On 2013-10-4, at 下午3:22, Qian Hong <
frac...@gmail.com> wrote:
> 建议做两个实验:
> 1.
> 在教育网内,用nmap扫描8.8.8.8,获得指纹,参见 [1]
>
> 2.
> 挂上海外vpn,保证不会连接到可疑的目标,重新用nmap扫描8.8.8.8
>
> 对比1和2的结果,看看指纹是不是完全一样。如果结果不同,那么可疑的程度就更大了。如果结果相同,那么还不能完全排除可疑,因为指纹也是可以伪造的,况且Google的dns服务器没有什么指纹,我这里用nmap基本什么都扫不出来。这时候就需要继续想其他求证的方法了。
卧槽, 有结果了:
米国VPN:
sunus@li576-203:~$ sudo nmap -O -Pn -v 8.8.8.8
Starting Nmap 5.21 (
http://nmap.org ) at 2013-10-04 07:28 UTC
Initiating Parallel DNS resolution of 1 host. at 07:28
Completed Parallel DNS resolution of 1 host. at 07:28, 0.09s elapsed
Initiating SYN Stealth Scan at 07:28
Completed SYN Stealth Scan at 07:28, 4.34s elapsed (1000 total ports)
Host is up (0.024s latency).
Not shown: 999 filtered ports
PORT STATE SERVICE
53/tcp open domain
// 看这里
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Uptime guess: 0.000 days (since Fri Oct 4 07:28:09 2013)
TCP Sequence Prediction: Difficulty=242 (Good luck!)
IP ID Sequence Generation: Randomized
Read data files from: /usr/share/nmap
OS detection performed. Please report any incorrect results at
http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.53 seconds
Raw packets sent: 2064 (94.332KB) | Rcvd: 26 (1560B)
------------------------------------------------------------------------------------------------------------------------------------------------------
教育网:
[15:26]:sudo nmap -Pn -O -v 8.8.8.8
dyld: DYLD_ environment variables being ignored because main executable (/usr/bin/sudo) is setuid or setgid
Starting Nmap 6.25 (
http://nmap.org ) at 2013-10-04 15:29 CST
Initiating Parallel DNS resolution of 1 host. at 15:29
Completed Parallel DNS resolution of 1 host. at 15:29, 0.00s elapsed
Initiating SYN Stealth Scan at 15:29
Completed SYN Stealth Scan at 15:29, 6.03s elapsed (1000 total ports)
Host is up (0.0024s latency).
All 1000 scanned ports on
google-public-dns-a.google.com (8.8.8.8) are filtered
//看这里 卧槽卧槽!!
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: firewall|switch|general purpose|storage-misc
Running: Cisco embedded, Cisco NX-OS 4.X, Foundry IronWare 7.X, Linux 2.6.X, Netgear Linux 2.6.X
OS CPE: cpe:/h:cisco:ips_4270 cpe:/o:cisco:mds_9509 cpe:/o:cisco:nx_os:4 cpe:/o:foundrynet:ironware:7 cpe:/o:linux:linux_kernel:2.6 cpe:/o:netgear:linux:2.6
OS details: Cisco IPS 4270 intrusion prevention system, Cisco MDS 9509 switch (NX-OS 4.2), Foundry Networks BigIron 8000 switch (IronWare 07.8.02eT53), Linux 2.6.11 - 2.6.18, Linux 2.6.32, Netgear ReadyNAS 3200 NAS device (Linux 2.6)
Read data files from: /usr/local/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 7.17 seconds
Raw packets sent: 1996 (89.342KB) | Rcvd: 26 (2.306KB)
好多思科的设备啊… 嗯…8.8.8.8 是要被查水表了的.
Sunus Lee
Best Wishes