/l3/users/eb/2009/linux0/root :1 :2 :3 :4 :5 :6 :7 :8 :9 :10 :11 :12 :13 :14 :15 :16 :17 :18 :19 :20 :21 :22 :23 :24 :25 :26 :27 :28 :29 :30 :31 :32 :33 :34 :35 :36 :37 :38 :39 :40 :41 :42 :43 |
|
#df -i
Файловая система Инодов Испол Своб Исп % смонтирована на tmpfs 32786 4 32782 1% /lib/init/rw udev 32786 1020 31766 4% /dev tmpfs 32786 3 32783 1% /dev/shm rootfs 262144 35620 226524 14% / |
#dumpe2fs | less
|
#dumpe2fs /dev/hda1 | less
|
#ping 192.168.107.2
PING 192.168.107.2 (192.168.107.2) 56(84) bytes of data. From 10.0.35.1: icmp_seq=2 Redirect Host(New nexthop: 10.0.35.22) --- 192.168.107.2 ping statistics --- 2 packets transmitted, 0 received, 100% packet loss, time 1008ms |
#ping 192.168.107.1
PING 192.168.107.1 (192.168.107.1) 56(84) bytes of data. 64 bytes from 192.168.107.1: icmp_seq=1 ttl=63 time=0.218 ms --- 192.168.107.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.218/0.218/0.218/0.000 ms |
#ssh 192.168.107.2
|
#w
13:55:03 up 22:46, 20 users, load average: 0,00, 0,00, 0,00 USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT root pts/2 linux9.unix.nt 09:48 1:24m 0.12s 0.00s script -f -c ba root pts/6 192.168.106.2 10:04 1:17m 0.16s 0.01s script -f -c ba root pts/8 192.168.108.2 13:54 1.00s 0.01s 0.01s script -f -c ba root pts/10 192.168.107.2 12:16 1:38m 0.03s 0.00s script -f -c ba root pts/14 linux3.unix.nt 10:17 48:49 0.07s 0.00s script -f -c ba root pts/16 192.168.103.2 10:17 3:10m 0.10s 0.00s script -f -c ba root pts/18 linux15.unix.nt 10:17 3:09m 0.10s 0.01s script -f -c ba root pts/20 192.168.105.2 10:18 1:14m 0.03s 0.02s script -f -c ba ... root pts/32 linux1.unix.nt 10:57 1:01m 0.02s 0.00s script -f -c ba root pts/34 192.168.101.2 11:08 1:33m 0.03s 0.01s script -f -c ba root pts/36 192.168.107.2 11:10 2:44m 0.00s 0.00s script -f -c ba root pts/12 192.168.102.2 10:16 2:02m 0.13s 0.00s script -f -c ba root pts/0 :pts/2:S.0 Mon17 1:04m 0.09s 0.02s script -f -c /b root pts/3 linux6.unix.nt Mon17 2:15m 0.21s 0.00s script -f -c ba root pts/24 :pts/31:S.1 10:41 1:00m 0.11s 0.03s script -f -c /b root pts/38 :pts/23:S.2 11:33 2:20m 0.00s 0.00s script -f -c /b root pts/40 192.168.104.8 11:39 2:15m 0.03s 0.01s script -f -c ba root pts/42 linux13.unix.nt 11:48 1:01m 0.03s 0.00s script -f -c ba |
#screen -x pts/10
|
#screen -x pts/11
|
#ssh 192.168.107.2
ssh: connect to host 192.168.107.2 port 22: Connection timed out |
#ssh 192.168.107.2
ssh: connect to host 192.168.107.2 port 22: Connection timed out |
#iptables -L --line-numbers
Chain INPUT (policy ACCEPT) num target prot opt source destination 1 ACCEPT all -- anywhere anywhere ctstate RELATED Chain FORWARD (policy ACCEPT) num target prot opt source destination Chain OUTPUT (policy ACCEPT) num target prot opt source destination |
#iptables -h
iptables v1.4.3.2 Usage: iptables -[AD] chain rule-specification [options] iptables -I chain [rulenum] rule-specification [options] iptables -R chain rulenum rule-specification [options] iptables -D chain rulenum [options] iptables -[LS] [chain [rulenum]] [options] iptables -[FZ] [chain] [options] iptables -[NX] chain iptables -E old-chain-name new-chain-name iptables -P chain target [options] ... [!] --out-interface -o output name[+] network interface name ([+] for wildcard) --table -t table table to manipulate (default: `filter') --verbose -v verbose mode --line-numbers print line numbers when listing --exact -x expand numbers (display exact values) [!] --fragment -f match second or further fragments only --modprobe=<command> try to insert modules using this command --set-counters PKTS BYTES set the counter during insert/append [!] --version -V print package version. |
#apt-get install 192.168.15.1
Чтение списков пакетов... Готово Построение дерева зависимостей Чтение информации о состоянии... Готово E: Не удалось найти пакет 192.168.15.1 |
#apt-get install nmap
Чтение списков пакетов... Готово Построение дерева зависимостей Чтение информации о состоянии... Готово НОВЫЕ пакеты, которые будут установлены: nmap обновлено 0, установлено 1 новых пакетов, для удаления отмечено 0 пакетов, и 17 пакетов не обновлено. Необходимо скачать 1072kБ архивов. После данной операции, объём занятого дискового пространства возрастёт на 3801kB. Получено:1 http://10.0.35.1 sid/main nmap 4.68-1 [1072kB] Получено 1072kБ за 0s (16,4MБ/c) Выбор ранее не выбранного пакета nmap. (Чтение базы данных ... на данный момент установлено 24168 файлов и каталогов.) Распаковывается пакет nmap (из файла .../archives/nmap_4.68-1_i386.deb)... Обрабатываются триггеры для man-db ... Настраивается пакет nmap (4.68-1) ... |
#nmap -sF 192.168.15.1
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 14:56 EEST Interesting ports on linux1.unix.nt (192.168.15.1): Not shown: 1712 closed ports PORT STATE SERVICE 22/tcp open|filtered ssh 110/tcp open|filtered pop3 9999/tcp open|filtered abyss Nmap done: 1 IP address (1 host up) scanned in 3.369 seconds |
#nmap -sF 192.168.15.3
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 14:56 EEST Stats: 0:00:16 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 1.88% done; ETC: 15:11 (0:14:22 remaining) Stats: 0:00:27 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 2.78% done; ETC: 15:13 (0:15:54 remaining) |
#nmap 192.168.107.2
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 14:57 EEST Stats: 0:00:08 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan SYN Stealth Scan Timing: About 1.49% done; ETC: 15:06 (0:08:33 remaining) Stats: 0:00:11 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan SYN Stealth Scan Timing: About 1.59% done; ETC: 15:08 (0:11:07 remaining) Stats: 0:00:11 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan SYN Stealth Scan Timing: About 1.68% done; ETC: 15:09 (0:11:16 remaining) Stats: 0:00:13 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan SYN Stealth Scan Timing: About 1.70% done; ETC: 15:10 (0:12:26 remaining) Stats: 0:00:38 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan SYN Stealth Scan Timing: About 3.57% done; ETC: 15:15 (0:17:10 remaining) |
#nmap -T4 192.168.107.2
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 14:58 EEST Stats: 0:00:04 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan SYN Stealth Scan Timing: About 53.85% done; ETC: 14:58 (0:00:03 remaining) Interesting ports on 192.168.107.2: Not shown: 1714 filtered ports PORT STATE SERVICE 22/tcp open ssh Nmap done: 1 IP address (1 host up) scanned in 7.506 seconds |
#nmap -T4 -sS 192.168.107.2
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 14:58 EEST |
#nmap -T4 -sF 192.168.107.2
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 14:58 EEST Interesting ports on 192.168.107.2: Not shown: 1709 closed ports PORT STATE SERVICE 22/tcp open|filtered ssh 79/tcp open|filtered finger 113/tcp open|filtered auth 139/tcp open|filtered netbios-ssn 445/tcp open|filtered microsoft-ds 9999/tcp open|filtered abyss Nmap done: 1 IP address (1 host up) scanned in 3.346 seconds |
#nmap -T4 -sF 192.168.107.1
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 14:58 EEST Interesting ports on 192.168.107.1: Not shown: 1712 closed ports PORT STATE SERVICE 22/tcp open|filtered ssh 111/tcp open|filtered rpcbind 9999/tcp open|filtered abyss Nmap done: 1 IP address (1 host up) scanned in 4.444 seconds |
#ssh 192.168.15.11
ssh: connect to host 192.168.15.11 port 22: Connection refused |
#nmap -T4 -sF 192.168.108.2
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 14:59 EEST Interesting ports on 192.168.108.2: Not shown: 1712 closed ports PORT STATE SERVICE 22/tcp open|filtered ssh 111/tcp open|filtered rpcbind 9999/tcp open|filtered abyss Nmap done: 1 IP address (1 host up) scanned in 22.339 seconds |
#ssh 192.168.15.11
ssh: connect to host 192.168.15.11 port 22: Connection refused |
#ssh 192.168.15.11
ssh: connect to host 192.168.15.11 port 22: Connection refused |
#ssh 192.168.15.11
ssh: connect to host 192.168.15.11 port 22: Connection refused |
#ssh 192.168.15.11
ssh: connect to host 192.168.15.11 port 22: Connection refused |
#nmap -T4 -sF 192.168.102.2
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:01 EEST Stats: 0:00:07 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 1.37% done; ETC: 15:11 (0:09:24 remaining) Warning: Giving up on port early because retransmission cap hit. Stats: 0:00:10 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 1.85% done; ETC: 15:10 (0:08:44 remaining) Stats: 0:00:15 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 3.09% done; ETC: 15:09 (0:08:02 remaining) |
#ssh 192.168.15.11
ssh: connect to host 192.168.15.11 port 22: Connection refused |
#ssh 192.168.15.11
ssh: connect to host 192.168.15.11 port 22: Connection refused |
#ssh 192.168.15.11
ssh: connect to host 192.168.15.11 port 22: Connection refused |
#nmap -T5 -sF 192.168.102.2
Stats: 0:03:06 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 99.99% done; ETC: 15:05 (0:00:00 remaining) Stats: 0:03:06 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 99.99% done; ETC: 15:05 (0:00:00 remaining) Stats: 0:03:06 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 99.99% done; ETC: 15:05 (0:00:00 remaining) Stats: 0:03:06 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 99.99% done; ETC: 15:05 (0:00:00 remaining) Stats: 0:03:06 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 99.99% done; ETC: 15:05 (0:00:00 remaining) ... Stats: 0:03:10 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 99.99% done; ETC: 15:05 (0:00:00 remaining) Stats: 0:03:10 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 99.99% done; ETC: 15:05 (0:00:00 remaining) Stats: 0:03:10 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 99.99% done; ETC: 15:05 (0:00:00 remaining) Stats: 0:03:10 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 99.99% done; ETC: 15:05 (0:00:00 remaining) All 1715 scanned ports on 192.168.102.2 are open|filtered (1511) or filtered (204) Nmap done: 1 IP address (1 host up) scanned in 200.697 seconds |
#nmap -T5 -sF 192.168.15.3
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:05 EEST Warning: Giving up on port early because retransmission cap hit. Stats: 0:00:18 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 13.08% done; ETC: 15:07 (0:02:00 remaining) Stats: 0:01:24 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 90.55% done; ETC: 15:07 (0:00:08 remaining) Stats: 0:02:20 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 99.99% done; ETC: 15:07 (0:00:00 remaining) Stats: 0:02:48 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 99.99% done; ETC: 15:08 (0:00:00 remaining) Stats: 0:02:48 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 99.99% done; ETC: 15:08 (0:00:00 remaining) All 1715 scanned ports on linux3.unix.nt (192.168.15.3) are open|filtered (1518) or filtered (197) Nmap done: 1 IP address (1 host up) scanned in 192.366 seconds |
#nmap -T 5192.168.15.2
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:06 EEST WARNING: No targets were specified, so 0 hosts scanned. Nmap done: 0 IP addresses (0 hosts up) scanned in 0.020 seconds |
#nmap -T5 192.168.15.2
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:06 EEST Note: Host seems down. If it is really up, but blocking our ping probes, try -PN Nmap done: 1 IP address (0 hosts up) scanned in 1.698 seconds |
#nmap -T5 192.168.105.2
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:06 EEST Stats: 0:00:01 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan SYN Stealth Scan Timing: About 1.25% done; ETC: 15:08 (0:01:27 remaining) Stats: 0:00:03 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan SYN Stealth Scan Timing: About 35.89% done; ETC: 15:06 (0:00:05 remaining) Stats: 0:00:05 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan SYN Stealth Scan Timing: About 99.99% done; ETC: 15:06 (0:00:00 remaining) All 1715 scanned ports on 192.168.105.2 are filtered Nmap done: 1 IP address (1 host up) scanned in 5.228 seconds |
#nmap -T5 192.168.15.9
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:06 EEST Warning: Giving up on port early because retransmission cap hit. Interesting ports on linux9.unix.nt (192.168.15.9): Not shown: 1707 closed ports PORT STATE SERVICE 22/tcp open ssh 110/tcp open pop3 111/tcp open rpcbind 479/tcp filtered iafserver 763/tcp filtered cycleserv 2015/tcp filtered cypress 9105/tcp filtered jetdirect 9999/tcp open abyss Nmap done: 1 IP address (1 host up) scanned in 3.901 seconds |
#nmap -sF 192.168.107.1
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:29 EEST |
#ssh 192.168.15.12
|
#ssh 192.168.15.12
|
#ssh 192.168.106.2
|
#ssh 192.168.15.12
|
#ssh 192.168.15.11
The authenticity of host '192.168.15.11 (192.168.15.11)' can't be established. RSA key fingerprint is 34:6c:c2:da:38:7c:d7:17:e9:cd:17:8d:e7:cf:f1:a6. Are you sure you want to continue connecting (yes/no)? no Host key verification failed. |
#ssh 192.168.15.12
|
#ssh 192.168.106.2
|
#ssh 192.168.106.2
|
#ssh 192.168.106.1
The authenticity of host '192.168.106.1 (192.168.106.1)' can't be established. RSA key fingerprint is 34:6c:c2:da:38:7c:d7:17:e9:cd:17:8d:e7:cf:f1:a6. Are you sure you want to continue connecting (yes/no)? no Host key verification failed. |
#ssh 192.168.106.1
The authenticity of host '192.168.106.1 (192.168.106.1)' can't be established. RSA key fingerprint is 34:6c:c2:da:38:7c:d7:17:e9:cd:17:8d:e7:cf:f1:a6. Are you sure you want to continue connecting (yes/no)? no Host key verification failed. |
#ssh 192.168.106.1
The authenticity of host '192.168.106.1 (192.168.106.1)' can't be established. RSA key fingerprint is 34:6c:c2:da:38:7c:d7:17:e9:cd:17:8d:e7:cf:f1:a6. Are you sure you want to continue connecting (yes/no)? no Host key verification failed. |
#ssh 192.168.106.2
|
#ssh 192.168.106.1
The authenticity of host '192.168.106.1 (192.168.106.1)' can't be established. RSA key fingerprint is 34:6c:c2:da:38:7c:d7:17:e9:cd:17:8d:e7:cf:f1:a6. Are you sure you want to continue connecting (yes/no)? no Host key verification failed. |
#iptables-save
# Generated by iptables-save v1.4.3.2 on Tue Jun 2 15:17:01 2009 *filter :INPUT ACCEPT [30958:2957490] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [46493:3726467] -A INPUT -m conntrack --ctstate RELATED -j ACCEPT COMMIT # Completed on Tue Jun 2 15:17:01 2009 |
#ssh 192.168.106.1
The authenticity of host '192.168.106.1 (192.168.106.1)' can't be established. RSA key fingerprint is 34:6c:c2:da:38:7c:d7:17:e9:cd:17:8d:e7:cf:f1:a6. Are you sure you want to continue connecting (yes/no)? no Host key verification failed. |
#nmap -T5 -sF 192.168.15.11
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:26 EEST Warning: Giving up on port early because retransmission cap hit. Interesting ports on linux11.unix.nt (192.168.15.11): Not shown: 1711 closed ports PORT STATE SERVICE 22/tcp open|filtered ssh 79/tcp open|filtered finger 111/tcp open|filtered rpcbind 9999/tcp open|filtered abyss Nmap done: 1 IP address (1 host up) scanned in 2.640 seconds |
#nmap -T5 -sF 192.168.106.2
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:28 EEST Note: Host seems down. If it is really up, but blocking our ping probes, try -PN Nmap done: 1 IP address (0 hosts up) scanned in 1.698 seconds |
#ssh root@192.168.106.2
The authenticity of host '192.168.106.2 (192.168.106.2)' can't be established. RSA key fingerprint is 34:6c:c2:da:38:7c:d7:17:e9:cd:17:8d:e7:cf:f1:a6. Are you sure you want to continue connecting (yes/no)? n Please type 'yes' or 'no': no Host key verification failed. |
#ls -l /proc/11376/fd/
итого 4 lrwx------ 1 root root 64 Июн 2 12:15 0 -> /dev/pts/25 lrwx------ 1 root root 64 Июн 2 12:15 1 -> /dev/pts/25 lrwx------ 1 root root 64 Июн 2 14:33 2 -> /dev/pts/25 lrwx------ 1 root root 64 Июн 2 12:15 255 -> /dev/pts/25 |
#nmap -T5 192.168.107.1
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:30 EEST Interesting ports on 192.168.107.1: Not shown: 1714 filtered ports PORT STATE SERVICE 22/tcp open ssh Nmap done: 1 IP address (1 host up) scanned in 7.556 seconds |
#nmap -T5 192.168.107.2
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:31 EEST Interesting ports on 192.168.107.2: Not shown: 1714 filtered ports PORT STATE SERVICE 22/tcp open ssh Nmap done: 1 IP address (1 host up) scanned in 4.574 seconds |
#ping 192.168.107.2
PING 192.168.107.2 (192.168.107.2) 56(84) bytes of data. From 192.168.107.2 icmp_seq=1 Destination Port Unreachable From 10.0.35.1: icmp_seq=2 Redirect Host(New nexthop: 10.0.35.22) From 192.168.107.2 icmp_seq=2 Destination Port Unreachable From 192.168.107.2 icmp_seq=3 Destination Port Unreachable --- 192.168.107.2 ping statistics --- 3 packets transmitted, 0 received, +3 errors, 100% packet loss, time 2010ms |
#nmap -P0 -sF 192.168.106.2
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:32 EEST Stats: 0:00:31 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 8.75% done; ETC: 15:38 (0:05:24 remaining) Stats: 0:00:32 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 9.04% done; ETC: 15:38 (0:05:22 remaining) Stats: 0:00:42 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 11.95% done; ETC: 15:38 (0:05:09 remaining) Stats: 0:00:55 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 15.74% done; ETC: 15:38 (0:04:54 remaining) Stats: 0:00:56 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 16.03% done; ETC: 15:38 (0:04:53 remaining) Stats: 0:00:57 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 16.33% done; ETC: 15:38 (0:04:52 remaining) Stats: 0:01:11 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 20.41% done; ETC: 15:38 (0:04:37 remaining) Stats: 0:01:22 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 23.62% done; ETC: 15:38 (0:04:25 remaining) |
#ping 192.168.107.1
PING 192.168.107.1 (192.168.107.1) 56(84) bytes of data. From 192.168.107.1 icmp_seq=1 Destination Port Unreachable From 10.0.35.1: icmp_seq=2 Redirect Host(New nexthop: 10.0.35.22) From 192.168.107.1 icmp_seq=2 Destination Port Unreachable --- 192.168.107.1 ping statistics --- 2 packets transmitted, 0 received, +2 errors, 100% packet loss, time 1214ms |
#nmap -T5 -sF 192.168.107.1
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:35 EEST Warning: Giving up on port early because retransmission cap hit. |
#nmap -P0 -T5 -sF 192.168.106.2
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:33 EEST Stats: 0:00:05 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 4.66% done; ETC: 15:35 (0:01:46 remaining) Stats: 0:00:18 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 19.53% done; ETC: 15:35 (0:01:15 remaining) Stats: 0:00:18 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 19.83% done; ETC: 15:35 (0:01:15 remaining) Stats: 0:00:40 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 44.61% done; ETC: 15:35 (0:00:50 remaining) Stats: 0:00:41 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 45.77% done; ETC: 15:35 (0:00:49 remaining) Stats: 0:01:21 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 90.67% done; ETC: 15:35 (0:00:08 remaining) Stats: 0:01:21 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 90.99% done; ETC: 15:35 (0:00:08 remaining) Stats: 0:01:21 elapsed; 0 hosts completed (1 up), 1 undergoing FIN Scan FIN Scan Timing: About 91.25% done; ETC: 15:35 (0:00:07 remaining) All 1715 scanned ports on 192.168.106.2 are open|filtered Nmap done: 1 IP address (1 host up) scanned in 90.168 seconds |
#telnet 192.168.106.2 22
bash: telnet: команда не найдена |
#nc 192.168.106.2
no port[s] to connect to |
#nc 192.168.106.2 22
SSH-2.0-OpenSSH_5.1p1 Debian-5+b1 ^] |
#nmap -P0 -T3 192.168.106.2
SENT (4.2040s) TCP 10.0.35.100:57988 > 192.168.106.2:1008 S ttl=56 id=36486 iplen=44 seq=192622642 win=1024 <mss 1460> RCVD (4.2110s) TCP 192.168.106.2:45420 > 10.0.35.100:22 A ttl=62 id=13919 iplen=52 seq=738041502 win=1002 ack=2676532735 <nop,nop,timestamp 1150290 21947459> RCVD (4.2120s) TCP 192.168.106.2:45420 > 10.0.35.100:22 A ttl=62 id=13920 iplen=52 seq=738041502 win=1002 ack=2676533039 <nop,nop,timestamp 1150291 21947459> RCVD (4.2140s) TCP 192.168.106.2:45420 > 10.0.35.100:22 A ttl=62 id=13921 iplen=52 seq=738041502 win=1002 ack=2676533263 <nop,nop,timestamp 1150291 21947459> RCVD (4.2170s) TCP 192.168.106.2:45420 > 10.0.35.100:22 A ttl=62 id=13922 iplen=52 seq=738041502 win=1002 ack=2676533535 <nop,nop,timestamp 1150292 21947462> SENT (4.2230s) TCP 10.0.35.100:57988 > 192.168.106.2:150 S ttl=48 id=53891 iplen=44 seq=192622642 win=1024 <mss 1460> SENT (4.2230s) TCP 10.0.35.100:57988 > 192.168.106.2:231 S ttl=56 id=19646 iplen=44 seq=192622642 win=1024 <mss 1460> SENT (4.2230s) TCP 10.0.35.100:57988 > 192.168.106.2:4000 S ttl=41 id=58925 iplen=44 seq=192622642 win=2048 <mss 1460> RCVD (4.2250s) TCP 192.168.106.2:45420 > 10.0.35.100:22 A ttl=62 id=13923 iplen=52 seq=738041502 win=1002 ack=2676533807 <nop,nop,timestamp 1150294 21947464> RCVD (4.2310s) TCP 192.168.106.2:45420 > 10.0.35.100:22 A ttl=62 id=13924 iplen=52 seq=738041502 win=1002 ack=2676534111 <nop,nop,timestamp 1150296 21947464> ... SENT (4.5340s) TCP 10.0.35.100:57987 > 192.168.106.2:383 S ttl=49 id=13308 iplen=44 seq=192557107 win=2048 <mss 1460> SENT (4.5340s) TCP 10.0.35.100:57987 > 192.168.106.2:903 S ttl=46 id=24082 iplen=44 seq=192557107 win=3072 <mss 1460> SENT (4.5340s) TCP 10.0.35.100:57987 > 192.168.106.2:90 S ttl=56 id=64491 iplen=44 seq=192557107 win=1024 <mss 1460> SENT (4.5340s) TCP 10.0.35.100:57987 > 192.168.106.2:4343 S ttl=54 id=6560 iplen=44 seq=192557107 win=3072 <mss 1460> SENT (4.5340s) TCP 10.0.35.100:57987 > 192.168.106.2:1506 S ttl=48 id=27943 iplen=44 seq=192557107 win=1024 <mss 1460> SENT (4.5340s) TCP 10.0.35.100:57987 > 192.168.106.2:400 S ttl=48 id=13910 iplen=44 seq=192557107 win=1024 <mss 1460> RCVD (4.5370s) TCP 192.168.106.2:45420 > 10.0.35.100:22 A ttl=62 id=14001 iplen=52 seq=738041502 win=1002 ack=2676550847 <nop,nop,timestamp 1150372 21947542> RCVD (4.5420s) TCP 192.168.106.2:45420 > 10.0.35.100:22 A ttl=62 id=14002 iplen=52 seq=738041502 win=1002 ack=2676551151 <nop,nop,timestamp 1150373 21947542> RCVD (4.5430s) TCP 192.168.106.2:45420 > 10.0.35.100:22 A ttl=62 id=14003 iplen=52 seq=738041502 win=1002 ack=2676551455 <nop,nop,timestamp 1150373 21947542> SENT (4.5440s) TCP 10.0.35.100:57987 > 192.168.106.2:6701 S ttl=49 id=10940 iplen=44 seq=192557107 win=2048 <mss 1460> |
#nmap 192.168.106.2
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:36 EEST Note: Host seems down. If it is really up, but blocking our ping probes, try -PN Nmap done: 1 IP address (0 hosts up) scanned in 3.085 seconds |
#nmap -P0 192.168.106.2
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:36 EEST Interesting ports on 192.168.106.2: Not shown: 1714 filtered ports PORT STATE SERVICE 22/tcp open ssh Nmap done: 1 IP address (1 host up) scanned in 9.174 seconds |
#nmap -P0 -T5 192.168.107.1
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:37 EEST |
#iptables-save
# Generated by iptables-save v1.4.3.2 on Tue Jun 2 15:37:49 2009 *filter :INPUT ACCEPT [52490:4222269] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [91868:16414995] -A INPUT -m conntrack --ctstate RELATED -j ACCEPT COMMIT # Completed on Tue Jun 2 15:37:49 2009 |
#nmap -T5 -sS 192.168.107.1
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:38 EEST Interesting ports on 192.168.107.1: Not shown: 1714 filtered ports PORT STATE SERVICE 22/tcp open ssh Nmap done: 1 IP address (1 host up) scanned in 18.134 seconds |
#nmap -P0 -T5 192.168.107.1
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:38 EEST Stats: 0:00:03 elapsed; 0 hosts completed (0 up), 0 undergoing Host Discovery Parallel DNS resolution of 1 host. Timing: About 0.00% done Stats: 0:00:09 elapsed; 0 hosts completed (0 up), 0 undergoing Host Discovery Parallel DNS resolution of 1 host. Timing: About 0.00% done Stats: 0:00:12 elapsed; 0 hosts completed (0 up), 0 undergoing Host Discovery Parallel DNS resolution of 1 host. Timing: About 0.00% done Interesting ports on 192.168.107.1: Not shown: 1714 filtered ports PORT STATE SERVICE 22/tcp open ssh Nmap done: 1 IP address (1 host up) scanned in 19.943 seconds |
#nmap -P0 -T5 192.168.107.2
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:38 EEST Stats: 0:00:07 elapsed; 0 hosts completed (0 up), 0 undergoing Host Discovery Parallel DNS resolution of 1 host. Timing: About 0.00% done Stats: 0:00:14 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan SYN Stealth Scan Timing: About 11.05% done; ETC: 15:39 (0:00:13 remaining) Interesting ports on 192.168.107.2: Not shown: 1714 filtered ports PORT STATE SERVICE 22/tcp open ssh Nmap done: 1 IP address (1 host up) scanned in 18.000 seconds |
#nmap -T5 -P0 -sS 192.168.107.1
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:39 EEST Interesting ports on 192.168.107.1: Not shown: 1714 filtered ports PORT STATE SERVICE 22/tcp open ssh Nmap done: 1 IP address (1 host up) scanned in 19.589 seconds |
#nmap -T5 -P0 -sS 192.168.107.2
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:43 EEST Interesting ports on 192.168.107.2: Not shown: 1714 closed ports PORT STATE SERVICE 22/tcp open ssh Nmap done: 1 IP address (1 host up) scanned in 14.492 seconds |
#arp -a
? (10.0.35.9) at 00:04:75:82:53:43 [ether] on eth0 ? (10.0.35.1) at 00:16:3E:04:00:01 [ether] on eth0 ? (192.168.16.2) at 00:16:3E:04:00:12 [ether] PERM on eth0 ? (10.0.35.22) at 00:15:60:7A:63:80 [ether] on eth0 ? (192.168.16.2) at <from_interface> PERM PUB on eth0 |
#nmap -P0 -T5 192.168.104.8
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:41 EEST Interesting ports on 192.168.104.8: Not shown: 1714 closed ports PORT STATE SERVICE 22/tcp open ssh Nmap done: 1 IP address (1 host up) scanned in 14.529 seconds |
#man iptables
|
#nmap -T5 -P0 -sS 192.168.107.1
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 15:45 EEST Interesting ports on 192.168.107.1: Not shown: 1714 closed ports PORT STATE SERVICE 22/tcp open ssh Nmap done: 1 IP address (1 host up) scanned in 14.582 seconds |
Время первой команды журнала | 12:48:48 2009- 6- 2 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
Время последней команды журнала | 15:45:30 2009- 6- 2 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
Количество командных строк в журнале | 101 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
Процент команд с ненулевым кодом завершения, % | 27.72 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
Процент синтаксически неверно набранных команд, % | 1.98 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
Суммарное время работы с терминалом *, час | 1.92 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
Количество командных строк в единицу времени, команда/мин | 0.88 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
Частота использования команд |
|
В журнал автоматически попадают все команды, данные в любом терминале системы.
Для того чтобы убедиться, что журнал на текущем терминале ведётся, и команды записываются, дайте команду w. В поле WHAT, соответствующем текущему терминалу, должна быть указана программа script.
Команды, при наборе которых были допущены синтаксические ошибки, выводятся перечёркнутым текстом:
$ l s-l bash: l: command not found |
Если код завершения команды равен нулю, команда была выполнена без ошибок. Команды, код завершения которых отличен от нуля, выделяются цветом.
$ test 5 -lt 4 |
Команды, ход выполнения которых был прерван пользователем, выделяются цветом.
$ find / -name abc find: /home/devi-orig/.gnome2: Keine Berechtigung find: /home/devi-orig/.gnome2_private: Keine Berechtigung find: /home/devi-orig/.nautilus/metafiles: Keine Berechtigung find: /home/devi-orig/.metacity: Keine Berechtigung find: /home/devi-orig/.inkscape: Keine Berechtigung ^C |
Команды, выполненные с привилегиями суперпользователя, выделяются слева красной чертой.
# id uid=0(root) gid=0(root) Gruppen=0(root) |
Изменения, внесённые в текстовый файл с помощью редактора, запоминаются и показываются в журнале в формате ed. Строки, начинающиеся символом "<", удалены, а строки, начинающиеся символом ">" -- добавлены.
$ vi ~/.bashrc
|
Для того чтобы изменить файл в соответствии с показанными в диффшоте изменениями, можно воспользоваться командой patch. Нужно скопировать изменения, запустить программу patch, указав в качестве её аргумента файл, к которому применяются изменения, и всавить скопированный текст:
$ patch ~/.bashrc |
Для того чтобы получить краткую справочную информацию о команде, нужно подвести к ней мышь. Во всплывающей подсказке появится краткое описание команды.
Если справочная информация о команде есть, команда выделяется голубым фоном, например: vi. Если справочная информация отсутствует, команда выделяется розовым фоном, например: notepad.exe. Справочная информация может отсутствовать в том случае, если (1) команда введена неверно; (2) если распознавание команды LiLaLo выполнено неверно; (3) если информация о команде неизвестна LiLaLo. Последнее возможно для редких команд.
Большие, в особенности многострочные, всплывающие подсказки лучше всего показываются браузерами KDE Konqueror, Apple Safari и Microsoft Internet Explorer. В браузерах Mozilla и Firefox они отображаются не полностью, а вместо перевода строки выводится специальный символ.
Время ввода команды, показанное в журнале, соответствует времени начала ввода командной строки, которое равно тому моменту, когда на терминале появилось приглашение интерпретатора
Имя терминала, на котором была введена команда, показано в специальном блоке. Этот блок показывается только в том случае, если терминал текущей команды отличается от терминала предыдущей.
Вывод не интересующих вас в настоящий момент элементов журнала, таких как время, имя терминала и других, можно отключить. Для этого нужно воспользоваться формой управления журналом вверху страницы.
Небольшие комментарии к командам можно вставлять прямо из командной строки. Комментарий вводится прямо в командную строку, после символов #^ или #v. Символы ^ и v показывают направление выбора команды, к которой относится комментарий: ^ - к предыдущей, v - к следующей. Например, если в командной строке было введено:
$ whoami
user
$ #^ Интересно, кто я?в журнале это будет выглядеть так:
$ whoami
user
Интересно, кто я? |
Если комментарий содержит несколько строк, его можно вставить в журнал следующим образом:
$ whoami
user
$ cat > /dev/null #^ Интересно, кто я?
Программа whoami выводит имя пользователя, под которым мы зарегистрировались в системе. - Она не может ответить на вопрос о нашем назначении в этом мире.В журнале это будет выглядеть так:
$ whoami user
|
Комментарии, не относящиеся непосредственно ни к какой из команд, добавляются точно таким же способом, только вместо симолов #^ или #v нужно использовать символы #=
1 2 3 4Группы команд, выполненных на разных терминалах, разделяются специальной линией. Под этой линией в правом углу показано имя терминала, на котором выполнялись команды. Для того чтобы посмотреть команды только одного сенса, нужно щёкнуть по этому названию.
LiLaLo (L3) расшифровывается как Live Lab Log.
Программа разработана для повышения эффективности обучения Unix/Linux-системам.
(c) Игорь Чубин, 2004-2008