00> Flags: <group><active>| UNIDO<1e> Flags: <group><active>| UNIDO<1d> Flags: <unique><active>|_ \x01\x02__MSBROWSE__\x02<01> Flags: <group><active>|_smbv2-enabled: Server doesn't support SMBv2 protocol| smb-os-discovery: | OS: Windows XP (Windows 2000 LAN Manager)| Name: UNIDO\DARHACK-07|_ System time: 2011-08-28 16:55:33 UTC-7TRACEROUTEHOP RTT ADDRESS1 0.40 ms 192.168.0.131Read data files from: F:\Program Files (x86)\NmapOS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in 147.60 seconds Raw packets sent: 1102 (49.186KB) | Rcvd: 1017 (41.234KB)
Puede ser que el firewall te este parando el exploit?
olle Darkhack07, seria bueno compartieras lo que has hecho, se agradeceria mucho...
Cita de: kid_goth en Septiembre 03, 2011, 02:37:09 amolle Darkhack07, seria bueno compartieras lo que has hecho, se agradeceria mucho...Claro que si lo voy a hacer,estoy haciendo un tutorial solo que quiero hacerlo de la mayor calidad para que lo entiendan todos...Saludos.me pondre ha hacerlo.Darkhack07
Cita de: Darkhack07 en Septiembre 03, 2011, 03:10:39 amCita de: kid_goth en Septiembre 03, 2011, 02:37:09 amolle Darkhack07, seria bueno compartieras lo que has hecho, se agradeceria mucho...Claro que si lo voy a hacer,estoy haciendo un tutorial solo que quiero hacerlo de la mayor calidad para que lo entiendan todos...Saludos.me pondre ha hacerlo.Darkhack07Yo tb tuve ese problema con maquinas win xp.. pero eran porque estaban actualizadas!! lo hice con una maquina win xp recien instalada sin actualizar y logre acceder a ella!!! pero como hacer con las maquinas que estan actualizadas.. aun no hay un exploit que pueda vulnerar el sistema T_t.espero tu respuesta amigo!!!