Mahlzeit,
ich betreibe eine Fritzbox an einem Glasfaser Anschluss. Bei einer routinemäßigen Überprüfung ist mir ein unbekannter Client aufgefallen:
Der Client ist im lokalen Netzwerk erreichbar:
nmap sagt erst einmal nicht - wahrscheinlich habe ich nicht die korrekten Optionen verwendet:
Jemand mit weiteren sachdienlichen Hinweisen hier .
EDIT: 62078/tcp open tcpwrapped habe ich in der kürze der Zeit lediglich mit Apple in Verbindung bringen können.
ich betreibe eine Fritzbox an einem Glasfaser Anschluss. Bei einer routinemäßigen Überprüfung ist mir ein unbekannter Client aufgefallen:
Der Client ist im lokalen Netzwerk erreichbar:
nmap sagt erst einmal nicht - wahrscheinlich habe ich nicht die korrekten Optionen verwendet:
Code:
root@ubuntu-ssf:/home/tneckel# nmap -sV -O -v 192.168.178.21
Starting Nmap 7.60 ( https://nmap.org ) at 2021-10-08 17:12 UTC
NSE: Loaded 42 scripts for scanning.
Initiating ARP Ping Scan at 17:12
Scanning 192.168.178.21 [1 port]
Completed ARP Ping Scan at 17:12, 0.22s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 17:12
Completed Parallel DNS resolution of 1 host. at 17:12, 0.01s elapsed
Initiating SYN Stealth Scan at 17:12
Scanning 192.168.178.21 [1000 ports]
Discovered open port 62078/tcp on 192.168.178.21
Increasing send delay for 192.168.178.21 from 0 to 5 due to max_successful_tryno increase to 4
Increasing send delay for 192.168.178.21 from 5 to 10 due to 11 out of 36 dropped probes since last increase.
Increasing send delay for 192.168.178.21 from 10 to 20 due to 11 out of 28 dropped probes since last increase.
Increasing send delay for 192.168.178.21 from 20 to 40 due to 11 out of 29 dropped probes since last increase.
Increasing send delay for 192.168.178.21 from 40 to 80 due to 11 out of 31 dropped probes since last increase.
Completed SYN Stealth Scan at 17:13, 45.52s elapsed (1000 total ports)
Initiating Service scan at 17:13
Scanning 1 service on 192.168.178.21
Completed Service scan at 17:13, 0.07s elapsed (1 service on 1 host)
Initiating OS detection (try #1) against 192.168.178.21
Retrying OS detection (try #2) against 192.168.178.21
adjust_timeouts2: packet supposedly had rtt of -189962 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -189962 microseconds. Ignoring time.
Retrying OS detection (try #3) against 192.168.178.21
Retrying OS detection (try #4) against 192.168.178.21
Retrying OS detection (try #5) against 192.168.178.21
adjust_timeouts2: packet supposedly had rtt of -185940 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -185940 microseconds. Ignoring time.
NSE: Script scanning 192.168.178.21.
Initiating NSE at 17:13
Completed NSE at 17:13, 0.06s elapsed
Initiating NSE at 17:13
Completed NSE at 17:13, 0.00s elapsed
Nmap scan report for 192.168.178.21
Host is up (0.0043s latency).
Not shown: 999 closed ports
PORT STATE SERVICE VERSION
62078/tcp open tcpwrapped
MAC Address: CA:1D:7B:82:67:48 (Unknown)
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.60%E=4%D=10/8%OT=62078%CT=1%CU=31063%PV=Y%DS=1%DC=D%G=Y%M=CA1D7
OS:B%TM=61607C43%P=x86_64-pc-linux-gnu)SEQ(SP=103%GCD=1%ISR=10F%TI=Z%CI=RD%
OS:TS=20)SEQ(SP=FF%GCD=1%ISR=10A%TI=Z%CI=RD%II=RI%TS=21)OPS(O1=M5B4NW6NNT11
OS:SLL%O2=M5B4NW6NNT11SLL%O3=M5B4NW6NNT11%O4=M5B4NW6NNT11SLL%O5=M5B4NW6NNT1
OS:1SLL%O6=M5B4NNT11SLL)WIN(W1=B50%W2=AD8%W3=4E8%W4=FFFF%W5=418%W6=1FA)ECN(
OS:R=Y%DF=Y%T=40%W=0%O=M5B4NW6SLL%CC=N%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD
OS:=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%D
OS:F=N%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O
OS:=%RD=0%Q=)T7(R=Y%DF=N%T=40%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=40%
OS:IPL=38%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=0%RUD=G)IE(R=Y%DFI=S%T=40%CD=S)
Uptime guess: 0.000 days (since Fri Oct 8 17:13:37 2021)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=259 (Good luck!)
IP ID Sequence Generation: All zeros
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 61.38 seconds
Raw packets sent: 1543 (78.488KB) | Rcvd: 1318 (57.126KB)
EDIT: 62078/tcp open tcpwrapped habe ich in der kürze der Zeit lediglich mit Apple in Verbindung bringen können.