Etude et mise en oeuvre d'une solution de sécurisation du réseau IP de la SONITEL( Télécharger le fichier original )par Djibo Seydou_Ziguida BOUBACAR ESP/ESMT Dakar - Mastère spécialisé téléinformatique 2010 |
ANNEXE V(SUITE): Capture pour configuration VPN site à site du GPTO /SONITELvi Thème : Etude et mise en oeuvre d'une solution de sécurisation du réseau IP de la SONITEL Mémoire de fin de formation en mastère spécialisé 2010 - 2011 DJIBO BOUBACAR ANNEXEV (SUITE): Capture pour configuration VPN site à site du GPTO /SONITELvii Thème : Etude et mise en oeuvre d'une solution de sécurisation du réseau IP de la SONITEL Mémoire de fin de formation en mastère spécialisé 2010 - 2011 DJIBO BOUBACAR ANNEXEV (SUITE & FIN): Capture pour configuration VPN site à site du GPTO /SONITELviii Thème : Etude et mise en oeuvre d'une solution de sécurisation du réseau IP de la SONITEL Mémoire de fin de formation en mastère spécialisé 2010 - 2011 DJIBO BOUBACAR ANNEXE VI: Commande Nmapnmap -sp pour scanner les ports sur nos(04) quatre blocs d'adresse <? xml version="1.0" encoding="iso-8859-1"?> <?xml-stylesheet href="file:///C:/Program Files/Nmap/nmap.xsl" type="text/xsl"?><nmaprun start="1316964451" profile_name="Intense scan, all TCP ports" xmloutputversion="1.03" scanner="nmap" version="5.21" startstr="Sun Sep 25 17:27:31 2011" args="nmap -p 1-65535 -T4 -A -v -PE -PS22,25,80 -PA21,23,80,3389 193.251.220.12"><scaninfo services="1-65535" protocol="tcp" numservices="65535" type="syn"></scaninfo><verbose level="1"></verbose><debugging level="0"></debugging><output type="interactive">Starting Nmap 5.21 ( http://nmap.org ) at 2011-09-25 17:27 Paris, Madrid (heure d'été)NSE: Loaded 36 scripts for scanning.Initiating Ping Scan at 17:27Scanning X.X.X.12 [8 ports] Completed Ping Scan at 17:27, 0.03s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:27 Completed Parallel DNS resolution of 1 host. at 17:27, 0.01s elapsedInitiating SYN Stealth Scan at 17:27 Scanning X.X.X.12 [65535 ports] Discovered open port 23/tcp on X.X1.X.12 Completed SYN Stealth Scan at 17:27, 10.11s elapsed (65535 total ports) Initiating Service scan at 17:27 Scanning 1 service on 193.251.220.12 Completed Service scan at 17:27, 0.01s elapsed (1 service on 1 host) Initiating OS detection (try #1) against X.X1.X.12 Retrying OS detection (try #2) against X.X1.X.12 Retrying OS detection (try #3) against X.X1.X.12 Retrying OS detection (try #4) against X.X1.X.12 Retrying OS detection (try #5) against X.X1.X.12 Initiating Traceroute at 17:27 Completed Traceroute at 17:27, 0.02s elapsed Initiating Parallel DNS resolution of 2 hosts. at 17:27 Completed Parallel DNS resolution of 2 hosts. at 17:27, 0.48s elapsed NSE: Script scanning X.X1.X.12 NSE: Script Scanning completed. Nmap scan report for X.X1.X.12 Host is up (0.0010s latency). Not shown: 65534 closed ports PORT STATE SERVICE VERSION 23/tcp open telnet Cisco IOS telnetd No exact OS matches for host (If you know what OS is running on it, see http://nmap.org/submit/). TCP/IP fingerprint: OS:SCAN (V=5.21%D=9/25%OT=23%CT=1%CU=35710%PV=N%DS=2%DC=T%G=Y%TM=4E7F487D%P= OS: i686-pc-windows-windows) SEQ (SP=FD%GCD=1%ISR=10E%TI=RD%CI=RD%II=RI%TS=U) SOS: EQ (SP=106%GCD=1%ISR=107%TI=RD%CI=RD%II=RI%TS=U) SEQ (SP=105%GCD=1%ISR=10B%COMMANDES nmap -sp (suite et fin) OS: TI=RD%CI=RD%II=RI%TS=U) SEQ (SP=FE%GCD=1%ISR=105%TI=RD%CI=RD%II=RI%TS=U) SEOS: Q (SP=FD%GCD=1%ISR=106%TI=RD%CI=RD%II=RI%TS=U) OPS
(O1=M5B4%O2=M578%O3=M280OS: OS:1020) ECN(R=Y%DF=N%T=100%W=1020%O=M5B4%CC=N%Q=) T1(R=Y%DF=N%T=100%S=O%A=S+ ix Thème : Etude et mise en oeuvre d'une solution de sécurisation du réseau IP de la SONITEL Mémoire de fin de formation en mastère spécialisé 2010 - 2011 DJIBO BOUBACAR OS:%F=AS%RD=0%Q=) T2(R=Y%DF=N%T=100%W=0%S=A%A=S%F=AR%O=%RD=0%Q=) T3(R=N) T4(R= OS: Y%DF=N%T=100%W=0%S=A%A=Z%F=R%O=%RD=0%Q=) T5(R=Y%DF=N%T=100%W=0%S=A%A=S+%F OS:=AR%O=%RD=0%Q=) T6(R=Y%DF=N%T=100%W=0%S=A%A=Z%F=R%O=%RD=0%Q=) T7(R=Y%DF=N% OS:T=100%W=0%S=A%A=S%F=AR%O=%RD=0%Q=) U1(R=Y%DF=N%T=100%IPL=38%UN=0%RIPL=G%R OS: ID=G%RIPCK=G%RUCK=F4A0%RUD=G) IE(R=Y%DFI=S%T=100%CD=S) Network Distance: 2 hops TCP Sequence Prediction: Difficulty=253 (Good luck!) IP ID Sequence Generation: Randomized Service Info: OS: IOS; Device: switch TRACEROUTE (using port 993/tcp) HOP RTT ADDRESS1 0.00 ms X.X.X.254 2 0.00 ms X.X1.X.12 Read data files from: C:\Program Files\Nmap OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 28.23 seconds Raw packets sent: 65649 (2.892MB) | Rcvd: 65623 (2.626MB) </output><host comment=""><status state="up"></status><address addrtype="ipv4" vendor="" addr="193.251.220.12"></address><hostnames></hostnames><ports><extraports count="65534" state="closed"></extraports><port protocol="tcp" portid="23"><state reason="syn-ack" state="open" reason_ttl="254"></state><service product="Cisco IOS
telnetd" method="probed"
conf="10" state="closed" portid="1" proto="tcp"></portused><portused state="closed" portid="35710" proto="udp"></portused><osclass type="router" osfamily="IOS" vendor="Cisco" osgen="12.X" accuracy="98"></osclass><osclass type="WAP" osfamily="IOS" vendor="Cisco" osgen="12.X" accuracy="97"></osclass><osclass type="VoIP adapter" osfamily="embedded" vendor="Cisco" osgen="" accuracy="95"></osclass><osclass type="switch"
osfamily="IOS" vendor="Cisco"
osgen="12.X" accuracy="88"></osclass></os><uptime
lastboot="" seconds=""></uptime><tcpsequence
index="253" x Thème : Etude et mise en oeuvre d'une solution de sécurisation du réseau IP de la SONITEL |
|