Das wort "gehackt" ist wohl ziemlich unangebracht. Cracken ist wohl eher der richtige Terminus. Allerdings würde mich mal interessieren wie der die Kiste aufgemacht hat und warum da unten was von ADO steht... das ist imho ein Begriff aus der Windows Datenbanken Welt.[code:1][root@zion thunderbolt]# nmap -sSV -O
www.thinkpad-portal.com
Starting Nmap 4.03 ( http://www.insecure.org/nmap/ ) at 2006-09-22 11:11 CEST
Interesting ports on 65-254-250-103.yourhostingaccount.com (65.254.250.103):
(The 1662 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE VERSION
21/tcp open ftp ProFTPD 1.2.10
25/tcp open smtp Exim smtpd 4.X
80/tcp open http Apache httpd
110/tcp open pop3 Courier pop3d
143/tcp open imap Courier Imapd (released 2005)
443/tcp open ssl/http Apache httpd
465/tcp open ssl/smtp Exim smtpd 4.X
587/tcp open smtp Exim smtpd
993/tcp open ssl/imap Courier Imapd (released 2005)
995/tcp open ssl/pop3 Courier pop3d
1720/tcp filtered H.323/Q.931
8080/tcp open http-proxy?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port8080-TCP:V=4.03%I=7%D=9/22%Time=4513A956%P=i386-redhat-linux-gnu%r(
SF:GetRequest,85,"HTTP/1\.0\x20503\x20Service\x20Unavailable\r\nServer:\x2
SF:0WebProxy/2\.0\r\nDate:\x20Fri,\x2022\x20Sep\x202006\x2009:13:37\x20GMT
SF:\r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(HTTPOption
SF:s,85,"HTTP/1\.0\x20503\x20Service\x20Unavailable\r\nServer:\x20WebProxy
SF:/2\.0\r\nDate:\x20Fri,\x2022\x20Sep\x202006\x2009:13:38\x20GMT\r\nConte
SF:nt-Length:\x200\r\nConnection:\x20close\r\n\r\n");
No OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).
TCP/IP fingerprint:
SInfo(V=4.03%P=i386-redhat-linux-gnu%D=9/22%Tm=4513A981%O=21%C=1)
TSeq(Class=TR%IPID=RPI%TS=1000HZ)
TSeq(Class=TR%IPID=RD%TS=1000HZ)
T1(Resp=Y%DF=Y%W=31B%ACK=S++%Flags=AS%Ops=MNWNNT)
T2(Resp=N)
T3(Resp=Y%DF=N%W=C00%ACK=S%Flags=AR%Ops=WNMETL)
T3(Resp=Y%DF=N%W=400%ACK=S%Flags=AR%Ops=WNMETL)
T3(Resp=Y%DF=N%W=1000%ACK=S%Flags=AR%Ops=WNMETL)
T4(Resp=Y%DF=N%W=400%ACK=S%Flags=AR%Ops=WNMETL)
T4(Resp=Y%DF=N%W=1000%ACK=S%Flags=AR%Ops=WNMETL)
T4(Resp=Y%DF=N%W=800%ACK=S%Flags=AR%Ops=WNMETL)
T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=)
T6(Resp=Y%DF=N%W=800%ACK=S%Flags=AR%Ops=WNMETL)
T6(Resp=Y%DF=N%W=C00%ACK=S%Flags=AR%Ops=WNMETL)
T6(Resp=Y%DF=N%W=400%ACK=S%Flags=AR%Ops=WNMETL)
T7(Resp=Y%DF=N%W=800%ACK=S%Flags=AR%Ops=WNMETL)
T7(Resp=Y%DF=N%W=400%ACK=S%Flags=AR%Ops=WNMETL)
T7(Resp=Y%DF=N%W=800%ACK=S%Flags=AR%Ops=WNMETL)
PU(Resp=Y%DF=Y%TOS=0%IPLEN=38%RIPTL=148%RID=E%RIPCK=E%UCK=F%ULEN=134%DAT=E)
Uptime 18.510 days (since Sun Sep 3 22:59:56 2006)
Nmap finished: 1 IP address (1 host up) scanned in 215.216 seconds
[/code:1]