# Сканирование корпоративной инфраструктуры # 1. Сотрудники ФГБУ ФБ МСЭ: ![](https://i.imgur.com/t7OoA6H.png) ## 1.1. Андрей Александрович Галько **Опыт работы** 2007 — 2010 Врач-уролог ЦКБ Российской Академии Наук 2010 — 2011 ударноволнового дробления камней Терапевт ЦВГ 1080 12ГУМО РФ С 2011 — по настоящее время pаведующий урологическим экспертно-реабилитационным отделением ФГБУ ФБ МСЭ **Образование:** Аспирантура на кафедре урологии Московского областного научно-исследовательского клинического института им М.Ф.Владимирского. Ординатура при Московском областном научно-исследовательском клиническом институте им. М.Ф.Владимирского по специальности «Урология». Опыт и достижения **<u>Научная степень</u>** Кандидат медицинских наук. **<u>Членство в организациях:</u>** Европейской Ассоциации Урологов. Российского Общества Онкоурологов. **<u>Научные работы:</u>** 2004г. – Факультет усовершенствования врачей МОНИКИ. Сертификат по специальности «урология». 2009г. – Факультет усовершенствования врачей МОНИКИ. Свидетельство о повышении квалификации (Сертификат) по специальности «урология». 2010 г. - Факультет усовершенствования врачей МОНИКИ. Диплом о профессиональной переподготовке по специальности «ультразвуковая диагностика». 2014г. –ГОУ ДПО «Российская медицинская академия последипломного образования Росздрава» (РМАПО). Удостоверение о повышении квалификации (Сертификат) по специальности «урология». **Адрес:** Россия, Москва, улица Ивана Сусанина, 3 **Телефон:** (499)-490-17-61 **Vk:** https://vk.com/galkoaa ## 1.2. НИЗАМОВ РИГЕЛЬ ХАЛЯФОВИЧ ![](https://i.imgur.com/u55uTaJ.png) ## ФКУ "ГЛАВНОЕ БЮРО МЕДИКО-СОЦИАЛЬНОЙ ЭКСПЕРТИЗЫ ПО РЕСПУБЛИКЕ ТАТАРСТАН(ТАТАРСТАН)" Руководитель-главный эксперт по МСЭ **КОНТАКТЫ** **Адрес:** г.Казань, ул.Мазита Гафури, д.71 **Телефон:** 237-96-71 **E-Mail:** Rigel.Nizamov@tatar.ru **Дата рождения:** 15 марта 1967 г. **Адрес:** г. Казань, ул. Мазита Гафури, 71 **Телефон:** (843) 237-96-10 **E-mail:** gbmse16@fmbamail.ru ## 1.3 ФКУ "ГБ МСЭ ПО МУРМАНСКОЙ ОБЛАСТИ" МИНТРУДА РОССИИ **Контактные данные:** Руководитель Иванова Татьяна Александровна **Электронная почта:** gbmse51@fbmse.ru **Телефон:** 78152428631 **Сайт:** http://gbmse51.ru # 2. Сайты ФБ МСЭ | https://rfmse.ru/| Сайты учреждений ФБМСЭ| | - | - | | https://www.01.gbmse.ru/ | Главное бюро медико-социальной экспертизы по республике Адыгея| | https://www.02.gbmse.ru/ | Главное бюро медико-социальной экспертизы по республике Башкортостан| |https://www.03.gbmse.ru/ | Главное бюро медико-социальной экспертизы по республике Бурятия| |https://www.04.gbmse.ru/ | Главное бюро медико-социальной экспертизы по республике Алтай | # 3. Сканирование DNS. ## 3.1 DNS-записи FBMSE.RU ``` ;; =============================================================================== ;; ASK FROM [8.8.8.8] ABOUT [.] ;; =============================================================================== ; <<>> Net::DNS::Dig 0.12 <<>> -t ns . ;; ;; Got answer. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12820 ;; flags: qr rd ra; QUERY: 1, ANSWER: 13, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;. IN NS ;; ANSWER SECTION: . 50517 IN NS e.root-servers.net. . 50517 IN NS h.root-servers.net. . 50517 IN NS l.root-servers.net. . 50517 IN NS i.root-servers.net. . 50517 IN NS a.root-servers.net. . 50517 IN NS d.root-servers.net. . 50517 IN NS c.root-servers.net. . 50517 IN NS b.root-servers.net. . 50517 IN NS j.root-servers.net. . 50517 IN NS k.root-servers.net. . 50517 IN NS g.root-servers.net. . 50517 IN NS m.root-servers.net. . 50517 IN NS f.root-servers.net. ;; Query time: 18 ms ;; SERVER: 8.8.8.8# 53(8.8.8.8) ;; WHEN: Wed Apr 13 23:27:00 2022 ;; MSG SIZE rcvd: 228 -- XFR size: 14 records ;; =============================================================================== ;; ASK FROM [e.root-servers.net] ABOUT [ru.] ;; =============================================================================== ; <<>> Net::DNS::Dig 0.12 <<>> -t ns ru. ;; ;; Got answer. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12820 ;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 5, ADDITIONAL: 10 ;; QUESTION SECTION: ;ru. IN NS ;; AUTHORITY SECTION: ru. 172800 IN NS a.dns.ripn.net. ru. 172800 IN NS b.dns.ripn.net. ru. 172800 IN NS d.dns.ripn.net. ru. 172800 IN NS e.dns.ripn.net. ru. 172800 IN NS f.dns.ripn.net. ;; ADDITIONAL SECTION: a.dns.ripn.net. 172800 IN A 193.232.128.6 a.dns.ripn.net. 172800 IN AAAA 2001:678:17:0:193:232:128:6 b.dns.ripn.net. 172800 IN A 194.85.252.62 b.dns.ripn.net. 172800 IN AAAA 2001:678:16:0:194:85:252:62 d.dns.ripn.net. 172800 IN A 194.190.124.17 d.dns.ripn.net. 172800 IN AAAA 2001:678:18:0:194:190:124:17 e.dns.ripn.net. 172800 IN A 193.232.142.17 e.dns.ripn.net. 172800 IN AAAA 2001:678:15:0:193:232:142:17 f.dns.ripn.net. 172800 IN A 193.232.156.17 f.dns.ripn.net. 172800 IN AAAA 2001:678:14:0:193:232:156:17 ;; Query time: 3 ms ;; SERVER: 192.203.230.10# 53(e.root-servers.net) ;; WHEN: Wed Apr 13 23:27:01 2022 ;; MSG SIZE rcvd: 332 -- XFR size: 16 records ;; =============================================================================== ;; ASK FROM [a.dns.ripn.net] ABOUT [fbmse.ru.] ;; =============================================================================== ; <<>> Net::DNS::Dig 0.12 <<>> -t ns fbmse.ru. ;; ;; Got answer. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12820 ;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 2, ADDITIONAL: 3 ;; QUESTION SECTION: ;fbmse.ru. IN NS ;; AUTHORITY SECTION: FBMSE.RU. 345600 IN NS ns.fbmse.RU. FBMSE.RU. 345600 IN NS ns2.comcor.RU. ;; ADDITIONAL SECTION: ns.fbmse.RU. 345600 IN A 212.45.0.5 ns2.comcor.RU. 345600 IN A 212.45.2.5 ns2.comcor.RU. 345600 IN AAAA 2A02:290:0:2:0:0:0:5 ;; Query time: 1 ms ;; SERVER: 193.232.128.6# 53(a.dns.ripn.net) ;; WHEN: Wed Apr 13 23:27:01 2022 ;; MSG SIZE rcvd: 142 -- XFR size: 6 records ; <<>> Net::DNS::Dig 0.12 <<>> -t any fbmse.ru. ;; ;; Got answer. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12820 ;; flags: qr aa rd; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 2 ;; QUESTION SECTION: ;fbmse.ru. IN ANY ;; ANSWER SECTION: fbmse.ru. 86400 IN MX 10 mail.fbmse.ru. fbmse.ru. 86400 IN A 82.138.54.86 fbmse.ru. 86400 IN SOA dns.comcor.ru. root.dns.comcor.ru. 2022032812 10800 3600 1814400 86400 fbmse.ru. 86400 IN NS ns2.comcor.ru. fbmse.ru. 86400 IN NS ns.fbmse.ru. ;; ADDITIONAL SECTION: mail.fbmse.ru. 86400 IN A 82.138.54.82 ns.fbmse.ru. 86400 IN A 212.45.0.5 ;; Query time: 4 ms ;; SERVER: 212.45.0.5# 53(ns.fbmse.RU) ;; WHEN: Wed Apr 13 23:27:01 2022 ;; MSG SIZE rcvd: 184 -- XFR size: 8 records ``` ## 3.2 DNS-записи RFMSE.RU ``` ;; ============================================= ;; ASK FROM [8.8.8.8] ABOUT [.] ;; ======================================== ; <<>> Net::DNS::Dig 0.12 <<>> -t ns . ;; ;; Got answer. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13105 ;; flags: qr rd ra; QUERY: 1, ANSWER: 13, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;. IN NS ;; ANSWER SECTION: . 49696 IN NS b.root-servers.net. . 49696 IN NS f.root-servers.net. . 49696 IN NS g.root-servers.net. . 49696 IN NS c.root-servers.net. . 49696 IN NS a.root-servers.net. . 49696 IN NS l.root-servers.net. . 49696 IN NS j.root-servers.net. . 49696 IN NS i.root-servers.net. . 49696 IN NS k.root-servers.net. . 49696 IN NS d.root-servers.net. . 49696 IN NS e.root-servers.net. . 49696 IN NS h.root-servers.net. . 49696 IN NS m.root-servers.net. ;; Query time: 20 ms ;; SERVER: 8.8.8.8# 53(8.8.8.8) ;; WHEN: Wed Apr 13 23:31:45 2022 ;; MSG SIZE rcvd: 228 -- XFR size: 14 records ;; =============================================================================== ;; ASK FROM [b.root-servers.net] ABOUT [ru.] ;; =============================================================================== ; <<>> Net::DNS::Dig 0.12 <<>> -t ns ru. ;; ;; Got answer. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13105 ;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 5, ADDITIONAL: 10 ;; QUESTION SECTION: ;ru. IN NS ;; AUTHORITY SECTION: ru. 172800 IN NS a.dns.ripn.net. ru. 172800 IN NS b.dns.ripn.net. ru. 172800 IN NS d.dns.ripn.net. ru. 172800 IN NS e.dns.ripn.net. ru. 172800 IN NS f.dns.ripn.net. ;; ADDITIONAL SECTION: a.dns.ripn.net. 172800 IN A 193.232.128.6 a.dns.ripn.net. 172800 IN AAAA 2001:678:17:0:193:232:128:6 b.dns.ripn.net. 172800 IN A 194.85.252.62 b.dns.ripn.net. 172800 IN AAAA 2001:678:16:0:194:85:252:62 d.dns.ripn.net. 172800 IN A 194.190.124.17 d.dns.ripn.net. 172800 IN AAAA 2001:678:18:0:194:190:124:17 e.dns.ripn.net. 172800 IN A 193.232.142.17 e.dns.ripn.net. 172800 IN AAAA 2001:678:15:0:193:232:142:17 f.dns.ripn.net. 172800 IN A 193.232.156.17 f.dns.ripn.net. 172800 IN AAAA 2001:678:14:0:193:232:156:17 ;; Query time: 39 ms ;; SERVER: 199.9.14.201# 53(b.root-servers.net) ;; WHEN: Wed Apr 13 23:31:46 2022 ;; MSG SIZE rcvd: 332 -- XFR size: 16 records ;; =============================================================================== ;; ASK FROM [a.dns.ripn.net] ABOUT [rfmse.ru.] ;; =============================================================================== ; <<>> Net::DNS::Dig 0.12 <<>> -t ns rfmse.ru. ;; ;; Got answer. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13105 ;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 2, ADDITIONAL: 2 ;; QUESTION SECTION: ;rfmse.ru. IN NS ;; AUTHORITY SECTION: RFMSE.RU. 345600 IN NS ns3-l2.nic.RU. RFMSE.RU. 345600 IN NS ns4-l2.nic.RU. ;; ADDITIONAL SECTION: ns3-l2.NIC.ru. 345600 IN A 193.232.146.1 ns4-l2.NIC.ru. 345600 IN A 91.217.20.20 ;; Query time: 2 ms ;; SERVER: 193.232.128.6# 53(a.dns.ripn.net) ;; WHEN: Wed Apr 13 23:31:46 2022 ;; MSG SIZE rcvd: 130 -- XFR size: 5 records ; <<>> Net::DNS::Dig 0.12 <<>> -t any rfmse.ru. ;; ;; Got answer. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13105 ;; flags: qr aa rd; QUERY: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;rfmse.ru. IN ANY ;; ANSWER SECTION: rfmse.ru. 3600 IN NS ns4-l2.nic.ru. rfmse.ru. 3600 IN NS ns4-cloud.nic.ru. rfmse.ru. 3600 IN NS ns3-l2.nic.ru. rfmse.ru. 3600 IN NS ns8-l2.nic.ru. rfmse.ru. 3600 IN NS ns8-cloud.nic.ru. rfmse.ru. 3600 IN A 82.138.54.86 rfmse.ru. 3600 IN SOA ns3-l2.nic.ru. dns.nic.ru. 2018062302 1440 3600 2592000 600 ;; Query time: 251 ms ;; SERVER: 193.232.146.1# 53(ns3-l2.nic.RU) ;; WHEN: Wed Apr 13 23:31:46 2022 ;; MSG SIZE rcvd: 197 -- XFR size: 8 records ``` ## 3.3 ПОДДОМЕНЫ и IP-адреса FBMSE.RU ``` PORT STATE SERVICE 80/tcp open http 443/tcp open https Host script results: | dns-brute: | DNS Brute-force hostnames: | mx.fbmse.ru - 82.138.54.82 | dns.fbmse.ru - 82.138.54.82 | ns.fbmse.ru - 212.45.0.5 | vpn.fbmse.ru - 82.138.54.84 | mail.fbmse.ru - 82.138.54.82 | ftp.fbmse.ru - 82.138.54.85 | adm.fbmse.ru – 82.138.54.86 | test.fbmse.ru – 82.138.54.86 |_ *A: 82.138.54.86 Nmap done: 1 IP address (1 host up) scanned in 47.05 seconds ``` ## 3.4 Сканирование IP адреса 82.138.54.82 ФБ МСЭ ``` Starting Nmap 7.92 ( https://nmap.org ) at 2022-04-13 23:49 RTZ 2 NSE: Loaded 155 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 23:49 Completed NSE at 23:49, 0.00s elapsed Initiating NSE at 23:49 Completed NSE at 23:49, 0.00s elapsed Initiating NSE at 23:49 Completed NSE at 23:49, 0.00s elapsed Initiating Ping Scan at 23:49 Scanning 82.138.54.82 [4 ports] Completed Ping Scan at 23:49, 0.05s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 23:49 Completed Parallel DNS resolution of 1 host. at 23:49, 0.00s elapsed Initiating SYN Stealth Scan at 23:49 Scanning mail.fbmse.ru (82.138.54.82) [1000 ports] Discovered open port 25/tcp on 82.138.54.82 Discovered open port 110/tcp on 82.138.54.82 Discovered open port 587/tcp on 82.138.54.82 Discovered open port 5060/tcp on 82.138.54.82 Discovered open port 2000/tcp on 82.138.54.82 Completed SYN Stealth Scan at 23:49, 4.45s elapsed (1000 total ports) Initiating Service scan at 23:49 Scanning 5 services on mail.fbmse.ru (82.138.54.82) Completed Service scan at 23:49, 23.55s elapsed (5 services on 1 host) Initiating OS detection (try #1) against mail.fbmse.ru (82.138.54.82) Retrying OS detection (try #2) against mail.fbmse.ru (82.138.54.82) Initiating Traceroute at 23:49 Completed Traceroute at 23:49, 3.03s elapsed Initiating Parallel DNS resolution of 5 hosts. at 23:49 Completed Parallel DNS resolution of 5 hosts. at 23:49, 9.02s elapsed NSE: Script scanning 82.138.54.82. Initiating NSE at 23:49 Completed NSE at 23:50, 5.05s elapsed Initiating NSE at 23:50 Completed NSE at 23:50, 1.16s elapsed Initiating NSE at 23:50 Completed NSE at 23:50, 0.00s elapsed Nmap scan report for mail.fbmse.ru (82.138.54.82) Host is up (0.0097s latency). Not shown: 972 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp filtered ssh 23/tcp filtered telnet 25/tcp open smtp Postfix smtpd |_smtp-commands: ksmg.fb.local, PIPELINING, SIZE 209715200, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME | ssl-cert: Subject: commonName=ksmg.fb.local | Issuer: commonName=ksmg.fb.local | Public Key type: rsa | Public Key bits: 2048 | Signature Algorithm: sha256WithRSAEncryption | Not valid before: 2021-04-13T06:15:56 | Not valid after: 2023-04-13T06:15:56 | MD5: 74ce 7432 bc52 21a1 96e9 cd19 28f5 dba9 |_SHA-1: 8916 3277 5134 ec67 70ee 452d 507a 5a07 c038 5fe9 |_ssl-date: 2022-04-13T20:50:03+00:00; 0s from scanner time. 79/tcp filtered finger 110/tcp open pop3 | fingerprint-strings: | GenericLines: | +OK mail.fbmse.ru POP3 ready <F202204132349.AA4916957MD7098@mail.fbmse.ru> | -ERR unknown POP3 command! | HTTPOptions: | +OK mail.fbmse.ru POP3 ready <F202204132349.AA4927974MD1385@mail.fbmse.ru> | -ERR unknown POP3 command! | NULL: |_ +OK mail.fbmse.ru POP3 ready <F202204132349.AA4916957MD7098@mail.fbmse.ru> |_pop3-capabilities: APOP USER UIDL STLS TOP | ssl-cert: Subject: commonName=mail.fbmse.ru/organizationName=FSBI Federal Bureau for Medical and Social Expertise/countryName=US | Subject Alternative Name: DNS:mail.fbmse.ru | Issuer: commonName=mail.fbmse.ru/organizationName=FSBI Federal Bureau for Medical and Social Expertise/countryName=US | Public Key type: rsa | Public Key bits: 2048 | Signature Algorithm: sha256WithRSAEncryption | Not valid before: 2019-02-17T13:25:17 | Not valid after: 2023-02-18T13:25:17 | MD5: 4635 dfcf c7b0 0238 a13d d913 f763 b4d7 |_SHA-1: 2605 c150 5bb8 0457 dc6a ab89 e415 96cd 2fab 578b |_ssl-date: 2022-04-13T20:50:03+00:00; 0s from scanner time. 111/tcp filtered rpcbind 139/tcp filtered netbios-ssn 512/tcp filtered exec 513/tcp filtered login 514/tcp filtered shell 515/tcp filtered printer 587/tcp open smtp? | fingerprint-strings: | GenericLines: | 220-mail.fbmse.ru ESMTP MSA Wed, 13 Apr 2022 23:49:16 +0300 | iPO6OT | 5.0.0 Unrecognized command | 5.0.0 Unrecognized command | Hello: | 220-mail.fbmse.ru ESMTP MSA Wed, 13 Apr 2022 23:49:28 +0300 | iPO6OT | 5.5.4 Invalid or missing command argument(s) | NULL: | 220-mail.fbmse.ru ESMTP MSA Wed, 13 Apr 2022 23:49:16 +0300 |_ iPO6OT |_smtp-commands: mail.fbmse.ru Hello mail.fbmse.ru [109.252.169.1], pleased to meet you, AUTH LOGIN CRAM-MD5 PLAIN, 8BITMIME, ENHANCEDSTATUSCODES, STARTTLS, SIZE |_ssl-date: 2022-04-13T20:50:03+00:00; 0s from scanner time. | ssl-cert: Subject: commonName=mail.fbmse.ru/organizationName=FSBI Federal Bureau for Medical and Social Expertise/countryName=US | Subject Alternative Name: DNS:mail.fbmse.ru | Issuer: commonName=mail.fbmse.ru/organizationName=FSBI Federal Bureau for Medical and Social Expertise/countryName=US | Public Key type: rsa | Public Key bits: 2048 | Signature Algorithm: sha256WithRSAEncryption | Not valid before: 2019-02-17T13:25:17 | Not valid after: 2023-02-18T13:25:17 | MD5: 4635 dfcf c7b0 0238 a13d d913 f763 b4d7 |_SHA-1: 2605 c150 5bb8 0457 dc6a ab89 e415 96cd 2fab 578b 2000/tcp open tcpwrapped 2001/tcp filtered dc 4001/tcp filtered newoak 5060/tcp open tcpwrapped 6000/tcp filtered X11 6001/tcp filtered X11:1 6002/tcp filtered X11:2 6003/tcp filtered X11:3 6004/tcp filtered X11:4 6005/tcp filtered X11:5 6006/tcp filtered X11:6 6007/tcp filtered X11:7 6009/tcp filtered X11:9 6025/tcp filtered x11 6059/tcp filtered X11:59 9001/tcp filtered tor-orport 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port110-TCP:V=7.92%I=7%D=4/13%Time=62573753%P=i686-pc-windows-windows%r SF:(NULL,4C,"\+OK\x20mail\.fbmse\.ru\x20POP3\x20ready\x20<F202204132349\.A SF:A4916957MD7098@mail\.fbmse\.ru>\r\n")%r(GenericLines,68,"\+OK\x20mail\. SF:fbmse\.ru\x20POP3\x20ready\x20<F202204132349\.AA4916957MD7098@mail\.fbm SF:se\.ru>\r\n-ERR\x20unknown\x20POP3\x20command!\r\n")%r(HTTPOptions,68," SF:\+OK\x20mail\.fbmse\.ru\x20POP3\x20ready\x20<F202204132349\.AA4927974MD SF:1385@mail\.fbmse\.ru>\r\n-ERR\x20unknown\x20POP3\x20command!\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port587-TCP:V=7.92%I=7%D=4/13%Time=62573753%P=i686-pc-windows-windows%r SF:(NULL,49,"220-mail\.fbmse\.ru\x20ESMTP\x20MSA\x20Wed,\x2013\x20Apr\x202 SF:022\x2023:49:16\x20\+0300\r\n220\x20iPO6OT\r\n")%r(GenericLines,89,"220 SF:-mail\.fbmse\.ru\x20ESMTP\x20MSA\x20Wed,\x2013\x20Apr\x202022\x2023:49: SF:16\x20\+0300\r\n220\x20iPO6OT\r\n500\x205\.0\.0\x20Unrecognized\x20comm SF:and\r\n500\x205\.0\.0\x20Unrecognized\x20command\r\n")%r(Hello,7B,"220- SF:mail\.fbmse\.ru\x20ESMTP\x20MSA\x20Wed,\x2013\x20Apr\x202022\x2023:49:2 SF:8\x20\+0300\r\n220\x20iPO6OT\r\n501\x205\.5\.4\x20Invalid\x20or\x20miss SF:ing\x20command\x20argument\(s\)\r\n"); Device type: general purpose Running (JUST GUESSING): Linux 2.6.X|4.X|3.X (89%) OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:4.0 cpe:/o:linux:linux_kernel:3.10 Aggressive OS guesses: Linux 2.6.32 (89%), Linux 4.0 (88%), Linux 2.6.32 or 3.10 (88%), Linux 2.6.39 (86%), Linux 2.6.32 - 2.6.39 (86%), Linux 2.6.38 (86%) No exact OS matches for host (test conditions non-ideal). Uptime guess: 8.905 days (since Tue Apr 5 02:07:04 2022) Network Distance: 11 hops TCP Sequence Prediction: Difficulty=264 (Good luck!) IP ID Sequence Generation: All zeros Service Info: Host: ksmg.fb.local TRACEROUTE (using port 143/tcp) HOP RTT ADDRESS 1 1.00 ms 192.168.2.1 2 12.00 ms 192.168.1.254 3 9.00 ms 100.102.0.1 4 ... 6 7 7.00 ms m9-cr04-be8.77.msk.mts-internet.net (212.188.54.213) 8 ... 9 10 7.00 ms 87.245.169.134 11 5.00 ms mail.fbmse.ru (82.138.54.82) NSE: Script Post-scanning. Initiating NSE at 23:50 Completed NSE at 23:50, 0.00s elapsed Initiating NSE at 23:50 Completed NSE at 23:50, 0.00s elapsed Initiating NSE at 23:50 Completed NSE at 23:50, 0.00s elapsed ``` ## 3.5 Сканирование IP адреса 212.45.0.5 ФБ МСЭ ``` Starting Nmap 7.92 ( https://nmap.org ) at 2022-04-13 23:55 RTZ 2 NSE: Loaded 155 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 23:55 Completed NSE at 23:55, 0.00s elapsed Initiating NSE at 23:55 Completed NSE at 23:55, 0.00s elapsed Initiating NSE at 23:55 Completed NSE at 23:55, 0.00s elapsed Initiating Ping Scan at 23:55 Scanning 212.45.0.5 [4 ports] Completed Ping Scan at 23:55, 0.06s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 23:55 Completed Parallel DNS resolution of 1 host. at 23:55, 0.51s elapsed Initiating SYN Stealth Scan at 23:55 Scanning 212.45.0.5 [1000 ports] Discovered open port 53/tcp on 212.45.0.5 Discovered open port 111/tcp on 212.45.0.5 Increasing send delay for 212.45.0.5 from 0 to 5 due to 27 out of 67 dropped probes since last increase. Increasing send delay for 212.45.0.5 from 5 to 10 due to 11 out of 24 dropped probes since last increase. Discovered open port 4045/tcp on 212.45.0.5 Completed SYN Stealth Scan at 23:55, 34.01s elapsed (1000 total ports) Initiating Service scan at 23:55 Scanning 3 services on 212.45.0.5 Completed Service scan at 23:56, 16.04s elapsed (3 services on 1 host) Initiating OS detection (try #1) against 212.45.0.5 Retrying OS detection (try #2) against 212.45.0.5 Initiating Traceroute at 23:56 Completed Traceroute at 23:56, 3.04s elapsed Initiating Parallel DNS resolution of 7 hosts. at 23:56 Completed Parallel DNS resolution of 7 hosts. at 23:56, 0.60s elapsed NSE: Script scanning 212.45.0.5. Initiating NSE at 23:56 Completed NSE at 23:56, 8.10s elapsed Initiating NSE at 23:56 Completed NSE at 23:56, 0.02s elapsed Initiating NSE at 23:56 Completed NSE at 23:56, 0.00s elapsed Nmap scan report for 212.45.0.5 Host is up (0.0055s latency). Not shown: 994 closed tcp ports (reset) PORT STATE SERVICE VERSION 21/tcp filtered ftp 22/tcp filtered ssh 53/tcp open domain (unknown banner: 0.1) | fingerprint-strings: | DNSVersionBindReqTCP: | version |_ bind | dns-nsid: |_ bind.version: 0.1 111/tcp open rpcbind 2-4 (RPC #100000) | rpcinfo: | program version port/proto service | 100000 2,3,4 111/tcp rpcbind | 100000 2,3,4 111/udp rpcbind | 100000 3,4 111/tcp6 rpcbind | 100000 3,4 111/udp6 rpcbind | 100021 1,2,3,4 4045/tcp nlockmgr | 100021 1,2,3,4 4045/tcp6 nlockmgr | 100021 1,2,3,4 4045/udp nlockmgr | 100021 1,2,3,4 4045/udp6 nlockmgr | 100024 1 43249/tcp status | 100024 1 44306/tcp6 status | 100024 1 54184/udp6 status | 100024 1 54825/udp status | 100133 1 43249/tcp nsm_addrand | 100133 1 44306/tcp6 nsm_addrand | 100133 1 54184/udp6 nsm_addrand | 100133 1 54825/udp nsm_addrand | 1073741824 1 56252/tcp fmproduct |_ 1073741824 1 64207/tcp6 fmproduct 514/tcp filtered shell 4045/tcp open nlockmgr 1-4 (RPC #100021) 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port53-TCP:V=7.92%I=7%D=4/13%Time=625738EA%P=i686-pc-windows-windows%r( SF:DNSVersionBindReqTCP,30,"\0\.\0\x06\x85\0\0\x01\0\x01\0\0\0\0\x07versio SF:n\x04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x04\x030\.1"); Device type: general purpose Running (JUST GUESSING): Oracle Solaris 11|10 (98%), Sun Solaris 11|9|10 (94%), illumos OpenIndiana (89%) OS CPE: cpe:/o:oracle:solaris:11 cpe:/o:sun:sunos:5.11 cpe:/o:illumos:openindiana cpe:/o:sun:sunos:5.9 cpe:/o:oracle:solaris:10 cpe:/o:sun:sunos:5.10 Aggressive OS guesses: Oracle Solaris 11 (98%), Sun Solaris 11 (94%), Oracle Solaris 11 or OpenIndiana (89%), Sun Solaris 9 or Oracle Solaris 10 (89%), Sun Solaris 10 (89%) No exact OS matches for host (test conditions non-ideal). Uptime guess: 22.008 days (since Tue Mar 22 23:44:21 2022) Network Distance: 10 hops TCP Sequence Prediction: Difficulty=253 (Good luck!) IP ID Sequence Generation: Incremental ```