Desde have unos dias he dejado mi red wifi en abierto, por ver quien se colaba, el problema es que se está metiendo un equipo pero no logro averiguar nada del mismo.
El resultado que me lanza nmap es este: (la IP invasora es 192.168.1.35)
root@bt:~# nmap -O -Pn -sS -vv 192.168.1.35
Starting Nmap 6.01 ( http://nmap.org ) at 2012-12-31 15:50 WET
Initiating ARP Ping Scan at 15:50
Scanning 192.168.1.35 [1 port]
Completed ARP Ping Scan at 15:50, 0.05s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 15:50
Completed Parallel DNS resolution of 1 host. at 15:50, 0.07s elapsed
Initiating SYN Stealth Scan at 15:50
Scanning 192.168.1.35 [1000 ports]
Completed SYN Stealth Scan at 15:50, 3.30s elapsed (1000 total ports)
Initiating OS detection (try #1) against 192.168.1.35
Retrying OS detection (try #2) against 192.168.1.35
Nmap scan report for 192.168.1.35
Host is up (0.013s latency).
All 1000 scanned ports on 192.168.1.35 are closed
MAC Address: 0C:71:5D:8D:CE:E5 (Unknown)
Too many fingerprints match this host to give specific OS details
TCP/IP fingerprint:
SCAN(V=6.01%E=4%D=12/31%OT=%CT=1%CU=33515%PV=Y%DS=1%DC=D%G=N%M=0C715D%TM=50E1B441%P=i686-pc-linux-gnu)
SEQ(CI=Z%II=I)
T5(R=Y%DF=Y%T=41%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
T6(R=Y%DF=Y%T=41%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
T7(R=Y%DF=Y%T=41%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
U1(R=Y%DF=N%T=41%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)
IE(R=Y%DFI=N%T=41%CD=S)
Network Distance: 1 hop
Read data files from: /usr/local/bin/../share/nmap
OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 5.54 seconds
Raw packets sent: 1040 (46.884KB) | Rcvd: 1028 (42.232KB)
root@bt:~#
¿ Con qué otro analizador podría invesigar esta red ?
El resultado que me lanza nmap es este: (la IP invasora es 192.168.1.35)
root@bt:~# nmap -O -Pn -sS -vv 192.168.1.35
Starting Nmap 6.01 ( http://nmap.org ) at 2012-12-31 15:50 WET
Initiating ARP Ping Scan at 15:50
Scanning 192.168.1.35 [1 port]
Completed ARP Ping Scan at 15:50, 0.05s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 15:50
Completed Parallel DNS resolution of 1 host. at 15:50, 0.07s elapsed
Initiating SYN Stealth Scan at 15:50
Scanning 192.168.1.35 [1000 ports]
Completed SYN Stealth Scan at 15:50, 3.30s elapsed (1000 total ports)
Initiating OS detection (try #1) against 192.168.1.35
Retrying OS detection (try #2) against 192.168.1.35
Nmap scan report for 192.168.1.35
Host is up (0.013s latency).
All 1000 scanned ports on 192.168.1.35 are closed
MAC Address: 0C:71:5D:8D:CE:E5 (Unknown)
Too many fingerprints match this host to give specific OS details
TCP/IP fingerprint:
SCAN(V=6.01%E=4%D=12/31%OT=%CT=1%CU=33515%PV=Y%DS=1%DC=D%G=N%M=0C715D%TM=50E1B441%P=i686-pc-linux-gnu)
SEQ(CI=Z%II=I)
T5(R=Y%DF=Y%T=41%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
T6(R=Y%DF=Y%T=41%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
T7(R=Y%DF=Y%T=41%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
U1(R=Y%DF=N%T=41%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)
IE(R=Y%DFI=N%T=41%CD=S)
Network Distance: 1 hop
Read data files from: /usr/local/bin/../share/nmap
OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 5.54 seconds
Raw packets sent: 1040 (46.884KB) | Rcvd: 1028 (42.232KB)
root@bt:~#
¿ Con qué otro analizador podría invesigar esta red ?