The same “sun-answerbook” description was showing up for the device at 192.168.4.21. The next mystery was the “sun-answerbook” description for the Raspberry Pi with IP address 192.168.4.18. The IP address that is now missing from the second set of results will be the device you just powered off. One way to be certain about the id of a device is to perform a scan, turn the device off and scan again. The lower the number, the less impact nmap will have on the bandwidth and other network users. The timing modes have great names: paranoid (0), sneaky (1), polite (2), normal (3), aggressive (4), and insane (5). The -T (timing template) option allows us to specify a value from 0 to 5. The -A (aggressive scan) option forces nmap to use operating system detection, version detection, script scanning, and traceroute detection. We can use nmap more aggressively to try to winkle more information out of the device. The device with IP Address 192.168.4.11 had an unknown manufacturer and a lot of ports open. RELATED: How to Turn a Raspberry Pi into a Low-Power Network Storage Device Unknown Device With Many Open Ports It uses Samba so that I can connect to it from any computer on my network. This makes sense I use that particular Pi as a sort of mini-Network Attached Storage device (NAS). SMB is a means of sharing folders and files across a network. Samba is a free software implementation of Microsoft’s Server Message Block protocol (SMB). We’ve Lined Up The Suspects Let’s Make Them Talkĭevice 192.168.4.10 is a Raspberry Pi that has port 445 open, which is described as “microsoft-ds.” A quick bit of Internet searching reveals that port 445 is usually associated with Samba. The more doors and windows you have, the more potential points of entry a burglar has. The more ports a device has open, the more chances a cybercriminal has of getting into it-if it is exposed directly to the Internet that is. I’ve never heard of them, and the device has a lot of ports open, so we’ll be looking into that. Does my printer incorporate a website?ĭevice 192.168.4.31 is reportedly manufactured by a company called Elitegroup Computer Systems. This port is reserved for website traffic. What caught my eye was the HTTP port 80 being present and open. But definitely, there should be more than one showing up.ĭevice 192.168.4.22 was identified earlier as a Samsung printer, which is verified here by the tag that says “printer”. How many are connected to the network will always vary because they’re continually swapped in and out of duty as they get re-imaged and re-purposed. Liteon technology and Elitegroup Computer systems, for example. There are several devices with names that don’t mean anything to me all. It allows them to pester me at home more easily, so I’m well aware of that device. The Avaya device is a Voice Over IP phone that provides me with an extension on the telephone system at head office. There’s a couple of devices listed as manufactured by Dell. The only Samsung device I have is a laser printer, so that narrows that one down. The Amazon Technologies device will be my Echo Dot. Raspberry Pi Foundation is self-explanatory. What some of these devices are is clear to me. These are the ones we need to investigate further. When you look through your results, you will likely see devices that you recognize. It can deduce a lot about the device it is probing by judging and interpreting the type of responses it gets. It works by sending various network messages to the IP addresses in the range we’re going to provide it with it. RELATED: How Do IP Addresses Work? Get Started with nmap Happily, nmap works with that notation, so we have what we need to start to use nmap. And because the largest number you can hold in an 8-bit binary number is 255, the IP address range for this network will be 192.168.4.0 through to 192.168.4.255.Īll of that is encapsulated in the “/24”. This subnet mask informs the hardware that the first three numbers of the IP address will identify the network and the last part of the IP address identifies the individual devices. The subnet mask and the IP address are used to indicate which part of the IP address identifies the network, and which part identifies the device. The “/24” means that there are three consecutive sets of eight 1’s in the subnet mask. The IP address of this computer is “192.168.4.25”. In the bottom section of the output, you will find your ip address.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |