# Сканирование корпоративной инфраструктуры
# 1. Сотрудники ФГБУ ФБ МСЭ:

## 1.1. Андрей Александрович Галько
**Опыт работы**
2007 — 2010 Врач-уролог ЦКБ Российской Академии Наук
2010 — 2011 ударноволнового дробления камней Терапевт ЦВГ 1080 12ГУМО РФ С 2011 — по настоящее время pаведующий урологическим экспертно-реабилитационным отделением ФГБУ ФБ МСЭ
**Образование:** Аспирантура на кафедре урологии Московского областного научно-исследовательского клинического института им М.Ф.Владимирского.
Ординатура при Московском областном научно-исследовательском клиническом институте им. М.Ф.Владимирского по специальности «Урология».
Опыт и достижения
**<u>Научная степень</u>** Кандидат медицинских наук.
**<u>Членство в организациях:</u>**
Европейской Ассоциации Урологов.
Российского Общества Онкоурологов.
**<u>Научные работы:</u>** 2004г. – Факультет усовершенствования врачей МОНИКИ. Сертификат по специальности «урология». 2009г. – Факультет усовершенствования врачей МОНИКИ. Свидетельство о повышении квалификации (Сертификат) по специальности «урология».
2010 г. - Факультет усовершенствования врачей МОНИКИ. Диплом о профессиональной переподготовке по специальности «ультразвуковая диагностика». 2014г. –ГОУ ДПО «Российская медицинская академия последипломного образования Росздрава» (РМАПО). Удостоверение о повышении квалификации (Сертификат) по специальности «урология».
**Адрес:** Россия, Москва, улица Ивана Сусанина, 3
**Телефон:** (499)-490-17-61
**Vk:** https://vk.com/galkoaa
## 1.2. НИЗАМОВ РИГЕЛЬ ХАЛЯФОВИЧ

## ФКУ "ГЛАВНОЕ БЮРО МЕДИКО-СОЦИАЛЬНОЙ ЭКСПЕРТИЗЫ ПО РЕСПУБЛИКЕ ТАТАРСТАН(ТАТАРСТАН)"
Руководитель-главный эксперт по МСЭ
**КОНТАКТЫ**
**Адрес:** г.Казань, ул.Мазита Гафури, д.71
**Телефон:** 237-96-71
**E-Mail:** Rigel.Nizamov@tatar.ru
**Дата рождения:** 15 марта 1967 г.
**Адрес:** г. Казань, ул. Мазита Гафури, 71
**Телефон:** (843) 237-96-10
**E-mail:** gbmse16@fmbamail.ru
## 1.3 ФКУ "ГБ МСЭ ПО МУРМАНСКОЙ ОБЛАСТИ" МИНТРУДА РОССИИ
**Контактные данные:** Руководитель Иванова Татьяна Александровна
**Электронная почта:** gbmse51@fbmse.ru
**Телефон:** 78152428631
**Сайт:** http://gbmse51.ru
# 2. Сайты ФБ МСЭ
| https://rfmse.ru/| Сайты учреждений ФБМСЭ|
| - | - |
| https://www.01.gbmse.ru/ | Главное бюро медико-социальной экспертизы по республике Адыгея|
| https://www.02.gbmse.ru/ | Главное бюро медико-социальной экспертизы по республике Башкортостан|
|https://www.03.gbmse.ru/ | Главное бюро медико-социальной экспертизы по республике Бурятия|
|https://www.04.gbmse.ru/ | Главное бюро медико-социальной экспертизы по республике Алтай |
# 3. Сканирование DNS.
## 3.1 DNS-записи FBMSE.RU
```
;; ===============================================================================
;; ASK FROM [8.8.8.8] ABOUT [.]
;; ===============================================================================
; <<>> Net::DNS::Dig 0.12 <<>> -t ns .
;;
;; Got answer.
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12820
;; flags: qr rd ra; QUERY: 1, ANSWER: 13, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;. IN NS
;; ANSWER SECTION:
. 50517 IN NS e.root-servers.net.
. 50517 IN NS h.root-servers.net.
. 50517 IN NS l.root-servers.net.
. 50517 IN NS i.root-servers.net.
. 50517 IN NS a.root-servers.net.
. 50517 IN NS d.root-servers.net.
. 50517 IN NS c.root-servers.net.
. 50517 IN NS b.root-servers.net.
. 50517 IN NS j.root-servers.net.
. 50517 IN NS k.root-servers.net.
. 50517 IN NS g.root-servers.net.
. 50517 IN NS m.root-servers.net.
. 50517 IN NS f.root-servers.net.
;; Query time: 18 ms
;; SERVER: 8.8.8.8# 53(8.8.8.8)
;; WHEN: Wed Apr 13 23:27:00 2022
;; MSG SIZE rcvd: 228 -- XFR size: 14 records
;; ===============================================================================
;; ASK FROM [e.root-servers.net] ABOUT [ru.]
;; ===============================================================================
; <<>> Net::DNS::Dig 0.12 <<>> -t ns ru.
;;
;; Got answer.
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12820
;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 5, ADDITIONAL: 10
;; QUESTION SECTION:
;ru. IN NS
;; AUTHORITY SECTION:
ru. 172800 IN NS a.dns.ripn.net.
ru. 172800 IN NS b.dns.ripn.net.
ru. 172800 IN NS d.dns.ripn.net.
ru. 172800 IN NS e.dns.ripn.net.
ru. 172800 IN NS f.dns.ripn.net.
;; ADDITIONAL SECTION:
a.dns.ripn.net. 172800 IN A 193.232.128.6
a.dns.ripn.net. 172800 IN AAAA 2001:678:17:0:193:232:128:6
b.dns.ripn.net. 172800 IN A 194.85.252.62
b.dns.ripn.net. 172800 IN AAAA 2001:678:16:0:194:85:252:62
d.dns.ripn.net. 172800 IN A 194.190.124.17
d.dns.ripn.net. 172800 IN AAAA 2001:678:18:0:194:190:124:17
e.dns.ripn.net. 172800 IN A 193.232.142.17
e.dns.ripn.net. 172800 IN AAAA 2001:678:15:0:193:232:142:17
f.dns.ripn.net. 172800 IN A 193.232.156.17
f.dns.ripn.net. 172800 IN AAAA 2001:678:14:0:193:232:156:17
;; Query time: 3 ms
;; SERVER: 192.203.230.10# 53(e.root-servers.net)
;; WHEN: Wed Apr 13 23:27:01 2022
;; MSG SIZE rcvd: 332 -- XFR size: 16 records
;; ===============================================================================
;; ASK FROM [a.dns.ripn.net] ABOUT [fbmse.ru.]
;; ===============================================================================
; <<>> Net::DNS::Dig 0.12 <<>> -t ns fbmse.ru.
;;
;; Got answer.
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12820
;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 2, ADDITIONAL: 3
;; QUESTION SECTION:
;fbmse.ru. IN NS
;; AUTHORITY SECTION:
FBMSE.RU. 345600 IN NS ns.fbmse.RU.
FBMSE.RU. 345600 IN NS ns2.comcor.RU.
;; ADDITIONAL SECTION:
ns.fbmse.RU. 345600 IN A 212.45.0.5
ns2.comcor.RU. 345600 IN A 212.45.2.5
ns2.comcor.RU. 345600 IN AAAA 2A02:290:0:2:0:0:0:5
;; Query time: 1 ms
;; SERVER: 193.232.128.6# 53(a.dns.ripn.net)
;; WHEN: Wed Apr 13 23:27:01 2022
;; MSG SIZE rcvd: 142 -- XFR size: 6 records
; <<>> Net::DNS::Dig 0.12 <<>> -t any fbmse.ru.
;;
;; Got answer.
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12820
;; flags: qr aa rd; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 2
;; QUESTION SECTION:
;fbmse.ru. IN ANY
;; ANSWER SECTION:
fbmse.ru. 86400 IN MX 10 mail.fbmse.ru.
fbmse.ru. 86400 IN A 82.138.54.86
fbmse.ru. 86400 IN SOA dns.comcor.ru. root.dns.comcor.ru. 2022032812 10800 3600 1814400 86400
fbmse.ru. 86400 IN NS ns2.comcor.ru.
fbmse.ru. 86400 IN NS ns.fbmse.ru.
;; ADDITIONAL SECTION:
mail.fbmse.ru. 86400 IN A 82.138.54.82
ns.fbmse.ru. 86400 IN A 212.45.0.5
;; Query time: 4 ms
;; SERVER: 212.45.0.5# 53(ns.fbmse.RU)
;; WHEN: Wed Apr 13 23:27:01 2022
;; MSG SIZE rcvd: 184 -- XFR size: 8 records
```
## 3.2 DNS-записи RFMSE.RU
```
;; =============================================
;; ASK FROM [8.8.8.8] ABOUT [.]
;; ========================================
; <<>> Net::DNS::Dig 0.12 <<>> -t ns .
;;
;; Got answer.
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13105
;; flags: qr rd ra; QUERY: 1, ANSWER: 13, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;. IN NS
;; ANSWER SECTION:
. 49696 IN NS b.root-servers.net.
. 49696 IN NS f.root-servers.net.
. 49696 IN NS g.root-servers.net.
. 49696 IN NS c.root-servers.net.
. 49696 IN NS a.root-servers.net.
. 49696 IN NS l.root-servers.net.
. 49696 IN NS j.root-servers.net.
. 49696 IN NS i.root-servers.net.
. 49696 IN NS k.root-servers.net.
. 49696 IN NS d.root-servers.net.
. 49696 IN NS e.root-servers.net.
. 49696 IN NS h.root-servers.net.
. 49696 IN NS m.root-servers.net.
;; Query time: 20 ms
;; SERVER: 8.8.8.8# 53(8.8.8.8)
;; WHEN: Wed Apr 13 23:31:45 2022
;; MSG SIZE rcvd: 228 -- XFR size: 14 records
;; ===============================================================================
;; ASK FROM [b.root-servers.net] ABOUT [ru.]
;; ===============================================================================
; <<>> Net::DNS::Dig 0.12 <<>> -t ns ru.
;;
;; Got answer.
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13105
;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 5, ADDITIONAL: 10
;; QUESTION SECTION:
;ru. IN NS
;; AUTHORITY SECTION:
ru. 172800 IN NS a.dns.ripn.net.
ru. 172800 IN NS b.dns.ripn.net.
ru. 172800 IN NS d.dns.ripn.net.
ru. 172800 IN NS e.dns.ripn.net.
ru. 172800 IN NS f.dns.ripn.net.
;; ADDITIONAL SECTION:
a.dns.ripn.net. 172800 IN A 193.232.128.6
a.dns.ripn.net. 172800 IN AAAA 2001:678:17:0:193:232:128:6
b.dns.ripn.net. 172800 IN A 194.85.252.62
b.dns.ripn.net. 172800 IN AAAA 2001:678:16:0:194:85:252:62
d.dns.ripn.net. 172800 IN A 194.190.124.17
d.dns.ripn.net. 172800 IN AAAA 2001:678:18:0:194:190:124:17
e.dns.ripn.net. 172800 IN A 193.232.142.17
e.dns.ripn.net. 172800 IN AAAA 2001:678:15:0:193:232:142:17
f.dns.ripn.net. 172800 IN A 193.232.156.17
f.dns.ripn.net. 172800 IN AAAA 2001:678:14:0:193:232:156:17
;; Query time: 39 ms
;; SERVER: 199.9.14.201# 53(b.root-servers.net)
;; WHEN: Wed Apr 13 23:31:46 2022
;; MSG SIZE rcvd: 332 -- XFR size: 16 records
;; ===============================================================================
;; ASK FROM [a.dns.ripn.net] ABOUT [rfmse.ru.]
;; ===============================================================================
; <<>> Net::DNS::Dig 0.12 <<>> -t ns rfmse.ru.
;;
;; Got answer.
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13105
;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 2, ADDITIONAL: 2
;; QUESTION SECTION:
;rfmse.ru. IN NS
;; AUTHORITY SECTION:
RFMSE.RU. 345600 IN NS ns3-l2.nic.RU.
RFMSE.RU. 345600 IN NS ns4-l2.nic.RU.
;; ADDITIONAL SECTION:
ns3-l2.NIC.ru. 345600 IN A 193.232.146.1
ns4-l2.NIC.ru. 345600 IN A 91.217.20.20
;; Query time: 2 ms
;; SERVER: 193.232.128.6# 53(a.dns.ripn.net)
;; WHEN: Wed Apr 13 23:31:46 2022
;; MSG SIZE rcvd: 130 -- XFR size: 5 records
; <<>> Net::DNS::Dig 0.12 <<>> -t any rfmse.ru.
;;
;; Got answer.
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13105
;; flags: qr aa rd; QUERY: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;rfmse.ru. IN ANY
;; ANSWER SECTION:
rfmse.ru. 3600 IN NS ns4-l2.nic.ru.
rfmse.ru. 3600 IN NS ns4-cloud.nic.ru.
rfmse.ru. 3600 IN NS ns3-l2.nic.ru.
rfmse.ru. 3600 IN NS ns8-l2.nic.ru.
rfmse.ru. 3600 IN NS ns8-cloud.nic.ru.
rfmse.ru. 3600 IN A 82.138.54.86
rfmse.ru. 3600 IN SOA ns3-l2.nic.ru. dns.nic.ru. 2018062302 1440 3600 2592000 600
;; Query time: 251 ms
;; SERVER: 193.232.146.1# 53(ns3-l2.nic.RU)
;; WHEN: Wed Apr 13 23:31:46 2022
;; MSG SIZE rcvd: 197 -- XFR size: 8 records
```
## 3.3 ПОДДОМЕНЫ и IP-адреса FBMSE.RU
```
PORT STATE SERVICE
80/tcp open http
443/tcp open https
Host script results:
| dns-brute:
| DNS Brute-force hostnames:
| mx.fbmse.ru - 82.138.54.82
| dns.fbmse.ru - 82.138.54.82
| ns.fbmse.ru - 212.45.0.5
| vpn.fbmse.ru - 82.138.54.84
| mail.fbmse.ru - 82.138.54.82
| ftp.fbmse.ru - 82.138.54.85
| adm.fbmse.ru – 82.138.54.86
| test.fbmse.ru – 82.138.54.86
|_ *A: 82.138.54.86
Nmap done: 1 IP address (1 host up) scanned in 47.05 seconds
```
## 3.4 Сканирование IP адреса 82.138.54.82 ФБ МСЭ
```
Starting Nmap 7.92 ( https://nmap.org ) at 2022-04-13 23:49 RTZ 2
NSE: Loaded 155 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 23:49
Completed NSE at 23:49, 0.00s elapsed
Initiating NSE at 23:49
Completed NSE at 23:49, 0.00s elapsed
Initiating NSE at 23:49
Completed NSE at 23:49, 0.00s elapsed
Initiating Ping Scan at 23:49
Scanning 82.138.54.82 [4 ports]
Completed Ping Scan at 23:49, 0.05s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 23:49
Completed Parallel DNS resolution of 1 host. at 23:49, 0.00s elapsed
Initiating SYN Stealth Scan at 23:49
Scanning mail.fbmse.ru (82.138.54.82) [1000 ports]
Discovered open port 25/tcp on 82.138.54.82
Discovered open port 110/tcp on 82.138.54.82
Discovered open port 587/tcp on 82.138.54.82
Discovered open port 5060/tcp on 82.138.54.82
Discovered open port 2000/tcp on 82.138.54.82
Completed SYN Stealth Scan at 23:49, 4.45s elapsed (1000 total ports)
Initiating Service scan at 23:49
Scanning 5 services on mail.fbmse.ru (82.138.54.82)
Completed Service scan at 23:49, 23.55s elapsed (5 services on 1 host)
Initiating OS detection (try #1) against mail.fbmse.ru (82.138.54.82)
Retrying OS detection (try #2) against mail.fbmse.ru (82.138.54.82)
Initiating Traceroute at 23:49
Completed Traceroute at 23:49, 3.03s elapsed
Initiating Parallel DNS resolution of 5 hosts. at 23:49
Completed Parallel DNS resolution of 5 hosts. at 23:49, 9.02s elapsed
NSE: Script scanning 82.138.54.82.
Initiating NSE at 23:49
Completed NSE at 23:50, 5.05s elapsed
Initiating NSE at 23:50
Completed NSE at 23:50, 1.16s elapsed
Initiating NSE at 23:50
Completed NSE at 23:50, 0.00s elapsed
Nmap scan report for mail.fbmse.ru (82.138.54.82)
Host is up (0.0097s latency).
Not shown: 972 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp filtered ssh
23/tcp filtered telnet
25/tcp open smtp Postfix smtpd
|_smtp-commands: ksmg.fb.local, PIPELINING, SIZE 209715200, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME
| ssl-cert: Subject: commonName=ksmg.fb.local
| Issuer: commonName=ksmg.fb.local
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2021-04-13T06:15:56
| Not valid after: 2023-04-13T06:15:56
| MD5: 74ce 7432 bc52 21a1 96e9 cd19 28f5 dba9
|_SHA-1: 8916 3277 5134 ec67 70ee 452d 507a 5a07 c038 5fe9
|_ssl-date: 2022-04-13T20:50:03+00:00; 0s from scanner time.
79/tcp filtered finger
110/tcp open pop3
| fingerprint-strings:
| GenericLines:
| +OK mail.fbmse.ru POP3 ready <F202204132349.AA4916957MD7098@mail.fbmse.ru>
| -ERR unknown POP3 command!
| HTTPOptions:
| +OK mail.fbmse.ru POP3 ready <F202204132349.AA4927974MD1385@mail.fbmse.ru>
| -ERR unknown POP3 command!
| NULL:
|_ +OK mail.fbmse.ru POP3 ready <F202204132349.AA4916957MD7098@mail.fbmse.ru>
|_pop3-capabilities: APOP USER UIDL STLS TOP
| ssl-cert: Subject: commonName=mail.fbmse.ru/organizationName=FSBI Federal Bureau for Medical and Social Expertise/countryName=US
| Subject Alternative Name: DNS:mail.fbmse.ru
| Issuer: commonName=mail.fbmse.ru/organizationName=FSBI Federal Bureau for Medical and Social Expertise/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2019-02-17T13:25:17
| Not valid after: 2023-02-18T13:25:17
| MD5: 4635 dfcf c7b0 0238 a13d d913 f763 b4d7
|_SHA-1: 2605 c150 5bb8 0457 dc6a ab89 e415 96cd 2fab 578b
|_ssl-date: 2022-04-13T20:50:03+00:00; 0s from scanner time.
111/tcp filtered rpcbind
139/tcp filtered netbios-ssn
512/tcp filtered exec
513/tcp filtered login
514/tcp filtered shell
515/tcp filtered printer
587/tcp open smtp?
| fingerprint-strings:
| GenericLines:
| 220-mail.fbmse.ru ESMTP MSA Wed, 13 Apr 2022 23:49:16 +0300
| iPO6OT
| 5.0.0 Unrecognized command
| 5.0.0 Unrecognized command
| Hello:
| 220-mail.fbmse.ru ESMTP MSA Wed, 13 Apr 2022 23:49:28 +0300
| iPO6OT
| 5.5.4 Invalid or missing command argument(s)
| NULL:
| 220-mail.fbmse.ru ESMTP MSA Wed, 13 Apr 2022 23:49:16 +0300
|_ iPO6OT
|_smtp-commands: mail.fbmse.ru Hello mail.fbmse.ru [109.252.169.1], pleased to meet you, AUTH LOGIN CRAM-MD5 PLAIN, 8BITMIME, ENHANCEDSTATUSCODES, STARTTLS, SIZE
|_ssl-date: 2022-04-13T20:50:03+00:00; 0s from scanner time.
| ssl-cert: Subject: commonName=mail.fbmse.ru/organizationName=FSBI Federal Bureau for Medical and Social Expertise/countryName=US
| Subject Alternative Name: DNS:mail.fbmse.ru
| Issuer: commonName=mail.fbmse.ru/organizationName=FSBI Federal Bureau for Medical and Social Expertise/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2019-02-17T13:25:17
| Not valid after: 2023-02-18T13:25:17
| MD5: 4635 dfcf c7b0 0238 a13d d913 f763 b4d7
|_SHA-1: 2605 c150 5bb8 0457 dc6a ab89 e415 96cd 2fab 578b
2000/tcp open tcpwrapped
2001/tcp filtered dc
4001/tcp filtered newoak
5060/tcp open tcpwrapped
6000/tcp filtered X11
6001/tcp filtered X11:1
6002/tcp filtered X11:2
6003/tcp filtered X11:3
6004/tcp filtered X11:4
6005/tcp filtered X11:5
6006/tcp filtered X11:6
6007/tcp filtered X11:7
6009/tcp filtered X11:9
6025/tcp filtered x11
6059/tcp filtered X11:59
9001/tcp filtered tor-orport
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port110-TCP:V=7.92%I=7%D=4/13%Time=62573753%P=i686-pc-windows-windows%r
SF:(NULL,4C,"\+OK\x20mail\.fbmse\.ru\x20POP3\x20ready\x20<F202204132349\.A
SF:A4916957MD7098@mail\.fbmse\.ru>\r\n")%r(GenericLines,68,"\+OK\x20mail\.
SF:fbmse\.ru\x20POP3\x20ready\x20<F202204132349\.AA4916957MD7098@mail\.fbm
SF:se\.ru>\r\n-ERR\x20unknown\x20POP3\x20command!\r\n")%r(HTTPOptions,68,"
SF:\+OK\x20mail\.fbmse\.ru\x20POP3\x20ready\x20<F202204132349\.AA4927974MD
SF:1385@mail\.fbmse\.ru>\r\n-ERR\x20unknown\x20POP3\x20command!\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port587-TCP:V=7.92%I=7%D=4/13%Time=62573753%P=i686-pc-windows-windows%r
SF:(NULL,49,"220-mail\.fbmse\.ru\x20ESMTP\x20MSA\x20Wed,\x2013\x20Apr\x202
SF:022\x2023:49:16\x20\+0300\r\n220\x20iPO6OT\r\n")%r(GenericLines,89,"220
SF:-mail\.fbmse\.ru\x20ESMTP\x20MSA\x20Wed,\x2013\x20Apr\x202022\x2023:49:
SF:16\x20\+0300\r\n220\x20iPO6OT\r\n500\x205\.0\.0\x20Unrecognized\x20comm
SF:and\r\n500\x205\.0\.0\x20Unrecognized\x20command\r\n")%r(Hello,7B,"220-
SF:mail\.fbmse\.ru\x20ESMTP\x20MSA\x20Wed,\x2013\x20Apr\x202022\x2023:49:2
SF:8\x20\+0300\r\n220\x20iPO6OT\r\n501\x205\.5\.4\x20Invalid\x20or\x20miss
SF:ing\x20command\x20argument\(s\)\r\n");
Device type: general purpose
Running (JUST GUESSING): Linux 2.6.X|4.X|3.X (89%)
OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:4.0 cpe:/o:linux:linux_kernel:3.10
Aggressive OS guesses: Linux 2.6.32 (89%), Linux 4.0 (88%), Linux 2.6.32 or 3.10 (88%), Linux 2.6.39 (86%), Linux 2.6.32 - 2.6.39 (86%), Linux 2.6.38 (86%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 8.905 days (since Tue Apr 5 02:07:04 2022)
Network Distance: 11 hops
TCP Sequence Prediction: Difficulty=264 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Host: ksmg.fb.local
TRACEROUTE (using port 143/tcp)
HOP RTT ADDRESS
1 1.00 ms 192.168.2.1
2 12.00 ms 192.168.1.254
3 9.00 ms 100.102.0.1
4 ... 6
7 7.00 ms m9-cr04-be8.77.msk.mts-internet.net (212.188.54.213)
8 ... 9
10 7.00 ms 87.245.169.134
11 5.00 ms mail.fbmse.ru (82.138.54.82)
NSE: Script Post-scanning.
Initiating NSE at 23:50
Completed NSE at 23:50, 0.00s elapsed
Initiating NSE at 23:50
Completed NSE at 23:50, 0.00s elapsed
Initiating NSE at 23:50
Completed NSE at 23:50, 0.00s elapsed
```
## 3.5 Сканирование IP адреса 212.45.0.5 ФБ МСЭ
```
Starting Nmap 7.92 ( https://nmap.org ) at 2022-04-13 23:55 RTZ 2
NSE: Loaded 155 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 23:55
Completed NSE at 23:55, 0.00s elapsed
Initiating NSE at 23:55
Completed NSE at 23:55, 0.00s elapsed
Initiating NSE at 23:55
Completed NSE at 23:55, 0.00s elapsed
Initiating Ping Scan at 23:55
Scanning 212.45.0.5 [4 ports]
Completed Ping Scan at 23:55, 0.06s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 23:55
Completed Parallel DNS resolution of 1 host. at 23:55, 0.51s elapsed
Initiating SYN Stealth Scan at 23:55
Scanning 212.45.0.5 [1000 ports]
Discovered open port 53/tcp on 212.45.0.5
Discovered open port 111/tcp on 212.45.0.5
Increasing send delay for 212.45.0.5 from 0 to 5 due to 27 out of 67 dropped probes since last increase.
Increasing send delay for 212.45.0.5 from 5 to 10 due to 11 out of 24 dropped probes since last increase.
Discovered open port 4045/tcp on 212.45.0.5
Completed SYN Stealth Scan at 23:55, 34.01s elapsed (1000 total ports)
Initiating Service scan at 23:55
Scanning 3 services on 212.45.0.5
Completed Service scan at 23:56, 16.04s
elapsed (3 services on 1 host)
Initiating OS detection (try #1) against 212.45.0.5
Retrying OS detection (try #2) against 212.45.0.5
Initiating Traceroute at 23:56
Completed Traceroute at 23:56, 3.04s elapsed
Initiating Parallel DNS resolution of 7 hosts. at 23:56
Completed Parallel DNS resolution of 7 hosts. at 23:56, 0.60s elapsed
NSE: Script scanning 212.45.0.5.
Initiating NSE at 23:56
Completed NSE at 23:56, 8.10s elapsed
Initiating NSE at 23:56
Completed NSE at 23:56, 0.02s elapsed
Initiating NSE at 23:56
Completed NSE at 23:56, 0.00s elapsed
Nmap scan report for 212.45.0.5
Host is up (0.0055s latency).
Not shown: 994 closed tcp ports (reset)
PORT STATE SERVICE VERSION
21/tcp filtered ftp
22/tcp filtered ssh
53/tcp open domain (unknown banner: 0.1)
| fingerprint-strings:
| DNSVersionBindReqTCP:
| version
|_ bind
| dns-nsid:
|_ bind.version: 0.1
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 3,4 111/tcp6 rpcbind
| 100000 3,4 111/udp6 rpcbind
| 100021 1,2,3,4 4045/tcp nlockmgr
| 100021 1,2,3,4 4045/tcp6 nlockmgr
| 100021 1,2,3,4 4045/udp nlockmgr
| 100021 1,2,3,4 4045/udp6 nlockmgr
| 100024 1 43249/tcp status
| 100024 1 44306/tcp6 status
| 100024 1 54184/udp6 status
| 100024 1 54825/udp status
| 100133 1 43249/tcp nsm_addrand
| 100133 1 44306/tcp6 nsm_addrand
| 100133 1 54184/udp6 nsm_addrand
| 100133 1 54825/udp nsm_addrand
| 1073741824 1 56252/tcp fmproduct
|_ 1073741824 1 64207/tcp6 fmproduct
514/tcp filtered shell
4045/tcp open nlockmgr 1-4 (RPC #100021)
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port53-TCP:V=7.92%I=7%D=4/13%Time=625738EA%P=i686-pc-windows-windows%r(
SF:DNSVersionBindReqTCP,30,"\0\.\0\x06\x85\0\0\x01\0\x01\0\0\0\0\x07versio
SF:n\x04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x04\x030\.1");
Device type: general purpose
Running (JUST GUESSING): Oracle Solaris 11|10 (98%), Sun Solaris 11|9|10 (94%), illumos OpenIndiana (89%)
OS CPE: cpe:/o:oracle:solaris:11 cpe:/o:sun:sunos:5.11 cpe:/o:illumos:openindiana cpe:/o:sun:sunos:5.9 cpe:/o:oracle:solaris:10 cpe:/o:sun:sunos:5.10
Aggressive OS guesses: Oracle Solaris 11 (98%), Sun Solaris 11 (94%), Oracle Solaris 11 or OpenIndiana (89%), Sun Solaris 9 or Oracle Solaris 10 (89%), Sun Solaris 10 (89%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 22.008 days (since Tue Mar 22 23:44:21 2022)
Network Distance: 10 hops
TCP Sequence Prediction: Difficulty=253 (Good luck!)
IP ID Sequence Generation: Incremental
```