ihermit |
03-28-2013 09:51 PM |
Nmap unknown fingerprint submission howto
I'm very new to nmap, really just playing around, but I keep getting
Code:
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
Here's the fingerprint
Code:
SF-Port1900-TCP:V=6.01%I=7%D=3/28%Time=5154FE07%P=i486-slackware-linux-gnu
SF:%r(GetRequest,10A,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x2
SF:0text/html\r\nConnection:\x20close\r\nContent-Length:\x20134\r\nServer:
SF:\x20MF60/1\.0\x20UPnP/1\.0\x20miniupnpd/1\.0\r\n\r\n<HTML><HEAD><TITLE>
SF:404\x20Not\x20Found</TITLE></HEAD><BODY><H1>Not\x20Found</H1>The\x20req
SF:uested\x20URL\x20was\x20not\x20found\x20on\x20this\x20server\.</BODY></
SF:HTML>\r\n")%r(GenericLines,117,"\x20501\x20Not\x20Implemented\r\nConten
SF:t-Type:\x20text/html\r\nConnection:\x20close\r\nContent-Length:\x20149\
SF:r\nServer:\x20MF60/1\.0\x20UPnP/1\.0\x20miniupnpd/1\.0\r\n\r\n<HTML><HE
SF:AD><TITLE>501\x20Not\x20Implemented</TITLE></HEAD><BODY><H1>Not\x20Impl
SF:emented</H1>The\x20HTTP\x20Method\x20is\x20not\x20implemented\x20by\x20
SF:this\x20server\.</BODY></HTML>\r\n")%r(HTTPOptions,11F,"HTTP/1\.0\x2050
SF:1\x20Not\x20Implemented\r\nContent-Type:\x20text/html\r\nConnection:\x2
SF:0close\r\nContent-Length:\x20149\r\nServer:\x20MF60/1\.0\x20UPnP/1\.0\x
SF:20miniupnpd/1\.0\r\n\r\n<HTML><HEAD><TITLE>501\x20Not\x20Implemented</T
SF:ITLE></HEAD><BODY><H1>Not\x20Implemented</H1>The\x20HTTP\x20Method\x20i
SF:s\x20not\x20implemented\x20by\x20this\x20server\.</BODY></HTML>\r\n")%r
SF:(RTSPRequest,11F,"RTSP/1\.0\x20501\x20Not\x20Implemented\r\nContent-Typ
SF:e:\x20text/html\r\nConnection:\x20close\r\nContent-Length:\x20149\r\nSe
SF:rver:\x20MF60/1\.0\x20UPnP/1\.0\x20miniupnpd/1\.0\r\n\r\n<HTML><HEAD><T
SF:ITLE>501\x20Not\x20Implemented</TITLE></HEAD><BODY><H1>Not\x20Implement
SF:ed</H1>The\x20HTTP\x20Method\x20is\x20not\x20implemented\x20by\x20this\
SF:x20server\.</BODY></HTML>\r\n")%r(FourOhFourRequest,10A,"HTTP/1\.0\x204
SF:04\x20Not\x20Found\r\nContent-Type:\x20text/html\r\nConnection:\x20clos
SF:e\r\nContent-Length:\x20134\r\nServer:\x20MF60/1\.0\x20UPnP/1\.0\x20min
SF:iupnpd/1\.0\r\n\r\n<HTML><HEAD><TITLE>404\x20Not\x20Found</TITLE></HEAD
SF:><BODY><H1>Not\x20Found</H1>The\x20requested\x20URL\x20was\x20not\x20fo
SF:und\x20on\x20this\x20server\.</BODY></HTML>\r\n")%r(SIPOptions,11E,"SIP
SF:/2\.0\x20501\x20Not\x20Implemented\r\nContent-Type:\x20text/html\r\nCon
SF:nection:\x20close\r\nContent-Length:\x20149\r\nServer:\x20MF60/1\.0\x20
SF:UPnP/1\.0\x20miniupnpd/1\.0\r\n\r\n<HTML><HEAD><TITLE>501\x20Not\x20Imp
SF:lemented</TITLE></HEAD><BODY><H1>Not\x20Implemented</H1>The\x20HTTP\x20
SF:Method\x20is\x20not\x20implemented\x20by\x20this\x20server\.</BODY></HT
SF:ML>\r\n");
I'm not sure how to submit this and don't want to do it wrong.
OS: Linux Slackware 14 -current
wifi : T-Mobile 4G Mobile HotSpot
Firmware Version: BD_MF61V1.0.0B14
I got this fingerprint with :
Code:
nmap -sV --script exploit -d3 --script-trace 192.168.0.1
A little advice in the right direction of how to do this.
Thanks
|