ALT
# nmap -O -vv ip_address
Starting Nmap 5.51 ( http://nmap.org ) at xxxx-xx-xx xx:xx xxx
Initiating Parallel DNS resolution of 1 host. at 09:55
Completed Parallel DNS resolution of 1 host. at 09:55, 0.00s elapsed
Initiating SYN Stealth Scan at 09:55
Scanning xxxx-xxxxx-xxx-xxxxxx (xxx.xxx.xxx.xxx) [1000 ports]
Completed SYN Stealth Scan at 09:55, 0.12s elapsed (1000 total ports)
Initiating OS detection (try #1) against xxxx-xxxxx-xxx-xxxxxx (xxx.xxx.xxx.xxx)
Retrying OS detection (try #2) against xxxx-xxxxx-xxx-xxxxxx (xxx.xxx.xxx.xxx)
Nmap scan report for xxxx-xxxxx-xxx-xxxxxx (xxx.xxx.xxx.xxx)
Host is up (0.000051s latency).
All 1000 scanned ports on xxxx-xxxxx-xxx-xxxxxx (xxx.xxx.xxx.xxx) are closed
Too many fingerprints match this host to give specific OS details
TCP/IP fingerprint:
SCAN(V=5.51%D=3/21%OT=%CT=1%CU=39596%PV=Y%DS=0%DC=L%G=N%TM=58D0CE53%P=x86_64-alt-linux-gnu)
SEQ(II=I)
T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)
IE(R=Y%DFI=N%T=40%CD=S)
Network Distance: 0 hops
Read data files from: /usr/share/nmap
OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 2.99 seconds
Raw packets sent: 1012 (45.668KB) | Rcvd: 2022 (86.616KB)
Debain
# nmap -O -vv ip_address
Starting Nmap 6.47 ( http://nmap.org ) at xxxx-xx-xx xx:xx xxx
Initiating Parallel DNS resolution of 1 host. at 11:11
Completed Parallel DNS resolution of 1 host. at 11:11, 0.06s elapsed
Initiating SYN Stealth Scan at 11:11
Scanning xx.xx.xx.xx (xx.xx.xx.xx) [1000 ports]
Discovered open port 111/tcp on xx.xx.xx.xx
Increasing send delay for xx.xx.xx.xx from 0 to 5 due to 415 out of 1383 dropped probes since last increase.
Increasing send delay for xx.xx.xx.xx from 5 to 10 due to 11 out of 25 dropped probes since last increase.
Increasing send delay for xx.xx.xx.xx from 10 to 20 due to 11 out of 24 dropped probes since last increase.
Completed SYN Stealth Scan at 11:12, 21.62s elapsed (1000 total ports)
Initiating OS detection (try #1) against xx.xx.xx.xx (xx.xx.xx.xx)
Nmap scan report for xx.xx.xx.xx (xx.xx.xx.xx)
Host is up (0.00014s latency).
Scanned at xxxx-xx-xx xx:xx:xx xxx for 23s
Not shown: 999 closed ports
PORT STATE SERVICE
111/tcp open rpcbind
Device type: general purpose
Running: Linux 3.X
OS CPE: cpe:/o:linux:linux_kernel:3
OS details: Linux 3.7 - 3.15
TCP/IP fingerprint:
OS:SCAN(V=6.47%E=4%D=3/24%OT=111%CT=1%CU=40883%PV=Y%DS=0%DC=L%G=Y%TM=58D4D4
OS:E2%P=i586-pc-linux-gnu)SEQ(SP=102%GCD=1%ISR=107%TI=Z%CI=I%TS=8)OPS(O1=MF
OS:FD7ST11NW6%O2=MFFD7ST11NW6%O3=MFFD7NNT11NW6%O4=MFFD7ST11NW6%O5=MFFD7ST11
OS:NW6%O6=MFFD7ST11)WIN(W1=AAAA%W2=AAAA%W3=AAAA%W4=AAAA%W5=AAAA%W6=AAAA)ECN
OS:(R=Y%DF=Y%T=40%W=AAAA%O=MFFD7NNSNW6%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=
OS:AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(
OS:R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%
OS:F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N
OS:%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%C
OS:D=S)
Uptime guess: 0.004 days (since Fri Mar 24 11:06:13 2017)
Network Distance: 0 hops
TCP Sequence Prediction: Difficulty=258 (Good luck!)
IP ID Sequence Generation: All zeros
Read data files from: /usr/bin/../share/nmap
OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 24.77 seconds
Raw packets sent: 1503 (68.836KB) | Rcvd: 3005 (130.244KB)
Из-за старого nmap в альте - альт не детектится?