• Penetration Test


    Nmap Scoping and Output Options

    NMAP
    • nmap(Network Mapper)
      • One of the most common and most useful tools for reconnaissance
      • nmap -A does much of what we're about to see
    nmap -A 10.0.0.21
    

    image-20201104210542837

    kali@kali:~$ nmap -A 10.0.0.21
    Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-04 08:00 EST
    Nmap scan report for 10.0.0.21
    Host is up (0.00072s latency).
    Not shown: 977 closed ports
    PORT     STATE SERVICE     VERSION
    21/tcp   open  ftp         vsftpd 2.3.4
    |_ftp-anon: Anonymous FTP login allowed (FTP code 230)
    | ftp-syst: 
    |   STAT: 
    | FTP server status:
    |      Connected to 10.0.0.18
    |      Logged in as ftp
    |      TYPE: ASCII
    |      No session bandwidth limit
    |      Session timeout in seconds is 300
    |      Control connection is plain text
    |      Data connections will be plain text
    |      vsFTPd 2.3.4 - secure, fast, stable
    |_End of status
    22/tcp   open  ssh         OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0)
    | ssh-hostkey: 
    |   1024 60:0f:cf:e1:c0:5f:6a:74:d6:90:24:fa:c4:d5:6c:cd (DSA)
    |_  2048 56:56:24:0f:21:1d:de:a7:2b:ae:61:b1:24:3d:e8:f3 (RSA)
    23/tcp   open  telnet      Linux telnetd
    25/tcp   open  smtp        Postfix smtpd
    |_smtp-commands: metasploitable.localdomain, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, 
    |_ssl-date: 2020-11-04T13:01:11+00:00; +4s from scanner time.
    | sslv2: 
    |   SSLv2 supported
    |   ciphers: 
    |     SSL2_DES_192_EDE3_CBC_WITH_MD5
    |     SSL2_RC4_128_EXPORT40_WITH_MD5
    |     SSL2_DES_64_CBC_WITH_MD5
    |     SSL2_RC2_128_CBC_EXPORT40_WITH_MD5
    |     SSL2_RC2_128_CBC_WITH_MD5                                                                                                
    |_    SSL2_RC4_128_WITH_MD5                                                                                             
    53/tcp   open  domain      ISC BIND 9.4.2                                                                           
    | dns-nsid: 
    |_  bind.version: 9.4.2
    80/tcp   open  http        Apache httpd 2.2.8 ((Ubuntu) DAV/2)
    |_http-server-header: Apache/2.2.8 (Ubuntu) DAV/2
    |_http-title: Metasploitable2 - Linux
    111/tcp  open  rpcbind     2 (RPC #100000)
    139/tcp  open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
    445/tcp  open  netbios-ssn Samba smbd 3.0.20-Debian (workgroup: WORKGROUP)
    512/tcp  open  exec        netkit-rsh rexecd
    513/tcp  open  login       OpenBSD or Solaris rlogind
    514/tcp  open  tcpwrapped
    1099/tcp open  java-rmi    GNU Classpath grmiregistry
    1524/tcp open  bindshell   Metasploitable root shell
    2049/tcp open  nfs         2-4 (RPC #100003)
    2121/tcp open  ftp         ProFTPD 1.3.1
    3306/tcp open  mysql       MySQL 5.0.51a-3ubuntu5
    | mysql-info: 
    |   Protocol: 10
    |   Version: 5.0.51a-3ubuntu5
    |   Thread ID: 9
    |   Capabilities flags: 43564
    |   Some Capabilities: ConnectWithDatabase, Speaks41ProtocolNew, SupportsCompression, SupportsTransactions, SwitchToSSLAfterHandshake, Support41Auth, LongColumnFlag
    |   Status: Autocommit
    |_  Salt: iw;`PP!S]Z.t~=QatB/`
    5432/tcp open  postgresql  PostgreSQL DB 8.3.0 - 8.3.7
    |_ssl-date: 2020-11-04T13:01:11+00:00; +4s from scanner time.
    5900/tcp open  vnc         VNC (protocol 3.3)
    | vnc-info: 
    |   Protocol version: 3.3
    |   Security types: 
    |_    VNC Authentication (2)
    6000/tcp open  X11         (access denied)
    6667/tcp open  irc         UnrealIRCd
    | irc-info: 
    |   users: 1
    |   servers: 1
    |   lusers: 1
    |   lservers: 0
    |   server: irc.Metasploitable.LAN
    |   version: Unreal3.2.8.1. irc.Metasploitable.LAN 
    |   uptime: 0 days, 0:12:25
    |   source ident: nmap
    |   source host: 91317ABA.D3975B40.7B559A54.IP
    |_  error: Closing Link: pbbmdccox[10.0.0.18] (Quit: pbbmdccox)
    8009/tcp open  ajp13       Apache Jserv (Protocol v1.3)
    |_ajp-methods: Failed to get a valid response for the OPTION request
    8180/tcp open  http        Apache Tomcat/Coyote JSP engine 1.1
    |_http-favicon: Apache Tomcat
    |_http-server-header: Apache-Coyote/1.1
    |_http-title: Apache Tomcat/5.5
    Service Info: Hosts:  metasploitable.localdomain, irc.Metasploitable.LAN; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
    
    Host script results:
    |_clock-skew: mean: 1h15m04s, deviation: 2h30m00s, median: 3s
    |_nbstat: NetBIOS name: METASPLOITABLE, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
    | smb-os-discovery: 
    |   OS: Unix (Samba 3.0.20-Debian)
    |   Computer name: metasploitable
    |   NetBIOS computer name: 
    |   Domain name: localdomain
    |   FQDN: metasploitable.localdomain
    |_  System time: 2020-11-04T08:01:03-05:00
    | smb-security-mode: 
    |   account_used: <blank>
    |   authentication_level: user
    |   challenge_response: supported
    |_  message_signing: disabled (dangerous, but default)
    |_smb2-time: Protocol negotiation failed (SMB2)
    
    Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
    Nmap done: 1 IP address (1 host up) scanned in 35.56 seconds
    
    
    SYN SCAN vs. FULL CONNECT SCAN
    • SYN (stealth) scan
      • nmap -sS target
      • Sends SYN packet and examines response (SYN/ACK means the port is open)
      • If SYN/ACK received, nmap sends RST to terminate the connection request
    • Full connect scan
      • nmap -sT target
      • Completes the handshake steps to establish a connection (more reliable)

    DEMO 1:

    nmap -sS 10.0.0.21
    

    image-20201104211509677

    kali@kali:~$ sudo nmap -sS 10.0.0.21
    [sudo] password for kali: 
    Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-04 08:14 EST
    Nmap scan report for 10.0.0.21
    Host is up (0.0037s latency).
    Not shown: 977 closed ports
    PORT     STATE SERVICE
    21/tcp   open  ftp
    22/tcp   open  ssh
    23/tcp   open  telnet
    25/tcp   open  smtp
    53/tcp   open  domain
    80/tcp   open  http
    111/tcp  open  rpcbind
    139/tcp  open  netbios-ssn
    445/tcp  open  microsoft-ds
    512/tcp  open  exec
    513/tcp  open  login
    514/tcp  open  shell
    1099/tcp open  rmiregistry
    1524/tcp open  ingreslock
    2049/tcp open  nfs
    2121/tcp open  ccproxy-ftp
    3306/tcp open  mysql
    5432/tcp open  postgresql
    5900/tcp open  vnc
    6000/tcp open  X11
    6667/tcp open  irc
    8009/tcp open  ajp13
    8180/tcp open  unknown
    MAC Address: 00:0C:29:FA:DD:2A (VMware)
    
    Nmap done: 1 IP address (1 host up) scanned in 0.33 seconds
    

    DEMO 2:

    nmap -sT 10.0.0.21
    

    image-20201104211930792

    kali@kali:~$ sudo nmap -sT 10.0.0.21
    [sudo] password for kali: 
    Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-04 08:18 EST
    Nmap scan report for 10.0.0.21
    Host is up (0.0015s latency).
    Not shown: 977 closed ports
    PORT     STATE SERVICE
    21/tcp   open  ftp
    22/tcp   open  ssh
    23/tcp   open  telnet
    25/tcp   open  smtp
    53/tcp   open  domain
    80/tcp   open  http
    111/tcp  open  rpcbind
    139/tcp  open  netbios-ssn
    445/tcp  open  microsoft-ds
    512/tcp  open  exec
    513/tcp  open  login
    514/tcp  open  shell
    1099/tcp open  rmiregistry
    1524/tcp open  ingreslock
    2049/tcp open  nfs
    2121/tcp open  ccproxy-ftp
    3306/tcp open  mysql
    5432/tcp open  postgresql
    5900/tcp open  vnc
    6000/tcp open  X11
    6667/tcp open  irc
    8009/tcp open  ajp13
    8180/tcp open  unknown
    MAC Address: 00:0C:29:FA:DD:2A (VMware)
    
    Nmap done: 1 IP address (1 host up) scanned in 0.24 seconds
    
    Nmap cheat sheet

    https://www.stationx.net/nmap-cheat-sheet/

    image-20201104212429071

    SERVICE IDENTIFICATION(-sV)
    • Service identification(-sV)
      • nmap -sV
      • Attempts to determine service and version info
        • --version-intentsity , where level can be o(light) to 9 (execute all probes)

    DEMO 1:(Service and Version Detection)

    nmap -sV 10.0.0.21
    

    image-20201104213010001

    kali@kali:~$ nmap -sV 10.0.0.21
    Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-04 08:28 EST
    Nmap scan report for 10.0.0.21
    Host is up (0.0025s latency).
    Not shown: 977 closed ports
    PORT     STATE SERVICE     VERSION
    21/tcp   open  ftp         vsftpd 2.3.4
    22/tcp   open  ssh         OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0)
    23/tcp   open  telnet      Linux telnetd
    25/tcp   open  smtp        Postfix smtpd
    53/tcp   open  domain      ISC BIND 9.4.2
    80/tcp   open  http        Apache httpd 2.2.8 ((Ubuntu) DAV/2)
    111/tcp  open  rpcbind     2 (RPC #100000)
    139/tcp  open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
    445/tcp  open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
    512/tcp  open  exec        netkit-rsh rexecd
    513/tcp  open  login?
    514/tcp  open  tcpwrapped
    1099/tcp open  java-rmi    GNU Classpath grmiregistry
    1524/tcp open  bindshell   Metasploitable root shell
    2049/tcp open  nfs         2-4 (RPC #100003)
    2121/tcp open  ftp         ProFTPD 1.3.1
    3306/tcp open  mysql       MySQL 5.0.51a-3ubuntu5
    5432/tcp open  postgresql  PostgreSQL DB 8.3.0 - 8.3.7
    5900/tcp open  vnc         VNC (protocol 3.3)
    6000/tcp open  X11         (access denied)
    6667/tcp open  irc         UnrealIRCd
    8009/tcp open  ajp13       Apache Jserv (Protocol v1.3)
    8180/tcp open  http        Apache Tomcat/Coyote JSP engine 1.1
    Service Info: Hosts:  metasploitable.localdomain, irc.Metasploitable.LAN; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
    
    Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
    Nmap done: 1 IP address (1 host up) scanned in 11.67 seconds
    
    

    DEMO 2:(Timing and Performance)

    nmap -sV -T4 10.0.0.21
    

    image-20201104213722638

    kali@kali:~$ nmap -sV -T4 10.0.0.21
    Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-04 08:36 EST
    Nmap scan report for 10.0.0.21
    Host is up (0.0021s latency).
    Not shown: 977 closed ports
    PORT     STATE SERVICE     VERSION
    21/tcp   open  ftp         vsftpd 2.3.4
    22/tcp   open  ssh         OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0)
    23/tcp   open  telnet      Linux telnetd
    25/tcp   open  smtp        Postfix smtpd
    53/tcp   open  domain      ISC BIND 9.4.2
    80/tcp   open  http        Apache httpd 2.2.8 ((Ubuntu) DAV/2)
    111/tcp  open  rpcbind     2 (RPC #100000)
    139/tcp  open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
    445/tcp  open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
    512/tcp  open  exec        netkit-rsh rexecd
    513/tcp  open  login       OpenBSD or Solaris rlogind
    514/tcp  open  tcpwrapped
    1099/tcp open  java-rmi    GNU Classpath grmiregistry
    1524/tcp open  bindshell   Metasploitable root shell
    2049/tcp open  nfs         2-4 (RPC #100003)
    2121/tcp open  ftp         ProFTPD 1.3.1
    3306/tcp open  mysql       MySQL 5.0.51a-3ubuntu5
    5432/tcp open  postgresql  PostgreSQL DB 8.3.0 - 8.3.7
    5900/tcp open  vnc         VNC (protocol 3.3)
    6000/tcp open  X11         (access denied)
    6667/tcp open  irc         UnrealIRCd
    8009/tcp open  ajp13       Apache Jserv (Protocol v1.3)
    8180/tcp open  http        Apache Tomcat/Coyote JSP engine 1.1
    Service Info: Hosts:  metasploitable.localdomain, irc.Metasploitable.LAN; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
    
    Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
    Nmap done: 1 IP address (1 host up) scanned in 11.56 seconds
    kali@kali:~$ 
    
    

    DEMO 3:(Output)

    nmap -sV -T4 10.0.0.21 -oA myscan
    

    image-20201104214359569

    GATHERING INFORMATION WITH NAMP
    • OS fingerprinting(-O)
      • Detects target OS
      • nmap -O
    • Disabling ping (-Pn)
      • Skips host discover (assumes all are online)
      • nmap -Pn
    • Target input file (-iL)
      • Uses a text file that contains a list of targets
        • nmap -iL
    QUICK REVIEW
    • Stealth scans (nmap -sS ) create fewer network packets than full connect scans (nmap -sT )
    • Nmap service identification (nmap -sV ) attempts to identify the service and version monitoring each port
    • Namp returns results faster if targets aren't pinged and are just assumed they're alive (nmap -Pn )
    • To avoid detection, use the nmap timing option with a lower number (nmap -To or nmap -T1 )
    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    MapServer Tutorial——MapServer7.2.1教程学习——第一节:MapServer的基本配置管理,静态地图应用以及MapFile文件
    MapServer Tutorial——MapServer7.2.1教程学习——教程背景
    MapServer Tutorial——MapServer7.2.1教程学习(大纲)
    MapServer Configuring with IIS
    GDAL源码编译(32位)
    开机自启动相关程序
    异常:Invalid character found in the request target. The valid characters are defined in RFC 3986
    如何将解压版的tomcat设置为windows 服务启动
    修改Tomcat控制台标题
    Tomcat控制台中文乱码解决办法
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/13928922.html
Copyright © 2020-2023  润新知