как открыть порт?

Discussion in 'Болталка' started by KENTov, 21 Mar 2010.

  1. KENTov

    KENTov New Member

    Joined:
    16 Dec 2009
    Messages:
    4
    Likes Received:
    4
    Reputations:
    1
    парни , тут такие траблы....не могу открыть порт 15963

    как это сделать ?

    P.S в брэндмаузере не открывается порт :mad:
     
  2. lukmus

    lukmus Elder - Старейшина

    Joined:
    18 Nov 2009
    Messages:
    400
    Likes Received:
    118
    Reputations:
    23
    в лине: nc -l 15963
    тебе открыть или убрать запрет на открытие?
     
  3. KENTov

    KENTov New Member

    Joined:
    16 Dec 2009
    Messages:
    4
    Likes Received:
    4
    Reputations:
    1
    мне нужно его именно открыть )

    это не работает , виндоувс не находит nc
     
  4. lukmus

    lukmus Elder - Старейшина

    Joined:
    18 Nov 2009
    Messages:
    400
    Likes Received:
    118
    Reputations:
    23
    ясен болт не находит, я же написал что это в лине, а для винды нужно поставить эту самую nc
     
  5. KENTov

    KENTov New Member

    Joined:
    16 Dec 2009
    Messages:
    4
    Likes Received:
    4
    Reputations:
    1

    вот не задача.....как открыть порт в винде , просто очень нужно...
     
  6. Konqi

    Konqi Green member

    Joined:
    24 Jun 2009
    Messages:
    2,251
    Likes Received:
    1,148
    Reputations:
    886

    http://tfile.ru/forum/viewtopic.php?t=65712
     
    _________________________
  7. KENTov

    KENTov New Member

    Joined:
    16 Dec 2009
    Messages:
    4
    Likes Received:
    4
    Reputations:
    1
    там загон про тот же самый брэндмаузер , я как бы открыл но 2ip.ru показывает что порт закрыт :mad:
     
  8. Konqi

    Konqi Green member

    Joined:
    24 Jun 2009
    Messages:
    2,251
    Likes Received:
    1,148
    Reputations:
    886

    a nmap что говорить? (если оно есть)
     
    _________________________
  9. Merl00k

    Merl00k Member

    Joined:
    6 Nov 2008
    Messages:
    27
    Likes Received:
    10
    Reputations:
    0
    какой nmap ТС на Винде
     
  10. lukmus

    lukmus Elder - Старейшина

    Joined:
    18 Nov 2009
    Messages:
    400
    Likes Received:
    118
    Reputations:
    23
    ну и что, nmap есть для всех осей
     
  11. KENTov

    KENTov New Member

    Joined:
    16 Dec 2009
    Messages:
    4
    Likes Received:
    4
    Reputations:
    1
    Nmap 5.21 ( http://nmap.org )

    Usage: nmap [Scan Type(s)] [Options] {target specification}

    TARGET SPECIFICATION:

    Can pass hostnames, IP addresses, networks, etc.

    Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254

    -iL <inputfilename>: Input from list of hosts/networks

    -iR <num hosts>: Choose random targets

    --exclude <host1[,host2][,host3],...>: Exclude hosts/networks

    --excludefile <exclude_file>: Exclude list from file

    HOST DISCOVERY:

    -sL: List Scan - simply list targets to scan

    -sP: Ping Scan - go no further than determining if host is online

    -PN: Treat all hosts as online -- skip host discovery

    -PS/PA/PU/PY[portlist]: TCP SYN/ACK, UDP or SCTP discovery to given ports

    -PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes

    -PO[protocol list]: IP Protocol Ping

    -n/-R: Never do DNS resolution/Always resolve [default: sometimes]

    --dns-servers <serv1[,serv2],...>: Specify custom DNS servers

    --system-dns: Use OS's DNS resolver

    --traceroute: Trace hop path to each host

    SCAN TECHNIQUES:

    -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans

    -sU: UDP Scan

    -sN/sF/sX: TCP Null, FIN, and Xmas scans

    --scanflags <flags>: Customize TCP scan flags

    -sI <zombie host[:probeport]>: Idle scan

    -sY/sZ: SCTP INIT/COOKIE-ECHO scans

    -sO: IP protocol scan

    -b <FTP relay host>: FTP bounce scan

    PORT SPECIFICATION AND SCAN ORDER:

    -p <port ranges>: Only scan specified ports

    Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080

    -F: Fast mode - Scan fewer ports than the default scan

    -r: Scan ports consecutively - don't randomize

    --top-ports <number>: Scan <number> most common ports

    --port-ratio <ratio>: Scan ports more common than <ratio>

    SERVICE/VERSION DETECTION:

    -sV: Probe open ports to determine service/version info

    --version-intensity <level>: Set from 0 (light) to 9 (try all probes)

    --version-light: Limit to most likely probes (intensity 2)

    --version-all: Try every single probe (intensity 9)

    --version-trace: Show detailed version scan activity (for debugging)

    SCRIPT SCAN:

    -sC: equivalent to --script=default

    --script=<Lua scripts>: <Lua scripts> is a comma separated list of

    directories, script-files or script-categories

    --script-args=<n1=v1,[n2=v2,...]>: provide arguments to scripts

    --script-trace: Show all data sent and received

    --script-updatedb: Update the script database.

    OS DETECTION:

    -O: Enable OS detection

    --osscan-limit: Limit OS detection to promising targets

    --osscan-guess: Guess OS more aggressively

    TIMING AND PERFORMANCE:

    Options which take <time> are in milliseconds, unless you append 's'

    (seconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m).

    -T<0-5>: Set timing template (higher is faster)

    --min-hostgroup/max-hostgroup <size>: Parallel host scan group sizes

    --min-parallelism/max-parallelism <time>: Probe parallelization

    --min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout <time>: Specifies

    probe round trip time.

    --max-retries <tries>: Caps number of port scan probe retransmissions.

    --host-timeout <time>: Give up on target after this long

    --scan-delay/--max-scan-delay <time>: Adjust delay between probes

    --min-rate <number>: Send packets no slower than <number> per second

    --max-rate <number>: Send packets no faster than <number> per second

    FIREWALL/IDS EVASION AND SPOOFING:

    -f; --mtu <val>: fragment packets (optionally w/given MTU)

    -D <decoy1,decoy2[,ME],...>: Cloak a scan with decoys

    -S <IP_Address>: Spoof source address

    -e <iface>: Use specified interface

    -g/--source-port <portnum>: Use given port number

    --data-length <num>: Append random data to sent packets

    --ip-options <options>: Send packets with specified ip options

    --ttl <val>: Set IP time-to-live field

    --spoof-mac <mac address/prefix/vendor name>: Spoof your MAC address

    --badsum: Send packets with a bogus TCP/UDP/SCTP checksum

    --adler32: Use deprecated Adler32 instead of CRC32C for SCTP checksums

    OUTPUT:

    -oN/-oX/-oS/-oG <file>: Output scan in normal, XML, s|<rIpt kIddi3,

    and Grepable format, respectively, to the given filename.

    -oA <basename>: Output in the three major formats at once

    -v: Increase verbosity level (use twice or more for greater effect)

    -d[level]: Set or increase debugging level (Up to 9 is meaningful)

    --reason: Display the reason a port is in a particular state

    --open: Only show open (or possibly open) ports

    --packet-trace: Show all packets sent and received

    --iflist: Print host interfaces and routes (for debugging)

    --log-errors: Log errors/warnings to the normal-format output file

    --append-output: Append to rather than clobber specified output files

    --resume <filename>: Resume an aborted scan

    --stylesheet <path/URL>: XSL stylesheet to transform XML output to HTML

    --webxml: Reference stylesheet from Nmap.Org for more portable XML

    --no-stylesheet: Prevent associating of XSL stylesheet w/XML output

    MISC:

    -6: Enable IPv6 scanning

    -A: Enables OS detection and Version detection, Script scanning and Traceroute

    --datadir <dirname>: Specify custom Nmap data file location

    --send-eth/--send-ip: Send using raw ethernet frames or IP packets

    --privileged: Assume that the user is fully privileged

    --unprivileged: Assume the user lacks raw socket privileges

    -V: Print version number

    -h: Print this help summary page.

    EXAMPLES:

    nmap -v -A scanme.nmap.org

    nmap -v -sP 192.168.0.0/16 10.0.0.0/8

    nmap -v -iR 10000 -PN -p 80

    SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES

    nmap: option `-l' is ambiguous
     
  12. lukmus

    lukmus Elder - Старейшина

    Joined:
    18 Nov 2009
    Messages:
    400
    Likes Received:
    118
    Reputations:
    23
    зайди в консоль и напиши nmap 127.0.0.1
    при этом отруби все антивирусы и фаерволы
     
  13. KENTov

    KENTov New Member

    Joined:
    16 Dec 2009
    Messages:
    4
    Likes Received:
    4
    Reputations:
    1
    появилася консоль и таинственно исчезла
     
  14. lukmus

    lukmus Elder - Старейшина

    Joined:
    18 Nov 2009
    Messages:
    400
    Likes Received:
    118
    Reputations:
    23
    консоль = сеанс MS-DOS = Командная строка = Пуск->Программы->Стандартные->Командная строка
     
  15. KENTov

    KENTov New Member

    Joined:
    16 Dec 2009
    Messages:
    4
    Likes Received:
    4
    Reputations:
    1
    открыл , там синиее окошко.... как я поянл туда нужно ввести nmap 127.0.0.1

    Ввел nmap 127.0.0.1
    появились порты кажись , но нужного порта там нет
     
  16. lukmus

    lukmus Elder - Старейшина

    Joined:
    18 Nov 2009
    Messages:
    400
    Likes Received:
    118
    Reputations:
    23
    напиши вывод
     
  17. KENTov

    KENTov New Member

    Joined:
    16 Dec 2009
    Messages:
    4
    Likes Received:
    4
    Reputations:
    1
    Вывод: нех*я не получится? :confused: :rolleyes:
     
  18. gold-goblin

    gold-goblin Elder - Старейшина

    Joined:
    26 Mar 2007
    Messages:
    917
    Likes Received:
    174
    Reputations:
    3
    Я хуею с таких тем и таких ответов.
    ТС ты хоть запустил прогу которая будет висеть на этом порте?
     
  19. KENTov

    KENTov New Member

    Joined:
    16 Dec 2009
    Messages:
    4
    Likes Received:
    4
    Reputations:
    1
    да все запущено , только ничего не пашет
     
  20. gold-goblin

    gold-goblin Elder - Старейшина

    Joined:
    26 Mar 2007
    Messages:
    917
    Likes Received:
    174
    Reputations:
    3
    что запущено?
    Откуда не пашет? С внешки?
    Если попробывать с компа где что-то запущено 127.0.0.1:твой порт