Page 1 of 1

So you want to know what SRO servers look like eh?

Posted: Thu Jun 07, 2007 5:51 am
by PureOwnage
Ok, so I am running a nmap against this address:
121.128.133.27 gwgt1.joymax.com
lets see what I can dig up ^.^! Scan is in. Enjoy

Image

Posted: Thu Jun 07, 2007 6:03 am
by Rainigul
I hope you dig us some good stuff :)

Posted: Thu Jun 07, 2007 6:06 am
by Mage Pker
ur not gonna find much....

Posted: Thu Jun 07, 2007 6:11 am
by PureOwnage
Later I'll try a more agressive Firewall bypassing scan see what else I can get.

Posted: Thu Jun 07, 2007 6:45 am
by PureOwnage
holy crap this is the fastest 95+ views I have ever seen on a topic lol (95 views in under 5 minutes.) :D

Posted: Thu Jun 07, 2007 7:03 am
by Mage Pker
how long did it take you to waste your time on this?!?!?

Posted: Thu Jun 07, 2007 7:04 am
by Rainigul
PureOwnage wrote:holy crap this is the fastest 95+ views I have ever seen on a topic lol (95 views in under 5 minutes.) :D


Yes, but like no comments...

Btw, I have no idea what any of that means.

Posted: Thu Jun 07, 2007 8:23 am
by PureOwnage
Mage Pker wrote:how long did it take you to waste your time on this?!?!?


not too long the full nmap scan too aprox. 11 minutes. :D

Posted: Thu Jun 07, 2007 8:26 am
by Vandango
Windows 2000 FTW

Posted: Thu Jun 07, 2007 9:12 am
by PR0METHEUS
haha and here I thought this thread was going to be about what Joymax's servers LOOK like. Pictures of the towers or something. :P

<sarcasm>But Windows? They should port to eCommStation!</sarcasm>

Posted: Thu Jun 07, 2007 9:23 am
by alZen
PR0METHEUS wrote:haha and here I thought this thread was going to be about what Joymax's servers LOOK like. Pictures of the towers or something. :P


more like heaps of dung ... lol

Posted: Thu Jun 07, 2007 9:49 am
by truez
Let me jus explain it better in computer networking terminology ...
He is using nmap (NETMAP) command which basically known as Network Auditing.
He is trying to trace the amt of packets he can send and recieve to 121.128.133.27 gwgt1.joymax.com

Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.
For more info,
http://insecure.org/nmap/

Hope this helps for those who never understood what he is doin :)

Posted: Fri Jun 08, 2007 12:19 pm
by red_baron2000
Yes, but he's found out what? Nothing. Waste of time, IMO.

Posted: Fri Jun 08, 2007 1:09 pm
by PR0METHEUS
red_baron2000 wrote:Yes, but he's found out what? Nothing. Waste of time, IMO.


Well he found out that the 2 servers are "probably" running Windows. I say probably because NMAP stated the results are much less reliable because it couldn't find at least one open and one closed port.

That's not all that useful though.

Posted: Fri Jun 08, 2007 1:13 pm
by dabat
HACK THOSE BITCHES! AND GIVE US A NICE SOSUN!!!!!!!!!!!!!!!!11111

^^'