Portál AbcLinuxu, 2. května 2025 19:18
$ nmap -v -sS -O -P0 router Starting nmap 3.50 ( http://www.insecure.org/nmap/ ) at 2005-08-23 23:00 CEST Host 192.168.1.1 appears to be up ... good. Initiating SYN Stealth Scan against 192.168.1.1 at 23:00 Adding open port 21/tcp Adding open port 80/tcp The SYN Stealth Scan took 264 seconds to scan 1659 ports. Warning: OS detection will be MUCH less reliable because we did not find at least 1 open and1 closed TCP port For OSScan assuming that port 21 is open and port 36468 is closed and neither are firewalled Interesting ports on 192.168.1.1: (The 1657 ports scanned but not shown below are in state: filtered) PORT STATE SERVICE 21/tcp open ftp 80/tcp open http Device type: general purpose Running: OpenBSD 3.X OS details: OpenBSD 3.0 SPARC with pf "scrub all" feature, OpenBSD 3.3 X86 with pf "scrub all" feature, OpenBSD 3.4 X86 with pf "scrub all" feature TCP Sequence Prediction: Class=truly random Difficulty=9999999 (Good luck!) IPID Sequence Generation: Randomized Nmap run completed -- 1 IP address (1 host up) scanned in 273.591 seconds
Jde o síťový router s podporou WiFi, takže připojit kabely RJ45, nastavit na Linuxu stejnou síť:
ifconfig eth0:1 192.168.2.10 broadcast 192.168.255.255 netmask 255.255.0.0 up
Připojit se prohlížečem na http://192.168.2.1
(heslo smcadmin
) a nastavit dle požadavků.
Je to strašný křáp, rozhodně nedoporučuji na žádné kritické místo sítě, pro připojení notebooku přes WiFi ale může posloužit dobře.
Dokument vytvořil: Fluttershy, yay!, 26.4.2011 23:09 | Zobrazeno: 683×
Tiskni
Sdílej:
ISSN 1214-1267, (c) 1999-2007 Stickfish s.r.o.