Voila je me remet à jours sur l'utilisation des serveurs en me remontant un "2012 R2 Standard" sous VirtualBox. Pas de soucis en soi mais une petite énigme que j'avoue ne pas résoudre ^^.
Donc apres avoir configuré le ADDS, j'ai installé le DHCP avec une plage IP de "192.168.1.240" jusqu'à "192.168.1.254" et l'adresse de ma box orange "192.168.1.1".
Et bien la colle arrive lorsque j'ai voulu regarder la télé d'orange sur ma télé pendant que le serveur se mettait à jour, la tele d'orange me demandé en boucle mes identifiants de connexion en boucle... j'ai cherché partout mais sans succès d'où venait le problème (pas de coupure de courant dans la journée, pas de soucis sur la ligne lors des tests, ectect) et je ne sais pas pourquoi (sans doute le désespoir ^^), je me suis dit : le seul truc qui ai changé c'est la mise en route de mon serveur... je vais donc le couper, je redémarre la box télé et là, paf, elle fonctionne direct sans même me redemander mes identifiants Oo
Alors si quelqu'un pouvez m’éclairer sachant que l'adresse de la box télé n'est pas dans la plage fixé sur le serveur et qu'aucun autre périphérique du réseaux n'a eu de soucis (ps4 en cable, 3 tel en wifi et le pc et ses 2 VM) ?
Merci de vos réponses, je regarde dans l'après midi. De ce que je sais (ou du moins de ce que me dit l'interface livebox) la box télé est en 192.168.1.10 donc, normalement, hors plage DHCP que j'ai établi entre 192.168.1.240 et 192.168.1.254.
Quoi qu'il en soi je vais jeter un oeil à ce que vous m'avez indiqué et je reviens vers vous.
Merci
EDIT : Resultat du nmap (par ZenMap) :
Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-01 14:17 Paris, Madrid (heure d?été)
Happy 20th Birthday to Nmap, may it live to be 120!
NSE: Loaded 146 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 14:17
Completed NSE at 14:17, 0.00s elapsed
Initiating NSE at 14:17
Completed NSE at 14:17, 0.00s elapsed
Initiating ARP Ping Scan at 14:17
Scanning 255 hosts [1 port/host]
Completed ARP Ping Scan at 14:17, 2.11s elapsed (255 total hosts)
Initiating Parallel DNS resolution of 255 hosts. at 14:17
Completed Parallel DNS resolution of 255 hosts. at 14:17, 0.00s elapsed
Nmap scan report for 192.168.1.0 [host down]
Nmap scan report for 192.168.1.2 [host down]
Nmap scan report for 192.168.1.3 [host down]
Nmap scan report for 192.168.1.4 [host down]
Nmap scan report for 192.168.1.5 [host down]
Nmap scan report for 192.168.1.6 [host down]
Nmap scan report for 192.168.1.7 [host down]
Nmap scan report for 192.168.1.8 [host down]
Nmap scan report for 192.168.1.9 [host down]
Nmap scan report for 192.168.1.10 [host down]
Nmap scan report for 192.168.1.11 [host down]
Nmap scan report for 192.168.1.13 [host down]
Nmap scan report for 192.168.1.14 [host down]
Nmap scan report for 192.168.1.15 [host down]
Nmap scan report for 192.168.1.16 [host down]
Nmap scan report for 192.168.1.17 [host down]
Nmap scan report for 192.168.1.18 [host down]
Nmap scan report for 192.168.1.19 [host down]
Nmap scan report for 192.168.1.20 [host down]
Nmap scan report for 192.168.1.21 [host down]
Nmap scan report for 192.168.1.22 [host down]
Nmap scan report for 192.168.1.23 [host down]
Nmap scan report for 192.168.1.24 [host down]
Nmap scan report for 192.168.1.26 [host down]
Nmap scan report for 192.168.1.27 [host down]
Nmap scan report for 192.168.1.28 [host down]
Nmap scan report for 192.168.1.29 [host down]
Nmap scan report for 192.168.1.30 [host down]
Nmap scan report for 192.168.1.31 [host down]
Nmap scan report for 192.168.1.32 [host down]
Nmap scan report for 192.168.1.33 [host down]
Nmap scan report for 192.168.1.34 [host down]
Nmap scan report for 192.168.1.35 [host down]
Nmap scan report for 192.168.1.36 [host down]
Nmap scan report for 192.168.1.37 [host down]
Nmap scan report for 192.168.1.38 [host down]
Nmap scan report for 192.168.1.39 [host down]
Nmap scan report for 192.168.1.40 [host down]
Nmap scan report for 192.168.1.41 [host down]
Nmap scan report for 192.168.1.42 [host down]
Nmap scan report for 192.168.1.43 [host down]
Nmap scan report for 192.168.1.44 [host down]
Nmap scan report for 192.168.1.45 [host down]
Nmap scan report for 192.168.1.46 [host down]
Nmap scan report for 192.168.1.47 [host down]
Nmap scan report for 192.168.1.48 [host down]
Nmap scan report for 192.168.1.49 [host down]
Nmap scan report for 192.168.1.50 [host down]
Nmap scan report for 192.168.1.51 [host down]
Nmap scan report for 192.168.1.52 [host down]
Nmap scan report for 192.168.1.53 [host down]
Nmap scan report for 192.168.1.54 [host down]
Nmap scan report for 192.168.1.56 [host down]
Nmap scan report for 192.168.1.57 [host down]
Nmap scan report for 192.168.1.58 [host down]
Nmap scan report for 192.168.1.59 [host down]
Nmap scan report for 192.168.1.60 [host down]
Nmap scan report for 192.168.1.61 [host down]
Nmap scan report for 192.168.1.62 [host down]
Nmap scan report for 192.168.1.63 [host down]
Nmap scan report for 192.168.1.64 [host down]
Nmap scan report for 192.168.1.65 [host down]
Nmap scan report for 192.168.1.66 [host down]
Nmap scan report for 192.168.1.67 [host down]
Nmap scan report for 192.168.1.68 [host down]
Nmap scan report for 192.168.1.69 [host down]
Nmap scan report for 192.168.1.70 [host down]
Nmap scan report for 192.168.1.71 [host down]
Nmap scan report for 192.168.1.72 [host down]
Nmap scan report for 192.168.1.73 [host down]
Nmap scan report for 192.168.1.74 [host down]
Nmap scan report for 192.168.1.75 [host down]
Nmap scan report for 192.168.1.76 [host down]
Nmap scan report for 192.168.1.77 [host down]
Nmap scan report for 192.168.1.78 [host down]
Nmap scan report for 192.168.1.79 [host down]
Nmap scan report for 192.168.1.80 [host down]
Nmap scan report for 192.168.1.81 [host down]
Nmap scan report for 192.168.1.82 [host down]
Nmap scan report for 192.168.1.83 [host down]
Nmap scan report for 192.168.1.84 [host down]
Nmap scan report for 192.168.1.85 [host down]
Nmap scan report for 192.168.1.86 [host down]
Nmap scan report for 192.168.1.87 [host down]
Nmap scan report for 192.168.1.88 [host down]
Nmap scan report for 192.168.1.89 [host down]
Nmap scan report for 192.168.1.90 [host down]
Nmap scan report for 192.168.1.91 [host down]
Nmap scan report for 192.168.1.92 [host down]
Nmap scan report for 192.168.1.93 [host down]
Nmap scan report for 192.168.1.94 [host down]
Nmap scan report for 192.168.1.95 [host down]
Nmap scan report for 192.168.1.96 [host down]
Nmap scan report for 192.168.1.97 [host down]
Nmap scan report for 192.168.1.98 [host down]
Nmap scan report for 192.168.1.99 [host down]
Nmap scan report for 192.168.1.100 [host down]
Nmap scan report for 192.168.1.101 [host down]
Nmap scan report for 192.168.1.102 [host down]
Nmap scan report for 192.168.1.103 [host down]
Nmap scan report for 192.168.1.104 [host down]
Nmap scan report for 192.168.1.105 [host down]
Nmap scan report for 192.168.1.106 [host down]
Nmap scan report for 192.168.1.107 [host down]
Nmap scan report for 192.168.1.108 [host down]
Nmap scan report for 192.168.1.109 [host down]
Nmap scan report for 192.168.1.110 [host down]
Nmap scan report for 192.168.1.111 [host down]
Nmap scan report for 192.168.1.112 [host down]
Nmap scan report for 192.168.1.113 [host down]
Nmap scan report for 192.168.1.114 [host down]
Nmap scan report for 192.168.1.115 [host down]
Nmap scan report for 192.168.1.116 [host down]
Nmap scan report for 192.168.1.117 [host down]
Nmap scan report for 192.168.1.118 [host down]
Nmap scan report for 192.168.1.119 [host down]
Nmap scan report for 192.168.1.120 [host down]
Nmap scan report for 192.168.1.121 [host down]
Nmap scan report for 192.168.1.122 [host down]
Nmap scan report for 192.168.1.123 [host down]
Nmap scan report for 192.168.1.124 [host down]
Nmap scan report for 192.168.1.125 [host down]
Nmap scan report for 192.168.1.126 [host down]
Nmap scan report for 192.168.1.127 [host down]
Nmap scan report for 192.168.1.128 [host down]
Nmap scan report for 192.168.1.129 [host down]
Nmap scan report for 192.168.1.130 [host down]
Nmap scan report for 192.168.1.131 [host down]
Nmap scan report for 192.168.1.132 [host down]
Nmap scan report for 192.168.1.133 [host down]
Nmap scan report for 192.168.1.134 [host down]
Nmap scan report for 192.168.1.135 [host down]
Nmap scan report for 192.168.1.136 [host down]
Nmap scan report for 192.168.1.137 [host down]
Nmap scan report for 192.168.1.138 [host down]
Nmap scan report for 192.168.1.139 [host down]
Nmap scan report for 192.168.1.140 [host down]
Nmap scan report for 192.168.1.141 [host down]
Nmap scan report for 192.168.1.142 [host down]
Nmap scan report for 192.168.1.143 [host down]
Nmap scan report for 192.168.1.144 [host down]
Nmap scan report for 192.168.1.145 [host down]
Nmap scan report for 192.168.1.146 [host down]
Nmap scan report for 192.168.1.147 [host down]
Nmap scan report for 192.168.1.148 [host down]
Nmap scan report for 192.168.1.149 [host down]
Nmap scan report for 192.168.1.150 [host down]
Nmap scan report for 192.168.1.151 [host down]
Nmap scan report for 192.168.1.152 [host down]
Nmap scan report for 192.168.1.153 [host down]
Nmap scan report for 192.168.1.154 [host down]
Nmap scan report for 192.168.1.155 [host down]
Nmap scan report for 192.168.1.156 [host down]
Nmap scan report for 192.168.1.157 [host down]
Nmap scan report for 192.168.1.158 [host down]
Nmap scan report for 192.168.1.159 [host down]
Nmap scan report for 192.168.1.160 [host down]
Nmap scan report for 192.168.1.161 [host down]
Nmap scan report for 192.168.1.162 [host down]
Nmap scan report for 192.168.1.163 [host down]
Nmap scan report for 192.168.1.164 [host down]
Nmap scan report for 192.168.1.165 [host down]
Nmap scan report for 192.168.1.166 [host down]
Nmap scan report for 192.168.1.167 [host down]
Nmap scan report for 192.168.1.168 [host down]
Nmap scan report for 192.168.1.169 [host down]
Nmap scan report for 192.168.1.170 [host down]
Nmap scan report for 192.168.1.171 [host down]
Nmap scan report for 192.168.1.172 [host down]
Nmap scan report for 192.168.1.173 [host down]
Nmap scan report for 192.168.1.174 [host down]
Nmap scan report for 192.168.1.175 [host down]
Nmap scan report for 192.168.1.176 [host down]
Nmap scan report for 192.168.1.177 [host down]
Nmap scan report for 192.168.1.178 [host down]
Nmap scan report for 192.168.1.179 [host down]
Nmap scan report for 192.168.1.180 [host down]
Nmap scan report for 192.168.1.181 [host down]
Nmap scan report for 192.168.1.182 [host down]
Nmap scan report for 192.168.1.183 [host down]
Nmap scan report for 192.168.1.184 [host down]
Nmap scan report for 192.168.1.185 [host down]
Nmap scan report for 192.168.1.186 [host down]
Nmap scan report for 192.168.1.187 [host down]
Nmap scan report for 192.168.1.188 [host down]
Nmap scan report for 192.168.1.189 [host down]
Nmap scan report for 192.168.1.190 [host down]
Nmap scan report for 192.168.1.191 [host down]
Nmap scan report for 192.168.1.192 [host down]
Nmap scan report for 192.168.1.193 [host down]
Nmap scan report for 192.168.1.194 [host down]
Nmap scan report for 192.168.1.195 [host down]
Nmap scan report for 192.168.1.196 [host down]
Nmap scan report for 192.168.1.197 [host down]
Nmap scan report for 192.168.1.198 [host down]
Nmap scan report for 192.168.1.199 [host down]
Nmap scan report for 192.168.1.200 [host down]
Nmap scan report for 192.168.1.201 [host down]
Nmap scan report for 192.168.1.202 [host down]
Nmap scan report for 192.168.1.203 [host down]
Nmap scan report for 192.168.1.204 [host down]
Nmap scan report for 192.168.1.205 [host down]
Nmap scan report for 192.168.1.206 [host down]
Nmap scan report for 192.168.1.207 [host down]
Nmap scan report for 192.168.1.208 [host down]
Nmap scan report for 192.168.1.209 [host down]
Nmap scan report for 192.168.1.210 [host down]
Nmap scan report for 192.168.1.211 [host down]
Nmap scan report for 192.168.1.212 [host down]
Nmap scan report for 192.168.1.213 [host down]
Nmap scan report for 192.168.1.214 [host down]
Nmap scan report for 192.168.1.215 [host down]
Nmap scan report for 192.168.1.216 [host down]
Nmap scan report for 192.168.1.217 [host down]
Nmap scan report for 192.168.1.218 [host down]
Nmap scan report for 192.168.1.219 [host down]
Nmap scan report for 192.168.1.220 [host down]
Nmap scan report for 192.168.1.221 [host down]
Nmap scan report for 192.168.1.222 [host down]
Nmap scan report for 192.168.1.223 [host down]
Nmap scan report for 192.168.1.224 [host down]
Nmap scan report for 192.168.1.225 [host down]
Nmap scan report for 192.168.1.226 [host down]
Nmap scan report for 192.168.1.227 [host down]
Nmap scan report for 192.168.1.228 [host down]
Nmap scan report for 192.168.1.229 [host down]
Nmap scan report for 192.168.1.230 [host down]
Nmap scan report for 192.168.1.231 [host down]
Nmap scan report for 192.168.1.232 [host down]
Nmap scan report for 192.168.1.233 [host down]
Nmap scan report for 192.168.1.234 [host down]
Nmap scan report for 192.168.1.235 [host down]
Nmap scan report for 192.168.1.236 [host down]
Nmap scan report for 192.168.1.237 [host down]
Nmap scan report for 192.168.1.238 [host down]
Nmap scan report for 192.168.1.239 [host down]
Nmap scan report for 192.168.1.240 [host down]
Nmap scan report for 192.168.1.241 [host down]
Nmap scan report for 192.168.1.243 [host down]
Nmap scan report for 192.168.1.246 [host down]
Nmap scan report for 192.168.1.247 [host down]
Nmap scan report for 192.168.1.248 [host down]
Nmap scan report for 192.168.1.249 [host down]
Nmap scan report for 192.168.1.250 [host down]
Nmap scan report for 192.168.1.251 [host down]
Nmap scan report for 192.168.1.252 [host down]
Nmap scan report for 192.168.1.253 [host down]
Nmap scan report for 192.168.1.254 [host down]
Nmap scan report for 192.168.1.255 [host down]
Initiating Parallel DNS resolution of 1 host. at 14:17
Completed Parallel DNS resolution of 1 host. at 14:17, 0.00s elapsed
Initiating SYN Stealth Scan at 14:17
Scanning 6 hosts [1000 ports/host]
Discovered open port 80/tcp on 192.168.1.1
Discovered open port 80/tcp on 192.168.1.12
Discovered open port 443/tcp on 192.168.1.12
Discovered open port 443/tcp on 192.168.1.1
Discovered open port 53/tcp on 192.168.1.1
Discovered open port 139/tcp on 192.168.1.1
Discovered open port 445/tcp on 192.168.1.1
Completed SYN Stealth Scan against 192.168.1.244 in 0.86s (5 hosts left)
Completed SYN Stealth Scan against 192.168.1.12 in 0.88s (4 hosts left)
Discovered open port 139/tcp on 192.168.1.55
Discovered open port 445/tcp on 192.168.1.55
Discovered open port 135/tcp on 192.168.1.55
Discovered open port 8080/tcp on 192.168.1.242
Discovered open port 5060/tcp on 192.168.1.55
Discovered open port 5001/tcp on 192.168.1.55
Discovered open port 5000/tcp on 192.168.1.55
Completed SYN Stealth Scan against 192.168.1.25 in 14.58s (3 hosts left)
Discovered open port 5357/tcp on 192.168.1.55
Discovered open port 631/tcp on 192.168.1.1
Discovered open port 8443/tcp on 192.168.1.242
Completed SYN Stealth Scan against 192.168.1.242 in 16.47s (2 hosts left)
Completed SYN Stealth Scan against 192.168.1.1 in 16.55s (1 host left)
Completed SYN Stealth Scan at 14:17, 16.55s elapsed (6000 total ports)
Initiating Service scan at 14:17
Scanning 17 services on 6 hosts
Completed Service scan at 14:19, 127.52s elapsed (17 services on 6 hosts)
Initiating OS detection (try #1) against 6 hosts
Retrying OS detection (try #2) against 4 hosts
Retrying OS detection (try #3) against 192.168.1.242
WARNING: OS didn't match until try #3
NSE: Script scanning 6 hosts.
Initiating NSE at 14:19
Completed NSE at 14:20, 49.63s elapsed
Initiating NSE at 14:20
Completed NSE at 14:20, 1.03s elapsed
Nmap scan report for 192.168.1.1
Host is up (0.0045s latency).
Not shown: 992 filtered ports
PORT STATE SERVICE VERSION
53/tcp open domain dnsmasq 2.55
| dns-nsid:
|_ bind.version: dnsmasq-2.55
80/tcp open http Orange Livebox config httpd (language: fr; model: Sagem lbv3)
|_http-favicon: Unknown favicon MD5: E087488FB0ABDFF26A7EEF6513311924
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-title: Livebox
113/tcp closed ident
135/tcp closed msrpc
139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
443/tcp open ssl/http Orange Livebox config httpd (language: fr; model: Sagem lbv3)
| ssl-cert: Subject: commonName=Livebox V3 G5R0C3/organizationName=Orange/countryName=FR
| Subject Alternative Name: DNS:livebox
| Issuer: commonName=Orange Devices Auth Web CA/organizationName=Orange/countryName=FR
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2014-11-20T15:50:34
| Not valid after: 2019-11-20T15:50:34
| MD5: be62 d57f 83d2 556d 8af5 3831 be3d 815f
|_SHA-1: 4059 7a9d 67dc 8666 e165 ae15 a52c ab9c 51af b0e6
|_ssl-date: TLS randomness does not represent time
445/tcp open netbios-ssn Samba smbd 3.0.37 (workgroup: WORKGROUP)
631/tcp open ipp CUPS 1.3
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: CUPS/1.3
|_http-title: 404 Not Found
MAC Address: 30:7C:B2:52:87:93 (Anov France)
Device type: general purpose|WAP|switch|media device|webcam
Running (JUST GUESSING): Linux 2.6.X|2.4.X (96%), Cisco embedded (95%), HP embedded (92%), Philips embedded (92%), Logitech embedded (90%), Sony embedded (90%), Linksys embedded (90%)
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/h:cisco:rv042 cpe:/o:linux:linux_kernel:2.4.20 cpe:/o:linux:linux_kernel:2.6.18 cpe:/h:logitech:alert_750i cpe:/h:linksys:wap54g
Aggressive OS guesses: Linux 2.6.16 - 2.6.28 (96%), Linux 2.6.26 (95%), Cisco RV042 WAP (Linux 2.6) (95%), Linux 2.6.31 (94%), Linux 2.6.24 (94%), DD-WRT (Linux 2.6.23, MIPS) (93%), HP Brocade 4Gb SAN switch or (92%), Linux 2.6.15 - 2.6.26 (likely embedded) (92%), Blue Coat Director (Linux 2.6.10) (91%), Linux 2.6.9 - 2.6.27 (91%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 0.229 days (since Fri Sep 01 08:51:38 2017)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=206 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Device: broadband router; CPE: cpe:/h:sagem:lbv3
Host script results:
|_clock-skew: mean: 4s, deviation: 0s, median: 4s
| nbstat: NetBIOS name: LIVEBOX, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
| Names:
| LIVEBOX<00> Flags: <unique><active>
| LIVEBOX<03> Flags: <unique><active>
| LIVEBOX<20> Flags: <unique><active>
| \x01\x02__MSBROWSE__\x02<01> Flags: <group><active>
| WORKGROUP<1d> Flags: <unique><active>
| WORKGROUP<1e> Flags: <group><active>
|_ WORKGROUP<00> Flags: <group><active>
| smb-os-discovery:
| OS: Unix (Samba 3.0.37)
| NetBIOS computer name:
| Workgroup: WORKGROUP\x00
|_ System time: 2017-09-01T12:20:06+00:00
| smb-security-mode:
| account_used: guest
| authentication_level: share (dangerous)
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
|_smb2-time: Protocol negotiation failed (SMB2)
TRACEROUTE
HOP RTT ADDRESS
1 4.48 ms 192.168.1.1
Nmap scan report for 192.168.1.12
Host is up (0.0023s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
80/tcp open http Boa HTTPd 0.94.14rc21
|_http-favicon: Unknown favicon MD5: 5BA4BDEABC2852EAEF8FFE97483FDBE9
| http-methods:
|_ Supported Methods: GET HEAD POST
|_http-server-header: Boa/0.94.14rc21
| http-title: Range Extender Setup
|_Requested resource was index.asp
443/tcp open ssl/https axhttpd/1.4.9
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.1 200 OK
| Content-Type: text/html
| <html><head><meta HTTP-EQUIV="REFRESH" content="0; url=/index.html"></head>
| <body>
| <title></title>
| </body></html>
| GenericLines:
| HTTP/1.1 200 OK
| Server: axhttpd/1.4.9
| Content-Type: text/html
| Content-Length: 64
| Date: Thu, 01 Jan 1970 14:57:01 GMT
| Last-Modified: Thu, 01 Jan 1970 00:00:19 GMT
| Expires: Thu, 01 Jan 1970 15:02:01 GMT
| <meta http-equiv="refresh" content="0;url=http://belkin.range">
| GetRequest, HTTPOptions:
| HTTP/1.1 200 OK
| Server: axhttpd/1.4.9
| Content-Type: text/html
| Content-Length: 64
| Date: Thu, 01 Jan 1970 14:56:56 GMT
| Last-Modified: Thu, 01 Jan 1970 00:00:19 GMT
| Expires: Thu, 01 Jan 1970 15:01:56 GMT
| <meta http-equiv="refresh" content="0;url=http://belkin.range">
| RTSPRequest:
| HTTP/1.1 200 OK
| Server: axhttpd/1.4.9
| Content-Type: text/html
| Content-Length: 64
| Date: Thu, 01 Jan 1970 14:57:02 GMT
| Last-Modified: Thu, 01 Jan 1970 00:00:19 GMT
| Expires: Thu, 01 Jan 1970 15:02:02 GMT
| <meta http-equiv="refresh" content="0;url=http://belkin.range">
| SIPOptions:
| HTTP/1.1 200 OK
| Server: axhttpd/1.4.9
| Content-Type: text/html
| Content-Length: 64
| Date: Thu, 01 Jan 1970 14:58:05 GMT
| Last-Modified: Thu, 01 Jan 1970 00:00:19 GMT
| Expires: Thu, 01 Jan 1970 15:03:05 GMT
|_ <meta http-equiv="refresh" content="0;url=http://belkin.range">
|_http-favicon: Unknown favicon MD5: 2B75D3614F3386CFD1C96D6991B3CE44
| http-methods:
|_ Supported Methods: GET POST OPTIONS
|_http-server-header: axhttpd/1.4.9
|_http-title: Site doesn't have a title (text/html).
| ssl-cert: Subject: commonName=127.0.0.1/organizationName=axTLS Project
| Issuer: organizationName=axTLS Project Dodgy Certificate Authority
| Public Key type: rsa
| Public Key bits: 1024
| Signature Algorithm: sha1WithRSAEncryption
| Not valid before: 2010-12-26T22:33:39
| Not valid after: 2024-09-03T22:33:39
| MD5: 3c57 e836 ac9e 4e16 a30d 17e4 c718 8bab
|_SHA-1: f964 0bb7 8995 616b b118 716d 081f d6fa 5ea1 3e80
|_ssl-date: TLS randomness does not represent time
|_sstp-discover: SSTP is supported.
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port443-TCP:V=7.60%T=SSL%I=7%D=9/1%Time=59A94FEC%P=i686-pc-windows-wind
SF:ows%r(GetRequest,10A,"HTTP/1\.1\x20200\x20OK\nServer:\x20axhttpd/1\.4\.
SF:9\nContent-Type:\x20text/html\nContent-Length:\x2064\nDate:\x20Thu,\x20
SF:01\x20Jan\x201970\x2014:56:56\x20GMT\nLast-Modified:\x20Thu,\x2001\x20J
SF:an\x201970\x2000:00:19\x20GMT\nExpires:\x20Thu,\x2001\x20Jan\x201970\x2
SF:015:01:56\x20GMT\n\n<meta\x20http-equiv=\"refresh\"\x20content=\"0;url=
SF:http://belkin\.range\">\n")%r(HTTPOptions,10A,"HTTP/1\.1\x20200\x20OK\n
SF:Server:\x20axhttpd/1\.4\.9\nContent-Type:\x20text/html\nContent-Length:
SF:\x2064\nDate:\x20Thu,\x2001\x20Jan\x201970\x2014:56:56\x20GMT\nLast-Mod
SF:ified:\x20Thu,\x2001\x20Jan\x201970\x2000:00:19\x20GMT\nExpires:\x20Thu
SF:,\x2001\x20Jan\x201970\x2015:01:56\x20GMT\n\n<meta\x20http-equiv=\"refr
SF:esh\"\x20content=\"0;url=http://belkin\.range\">\n")%r(FourOhFourReques
SF:t,9B,"HTTP/1\.1\x20200\x20OK\nContent-Type:\x20text/html\n\n<html><head
SF:><meta\x20HTTP-EQUIV=\"REFRESH\"\x20content=\"0;\x20url=/index\.html\">
SF:</head>\n<body>\n<title></title>\n</body></html>\n")%r(GenericLines,10A
SF:,"HTTP/1\.1\x20200\x20OK\nServer:\x20axhttpd/1\.4\.9\nContent-Type:\x20
SF:text/html\nContent-Length:\x2064\nDate:\x20Thu,\x2001\x20Jan\x201970\x2
SF:014:57:01\x20GMT\nLast-Modified:\x20Thu,\x2001\x20Jan\x201970\x2000:00:
SF:19\x20GMT\nExpires:\x20Thu,\x2001\x20Jan\x201970\x2015:02:01\x20GMT\n\n
SF:<meta\x20http-equiv=\"refresh\"\x20content=\"0;url=http://belkin\.range
SF:\">\n")%r(RTSPRequest,10A,"HTTP/1\.1\x20200\x20OK\nServer:\x20axhttpd/1
SF:\.4\.9\nContent-Type:\x20text/html\nContent-Length:\x2064\nDate:\x20Thu
SF:,\x2001\x20Jan\x201970\x2014:57:02\x20GMT\nLast-Modified:\x20Thu,\x2001
SF:\x20Jan\x201970\x2000:00:19\x20GMT\nExpires:\x20Thu,\x2001\x20Jan\x2019
SF:70\x2015:02:02\x20GMT\n\n<meta\x20http-equiv=\"refresh\"\x20content=\"0
SF:;url=http://belkin\.range\">\n")%r(SIPOptions,10A,"HTTP/1\.1\x20200\x20
SF:OK\nServer:\x20axhttpd/1\.4\.9\nContent-Type:\x20text/html\nContent-Len
SF:gth:\x2064\nDate:\x20Thu,\x2001\x20Jan\x201970\x2014:58:05\x20GMT\nLast
SF:-Modified:\x20Thu,\x2001\x20Jan\x201970\x2000:00:19\x20GMT\nExpires:\x2
SF:0Thu,\x2001\x20Jan\x201970\x2015:03:05\x20GMT\n\n<meta\x20http-equiv=\"
SF:refresh\"\x20content=\"0;url=http://belkin\.range\">\n");
MAC Address: 94:10:3E:EB:DF:03 (Belkin International)
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.9 - 2.6.33
Uptime guess: 0.621 days (since Thu Aug 31 23:25:52 2017)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=197 (Good luck!)
IP ID Sequence Generation: All zeros
TRACEROUTE
HOP RTT ADDRESS
1 2.30 ms 192.168.1.12
Nmap scan report for 192.168.1.25
Host is up (0.00097s latency).
All 1000 scanned ports on 192.168.1.25 are closed
MAC Address: F8:46:1C:3A:E4:D5 (Sony Interactive Entertainment)
Device type: firewall|general purpose|game console
Running: Cisco AsyncOS 7.X, FreeBSD 6.X|7.X|8.X|9.X, Sony embedded
OS CPE: cpe:/h:cisco:ironport_c650 cpe:/o:cisco:asyncos:7.0.1 cpe:/o:freebsd:freebsd:6.2 cpe:/o:freebsd:freebsd:7.0:beta2 cpe:/o:freebsd:freebsd:8.2 cpe:/o:freebsd:freebsd:9.1 cpe:/o:freebsd:freebsd cpe:/h:sony:playstation_4
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop
TRACEROUTE
HOP RTT ADDRESS
1 0.98 ms 192.168.1.25
Nmap scan report for 192.168.1.55
Host is up (0.000055s latency).
Not shown: 993 filtered ports
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Windows 10 Pro 14393 microsoft-ds (workgroup: WORKGROUP)
5000/tcp open http nginx
|_http-favicon: Unknown favicon MD5: 619E4452DA00DAD6C3D7B5FD99B9390E
| http-methods:
|_ Supported Methods: GET HEAD
| http-robots.txt: 1 disallowed entry
|_/
|_http-server-header: nginx
|_http-title: 3CX Phone System Management Console
5001/tcp open ssl/http nginx
|_http-favicon: Unknown favicon MD5: 619E4452DA00DAD6C3D7B5FD99B9390E
| http-methods:
|_ Supported Methods: GET HEAD
| http-robots.txt: 1 disallowed entry
|_/
|_http-server-header: nginx
|_http-title: 3CX Phone System Management Console
| ssl-cert: Subject: commonName=oleon.3cx.fr
| Subject Alternative Name: DNS:oleon.3cx.fr
| Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2017-08-19T09:45:00
| Not valid after: 2017-11-17T09:45:00
| MD5: 3d40 f979 d86c 89f6 53cf 4303 7061 4a79
|_SHA-1: 1416 ec06 fd3a 2711 71a0 b707 f22d 8a1c 433b c6a2
|_ssl-date: TLS randomness does not represent time
| tls-nextprotoneg:
|_ http/1.1
5060/tcp open sip-proxy 3CX PhoneSystem PBX 15.5.3849.1
|_sip-methods: INVITE, ACK, CANCEL, OPTIONS, BYE, REGISTER, SUBSCRIBE, NOTIFY, REFER, INFO, MESSAGE, UPDATE
5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Service Unavailable
MAC Address: FC:AA:14:9F:FF:F5 (Giga-byte Technology)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Microsoft Windows 10 build 10586 - 14393 (95%), Microsoft Windows Phone 7.5 or 8.0 (94%), Microsoft Windows 10 build 14393 (93%), Microsoft Windows Server 2008 R2 or Windows 8.1 (93%), Microsoft Windows Vista SP0 or SP1, Windows Server 2008 SP1, or Windows 7 (93%), Microsoft Windows Embedded Standard 7 (93%), Microsoft Windows Vista SP2, Windows 7 SP1, or Windows Server 2008 (93%), Microsoft Windows 10 build 10586 (92%), Microsoft Windows 7 Professional or Windows 8 (92%), Microsoft Windows Server 2008 R2 (91%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 3.208 days (since Tue Aug 29 09:20:33 2017)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=264 (Good luck!)
IP ID Sequence Generation: Incrementing by 2
Service Info: Host: DESKTOP-2RTRB4L; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
|_clock-skew: mean: 2s, deviation: 0s, median: 2s
| nbstat: NetBIOS name: DESKTOP-2RTRB4L, NetBIOS user: <unknown>, NetBIOS MAC: fc:aa:14:9f:ff:f5 (Giga-byte Technology)
| Names:
| DESKTOP-2RTRB4L<00> Flags: <unique><active>
| WORKGROUP<00> Flags: <group><active>
| DESKTOP-2RTRB4L<20> Flags: <unique><active>
|_ WORKGROUP<1e> Flags: <group><active>
| smb-os-discovery:
| OS: Windows 10 Pro 14393 (Windows 10 Pro 6.3)
| OS CPE: cpe:/o:microsoft:windows_10::-
| Computer name: DESKTOP-2RTRB4L
| NetBIOS computer name: DESKTOP-2RTRB4L\x00
| Workgroup: WORKGROUP\x00
|_ System time: 2017-09-01T14:20:02+02:00
| smb-security-mode:
| account_used: guest
| authentication_level: user
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
| smb2-security-mode:
| 2.02:
|_ Message signing enabled but not required
| smb2-time:
| date: 2017-09-01 14:19:58
|_ start_date: 2017-08-29 09:22:06
TRACEROUTE
HOP RTT ADDRESS
1 0.05 ms 192.168.1.55
Nmap scan report for 192.168.1.242
Host is up (0.00078s latency).
Not shown: 996 filtered ports
PORT STATE SERVICE VERSION
80/tcp closed http
8080/tcp open http-proxy
| fingerprint-strings:
| FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest, Socks5:
| HTTP/1.1 200 OK
| Connection: close
| Content-Type: application/json; charset=UTF-8
| Content-Length: 115
| "result":
| "responseCode": "-11",
| "message": "bad/invalid request",
| "data":
| NULL:
| HTTP/1.1 200 OK
| Connection: close
| Content-Type: application/json; charset=UTF-8
| Content-Length: 100
| "result":
| "responseCode": "-1",
| "message": "error",
|_ "data":
|_http-favicon: Unknown favicon MD5: CE1AC849147A7DB267E9338CD76ADEBF
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-open-proxy: Proxy might be redirecting requests
|_http-title: Site doesn't have a title (application/json; charset=UTF-8).
8443/tcp open ssl/https-alt?
|_ssl-date: TLS randomness does not represent time
55555/tcp closed unknown
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port8080-TCP:V=7.60%I=7%D=9/1%Time=59A94FE0%P=i686-pc-windows-windows%r
SF:(NULL,CE,"HTTP/1\.1\x20200\x20OK\r\nConnection:\x20close\r\nContent-Typ
SF:e:\x20application/json;\x20charset=UTF-8\r\nContent-Length:\x20100\r\n\
SF:r\n{\r\n\x20\x20\"result\":\r\n\x20\x20{\r\n\x20\x20\x20\x20\"responseC
SF:ode\":\x20\"-1\",\r\n\x20\x20\x20\x20\"message\":\x20\"error\",\r\n\x20
SF:\x20\x20\x20\"data\":\r\n\x20\x20\x20\x20{}\r\n\x20\x20}\r\n}")%r(GetRe
SF:quest,DD,"HTTP/1\.1\x20200\x20OK\r\nConnection:\x20close\r\nContent-Typ
SF:e:\x20application/json;\x20charset=UTF-8\r\nContent-Length:\x20115\r\n\
SF:r\n{\r\n\x20\x20\"result\":\r\n\x20\x20{\r\n\x20\x20\x20\x20\"responseC
SF:ode\":\x20\"-11\",\r\n\x20\x20\x20\x20\"message\":\x20\"bad/invalid\x20
SF:request\",\r\n\x20\x20\x20\x20\"data\":\r\n\x20\x20\x20\x20{}\r\n\x20\x
SF:20}\r\n}")%r(HTTPOptions,DD,"HTTP/1\.1\x20200\x20OK\r\nConnection:\x20c
SF:lose\r\nContent-Type:\x20application/json;\x20charset=UTF-8\r\nContent-
SF:Length:\x20115\r\n\r\n{\r\n\x20\x20\"result\":\r\n\x20\x20{\r\n\x20\x20
SF:\x20\x20\"responseCode\":\x20\"-11\",\r\n\x20\x20\x20\x20\"message\":\x
SF:20\"bad/invalid\x20request\",\r\n\x20\x20\x20\x20\"data\":\r\n\x20\x20\
SF:x20\x20{}\r\n\x20\x20}\r\n}")%r(RTSPRequest,DD,"HTTP/1\.1\x20200\x20OK\
SF:r\nConnection:\x20close\r\nContent-Type:\x20application/json;\x20charse
SF:t=UTF-8\r\nContent-Length:\x20115\r\n\r\n{\r\n\x20\x20\"result\":\r\n\x
SF:20\x20{\r\n\x20\x20\x20\x20\"responseCode\":\x20\"-11\",\r\n\x20\x20\x2
SF:0\x20\"message\":\x20\"bad/invalid\x20request\",\r\n\x20\x20\x20\x20\"d
SF:ata\":\r\n\x20\x20\x20\x20{}\r\n\x20\x20}\r\n}")%r(FourOhFourRequest,DD
SF:,"HTTP/1\.1\x20200\x20OK\r\nConnection:\x20close\r\nContent-Type:\x20ap
SF:plication/json;\x20charset=UTF-8\r\nContent-Length:\x20115\r\n\r\n{\r\n
SF:\x20\x20\"result\":\r\n\x20\x20{\r\n\x20\x20\x20\x20\"responseCode\":\x
SF:20\"-11\",\r\n\x20\x20\x20\x20\"message\":\x20\"bad/invalid\x20request\
SF:",\r\n\x20\x20\x20\x20\"data\":\r\n\x20\x20\x20\x20{}\r\n\x20\x20}\r\n}
SF:")%r(Socks5,DD,"HTTP/1\.1\x20200\x20OK\r\nConnection:\x20close\r\nConte
SF:nt-Type:\x20application/json;\x20charset=UTF-8\r\nContent-Length:\x2011
SF:5\r\n\r\n{\r\n\x20\x20\"result\":\r\n\x20\x20{\r\n\x20\x20\x20\x20\"res
SF:ponseCode\":\x20\"-11\",\r\n\x20\x20\x20\x20\"message\":\x20\"bad/inval
SF:id\x20request\",\r\n\x20\x20\x20\x20\"data\":\r\n\x20\x20\x20\x20{}\r\n
SF:\x20\x20}\r\n}");
MAC Address: 80:18:A7:EE:89:FC (Samsung Electronics)
Device type: WAP
Running: AVM embedded
OS CPE: cpe:/h:avm:fritz%21box_fon_wlan_7240
OS details: AVM FRITZ!Box FON WLAN 7240 WAP
Network Distance: 1 hop
TRACEROUTE
HOP RTT ADDRESS
1 0.78 ms 192.168.1.242
Nmap scan report for 192.168.1.244
Host is up (0.0036s latency).
All 1000 scanned ports on 192.168.1.244 are closed
MAC Address: B8:27:EB:58:D1:0F (Raspberry Pi Foundation)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop
TRACEROUTE
HOP RTT ADDRESS
1 3.59 ms 192.168.1.244
Initiating SYN Stealth Scan at 14:20
Scanning 192.168.1.245 [1000 ports]
Discovered open port 3389/tcp on 192.168.1.245
Discovered open port 53/tcp on 192.168.1.245
Discovered open port 139/tcp on 192.168.1.245
Discovered open port 445/tcp on 192.168.1.245
Discovered open port 135/tcp on 192.168.1.245
Discovered open port 49152/tcp on 192.168.1.245
Discovered open port 49159/tcp on 192.168.1.245
Discovered open port 3268/tcp on 192.168.1.245
Discovered open port 3269/tcp on 192.168.1.245
Discovered open port 636/tcp on 192.168.1.245
Discovered open port 88/tcp on 192.168.1.245
Discovered open port 49158/tcp on 192.168.1.245
Discovered open port 464/tcp on 192.168.1.245
Discovered open port 49154/tcp on 192.168.1.245
Discovered open port 49153/tcp on 192.168.1.245
Discovered open port 49157/tcp on 192.168.1.245
Discovered open port 593/tcp on 192.168.1.245
Discovered open port 389/tcp on 192.168.1.245
Discovered open port 49156/tcp on 192.168.1.245
Completed SYN Stealth Scan at 14:20, 0.13s elapsed (1000 total ports)
Initiating Service scan at 14:20
Scanning 19 services on 192.168.1.245
Completed Service scan at 14:21, 58.63s elapsed (19 services on 1 host)
Initiating OS detection (try #1) against 192.168.1.245
Retrying OS detection (try #2) against 192.168.1.245
Retrying OS detection (try #3) against 192.168.1.245
Retrying OS detection (try #4) against 192.168.1.245
Retrying OS detection (try #5) against 192.168.1.245
NSE: Script scanning 192.168.1.245.
Initiating NSE at 14:21
Completed NSE at 14:22, 30.05s elapsed
Initiating NSE at 14:22
Completed NSE at 14:22, 0.00s elapsed
Nmap scan report for 192.168.1.245
Host is up (0.00s latency).
Not shown: 981 closed ports
PORT STATE SERVICE VERSION
53/tcp open domain Microsoft DNS
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2017-09-01 12:20:47Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: hs.local, Site: Default-First-Site-Name)
445/tcp open microsoft-ds Windows Server 2012 R2 Standard 9600 microsoft-ds (workgroup: HS)
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: hs.local, Site: Default-First-Site-Name)
3269/tcp open tcpwrapped
3389/tcp open ssl Microsoft SChannel TLS
| fingerprint-strings:
| TLSSessionReq:
| DDFfGE~
| (1^p>6
| <<}cK
| SERV-HOME.hs.local0
| 170830195201Z
| 180301195201Z0
| SERV-HOME.hs.local0
| {/Dq {K(
| +aVJ
| h?~H
| $0"0
| \xefE
| vFsB
|_ BYc{
| ssl-cert: Subject: commonName=SERV-HOME.hs.local
| Issuer: commonName=SERV-HOME.hs.local
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2017-08-30T19:52:01
| Not valid after: 2018-03-01T19:52:01
| MD5: 028d f149 ba52 9219 1cb2 b84f 69e5 a358
|_SHA-1: 142f 4fb0 031c 0bdd 497b 76fe 619c 9cbe 49bb fd54
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
49156/tcp open msrpc Microsoft Windows RPC
49157/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
49158/tcp open msrpc Microsoft Windows RPC
49159/tcp open msrpc Microsoft Windows RPC
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port3389-TCP:V=7.60%I=7%D=9/1%Time=59A950A4%P=i686-pc-windows-windows%r
SF:(TLSSessionReq,5DE,"\x16\x03\x03\x05\xd9\x02\0\0M\x03\x03Y\xa9P\x9f\)\t
SF:\xe2q\?\xe6\t<\xb5`\nN\xe0\xe8\x1c\x12f\xd1\x81\x14\xd3DDFfGE~\x20\xb3M
SF:\0\0\x14\xa7\xef\x13\x90\xadhQ\x13h\xdb\xb9\(1\^p>6\x10\xbe\xa0<<}cK\x1
SF:18\x009\0\0\x05\xff\x01\0\x01\0\x0b\0\x02\xf2\0\x02\xef\0\x02\xec0\x82\
SF:x02\xe80\x82\x01\xd0\xa0\x03\x02\x01\x02\x02\x10#5\x0eP\x1e\x89p\x90A\x
SF:8c\xfe\xe2\xdcTV\xb80\r\x06\t\*\x86H\x86\xf7\r\x01\x01\x0b\x05\x000\x1d
SF:1\x1b0\x19\x06\x03U\x04\x03\x13\x12SERV-HOME\.hs\.local0\x1e\x17\r17083
SF:0195201Z\x17\r180301195201Z0\x1d1\x1b0\x19\x06\x03U\x04\x03\x13\x12SERV
SF:-HOME\.hs\.local0\x82\x01\"0\r\x06\t\*\x86H\x86\xf7\r\x01\x01\x01\x05\0
SF:\x03\x82\x01\x0f\x000\x82\x01\n\x02\x82\x01\x01\0\xa9\xbb\]5\xa42E-\x1e
SF:\x1d\xfd\xbe{/Dq\x20{K\(\xeb\x81\xea\xf2\\\0\xdc\^\xeb\xe9\xe8\x1c!J\xb
SF:7S\xd6X\x16\xcekh\^\xe5\xff\xa2\xac~\xaf\+aVJ\x9f\xfbig\+\xc4d\x8ef\xe5
SF:\x9f\x94\x8c\xafe2\xfar\xd9h\?~H\xa9\x06\x1c%\xf4\xd4\xdc\x02\x14\x83PY
SF:\x94\xfa{\x17\x01G\x14\no\xd6T\xe4\xc8\xfc\xe7\xc65n\xf1c</\xff{\xfbq\[
SF:\x01&`\x155,\x1cM\xd7\xd0\x10\xd59\x1d3\xa7:_\xbc\xea@\xab\xf5z\xe4:\x1
SF:1\xf1\xa1@Ke\xb0J\x97\x12\xad\^5\xb8\xa5D\xc39\x18\xe5#\\/\xae\xb4\xfbL
SF:G\x1e}\xaf\xa1}\x12\x96\xefPOr\xc7\xe4\+\x13\x17\x899\xfe\xb3~\x05\xc74
SF:\xf8@\xb48>\xcf\x98\x91N\xbd\x1e\x92\x82\xbe\xc7c\x08;\x08\xf2\xcfC\x81
SF:d\xb6\xb5\xc1\xc2\x92\x1a>8\xf4b\x81\xbf\^-\xd3K;\xbdo\n\xc0\xa9\xa1\x8
SF:73s\x85\xe0Q\niM\xd3\x86\xf1\x05\.\xfbE\x02\x03\x01\0\x01\xa3\$0\"0\x13
SF:\x06\x03U\x1d%\x04\x0c0\n\x06\x08\+\x06\x01\x05\x05\x07\x03\x010\x0b\x0
SF:6\x03U\x1d\x0f\x04\x04\x03\x02\x0400\r\x06\t\*\x86H\x86\xf7\r\x01\x01\x
SF:0b\x05\0\x03\x82\x01\x01\0\xa6\xa2\x1c\xd7\xe2I\x01\xbd\x10\xb7N\x94\x9
SF:6\x81\.\xe9oYF\x0b4\xdd:l\x1f\x93\x0e\xda\xd8\n\\\xefE\x1d\[\x97\xb2W\x
SF:01\xb6\xbd\x93r\x80\xcd\x88\xa2\xe5X\xaf\xf8\xbd4\xc8\xf0\?I\xaa\xec\xb
SF:7\x85\xe8\x11s\x98\xec\xd2KkW\x9eK\0J}\xad\x14C\xf7\xec\x98H\xab\xd0\xa
SF:1\xb8v\?\x92\xbah\^\x13J\xd4V\xd9\xa4N'\x8f\xa4\x8d\x80<\x04\x9f\x07,F\
SF:xf0k\x8c\xcbT\xbf\xb0\xab\x96f\xc3J\xa6j\xe2\xd3U8R\xe9\xa2\x9a\x9b\x92
SF:n\xfb\xe6\xe8\xb4\xc6vFsB\x90t\x1cX\xa9\xf6j\x1d\x1d\x98\xfd\xaa\xed\$\
SF:.k\x83M\xf3_\x01\xcaG\xdb\xedK\[\x10\xfe\xcb\xdc\xeek\x1c\xe8BYc{\xe0\x
SF:b8;\|\xcb\x11\x88hY\xdd\xae\x82Q\xfe:\]\x1d\t\xf8l\xa9\x08\xa5j\xc6\x16
SF:\x8e\xb2`l\x0e\xca\xe2\x12i\x10\x1d!\xad\x91\x0fG\xe1\xf9~>\xfdO\xbe\"\
SF:xd2\x92O\x11\x1e\x02;\xb9\xc0\x90\x92\xa9\x95\xa6\xa4iD\xb7\xbd\x9dD\xd
SF:c\xb3\x0c\0\x02\x8a\0\x80\xff\xff\xff\xff\xff\xff\xff\xff\xc9\x0f\xda\x
SF:a2!h\xc24\xc4\xc6b\x8b\x80\xdc\x1c\xd1\)\x02N\x08\x8ag\xcct\x02\x0b\xbe
SF:\xa6;\x13\x9b\"QJ\x08y\x8e4\x04\xdd\xef\x95");
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.60%E=4%D=9/1%OT=53%CT=1%CU=35846%PV=Y%DS=0%DC=L%G=Y%TM=59A950FD
OS:%P=i686-pc-windows-windows)SEQ(SP=106%GCD=1%ISR=109%TI=I%CI=I%II=I%SS=S%
OS:TS=7)OPS(O1=M5B4NW8ST11%O2=M5B4NW8ST11%O3=M5B4NW8NNT11%O4=M5B4NW8ST11%O5
OS:=M5B4NW8ST11%O6=M5B4ST11)WIN(W1=2000%W2=2000%W3=2000%W4=2000%W5=2000%W6=
OS:2000)ECN(R=Y%DF=Y%T=80%W=2000%O=M5B4NW8NNS%CC=Y%Q=)T1(R=Y%DF=Y%T=80%S=O%
OS:A=S+%F=AS%RD=0%Q=)T2(R=Y%DF=Y%T=80%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)T3(R=Y%DF
OS:=Y%T=80%W=0%S=Z%A=O%F=AR%O=%RD=0%Q=)T4(R=Y%DF=Y%T=80%W=0%S=A%A=O%F=R%O=%
OS:RD=0%Q=)T5(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=80%W
OS:=0%S=A%A=O%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
OS:U1(R=Y%DF=N%T=80%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=Z%RUCK=G%RUD=G)IE(R=Y%D
OS:FI=N%T=80%CD=Z)
Uptime guess: 0.136 days (since Fri Sep 01 11:06:12 2017)
Network Distance: 0 hops
TCP Sequence Prediction: Difficulty=262 (Good luck!)
IP ID Sequence Generation: Incremental
Service Info: Host: SERV-HOME; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| nbstat: NetBIOS name: SERV-HOME, NetBIOS user: <unknown>, NetBIOS MAC: 08:00:27:4c:9f:19 (Oracle VirtualBox virtual NIC)
| Names:
| HS<1c> Flags: <group><active>
| HS<00> Flags: <group><active>
| SERV-HOME<00> Flags: <unique><active>
| SERV-HOME<20> Flags: <unique><active>
|_ HS<1b> Flags: <unique><active>
| smb-os-discovery:
| OS: Windows Server 2012 R2 Standard 9600 (Windows Server 2012 R2 Standard 6.3)
| OS CPE: cpe:/o:microsoft:windows_server_2012::-
| Computer name: SERV-HOME
| NetBIOS computer name: SERV-HOME\x00
| Domain name: hs.local
| Forest name: hs.local
| FQDN: SERV-HOME.hs.local
|_ System time: 2017-09-01T14:21:51+02:00
| smb-security-mode:
| account_used: guest
| authentication_level: user
| challenge_response: supported
|_ message_signing: required
| smb2-security-mode:
| 2.02:
|_ Message signing enabled and required
| smb2-time:
| date: 2017-09-01 14:21:51
|_ start_date: 2017-09-01 11:07:03
NSE: Script Post-scanning.
Initiating NSE at 14:22
Completed NSE at 14:22, 0.00s elapsed
Initiating NSE at 14:22
Completed NSE at 14:22, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 256 IP addresses (7 hosts up) scanned in 305.89 seconds
Raw packets sent: 10901 (487.012KB) | Rcvd: 5473 (235.875KB)
et un screen pour les peripheriques detectés :
Voila j'espere que qu'il s'agit bien de se que vous me demandiez (j'avoue ne pas trop connaitre cet outil).
De ce que je vois, la box tele passe en .242 lorsque le serveur est allumé (alors qu'elle est en .10 habituellement) et donc elle rentrerait dans la plage ip assigné (d'ou mon probleme je pense) du coup je ne comprend pas pourquoi 1 : elle change d'ip et 2 : comment fait elle pour rejoindre le domaine sans que je ne le lui ai demandé ? (est ce du au fais qu'elle ne face qu'un en quelque sorte avec la box internet en elle meme ?). Une exception sur son ip devrais me permettre d'avoir et le serveur et la tele de lancé en même temps non ?
Il faudrait voir en détail comment ta télé fonctionne au niveau réseau, mais il semblerait en tout cas que ton serveur DHCP lui attribue une adresse, ce qu'il te suffirait de faire serait de noter son adresse MAC et d'indiquer à ton DHCP de lui donner l'adresse 1.10, comme ça la box continuera de la voir normalement.
Il faudrait voir en détail comment ta télé fonctionne au niveau réseau, mais il semblerait en tout cas que ton serveur DHCP lui attribue une adresse, ce qu'il te suffirait de faire serait de noter son adresse MAC et d'indiquer à ton DHCP de lui donner l'adresse 1.10, comme ça la box continuera de la voir normalement.
En effet je n'y avait pas pensé, je vais tester ça de suite (il me semble avoir vu passer cette option lors de l'attribution de la plage ip. Merci
LoupSolitaire a écrit:
Ça reste pas terrible d'avoir deux serveurs DHCP sur un seul réseau.
J'en convient mais couper celui de la box pourrait, je cite, "empêcher le bon fonctionnement de la box télé", se que je cherche justement à éviter
lecbee a écrit:
NatanielK a écrit:
du coup je ne comprend pas pourquoi 1 : elle change d'ip et 2 : comment fait elle pour rejoindre le domaine sans que je ne le lui ai demandé ?
Elle n'a pas besoin d'être dans le domaine pour récupérer une adresse IP.
Elle récupère l'adresse la plus rapidement disponible, donc du serveur qui lui réponds en premier.
Ha et bien merci de ces éclaircissement, j'etais persuadé que le serveur ne prenait le pas que lorsque son domaine etait rejoind
EDIT :
Merci à tous de vos réponses, l'exclusion par adresse MAC fonctionne parfaitement
Problème résolu
- Edité par NatanielK 2 septembre 2017 à 1:13:59
Petite colle (enfin pour moi)
× Après avoir cliqué sur "Répondre" vous serez invité à vous connecter pour que votre message soit publié.
× Attention, ce sujet est très ancien. Le déterrer n'est pas forcément approprié. Nous te conseillons de créer un nouveau sujet pour poser ta question.
Blond, bouclé, toujours le sourire aux lèvres...
Blond, bouclé, toujours le sourire aux lèvres...
Blond, bouclé, toujours le sourire aux lèvres...