Security Basics mailing list archives
Scanning hosts behind a NAT
From: "Norbert François" <norbertlike () gmail com>
Date: Sat, 22 Apr 2006 20:22:46 +0200
Hi list ;), I'm a student and I'm trying to learn how nmap does its job. Today, for example, I tried to scan my home network ( ;) )... In fact, I've 2 computers behind a router (which does wireless AP, router & firewall: linksys wrt54g). Then, I tried to scan from "outside" the network (aka: from a friend on the internet). On the router (LAN ip: 192.168.1.1) , I've the port 6356 (Gnutella) which is forwarded to 192.168.1.2 (my first pc). When I tried to scan from outside, I obviously obtain: Starting Nmap 4.01 ( http://www.insecure.org/nmap/ ) at 2006-04-22 18:26 CEST Warning: OS detection will be MUCH less reliable because we did not find at least 1 open and 1 closed TCP port Interesting ports on 80.13.xx.yy: (The 1671 ports scanned but not shown below are in state: filtered) PORT STATE SERVICE VERSION 6346/tcp closed gnutella Too many fingerprints match this host to give specific OS details In fact, it was what I was expecting for. My question is how to scan the hosts behind the router (NAT) ? Is it possible ? Thanks N. ------------------------------------------------------------------------- This List Sponsored by: Webroot Don't leave your confidential company and customer records un-protected. Try Webroot's Spy Sweeper Enterprise(TM) for 30 days for FREE with no obligation. See why so many companies trust Spy Sweeper Enterprise to eradicate spyware from their networks. FREE 30-Day Trial of Spy Sweeper Enterprise http://www.webroot.com/forms/enterprise_lead.php --------------------------------------------------------------------------
Current thread:
- Scanning hosts behind a NAT Norbert François (Apr 24)
- Re: Scanning hosts behind a NAT Kenton Smith (Apr 24)
- Re: Scanning hosts behind a NAT Craig Van Tassle (Apr 25)
- Re: Scanning hosts behind a NAT insecure (Apr 25)