Vous pouvez utiliser nmap
OS discovery pour découvrir divers détails sur le houblon. Son succès dépend un peu du degré d'ouverture de l'appareil. Ce dernier n'est généralement pas ouvert du tout s'il fait partie de l'infrastructure de routage de l'internet.
$ sudo nmap -O -v 203.215.20.19
Starting Nmap 6.00 ( http://nmap.org ) at 2013-07-16 08:26 EST
Initiating Ping Scan at 08:26
Scanning 203.215.20.19 [4 ports]
Completed Ping Scan at 08:26, 0.11s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 08:26
Completed Parallel DNS resolution of 1 host. at 08:26, 6.50s elapsed
Initiating SYN Stealth Scan at 08:26
Scanning te4-4.ade-pipe-bdr1.on.ii.net (203.215.20.19) [1000 ports]
Completed SYN Stealth Scan at 08:26, 2.18s elapsed (1000 total ports)
Initiating OS detection (try #1) against te4-4.ade-pipe-bdr1.on.ii.net (203.215.20.19)
Nmap scan report for te4-4.ade-pipe-bdr1.on.ii.net (203.215.20.19)
Host is up (0.13s latency).
All 1000 scanned ports on te4-4.ade-pipe-bdr1.on.ii.net (203.215.20.19) are closed
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: router|switch|WAP
Running: Cisco IOS 12.X
OS CPE: cpe:/h:cisco:870_router cpe:/o:cisco:ios:12 cpe:/h:cisco:2960_switch cpe:/h:cisco:aironet_ap1250 cpe:/o:cisco:ios:12.4
OS details: Cisco 870 router or 2960 switch (IOS 12.2 - 12.4), Cisco Aironet 1250 WAP (IOS 12.4)
Network Distance: 6 hops
Read data files from: /usr/bin/../share/nmap
OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.42 seconds
Raw packets sent: 1090 (48.554KB) | Rcvd: 1007 (40.530KB)