美文网首页
1-5、环境配置、主机探测、端口扫描、漏洞扫描

1-5、环境配置、主机探测、端口扫描、漏洞扫描

作者: Tess鱼丸 | 来源:发表于2022-12-16 02:01 被阅读0次

二层主机发现优缺点

二层主机发现指:利用ISO中链路层中的协议进行主机发现。一般使用ARP协议。
优点:(局域网中通信使用ARP协议,利用MAC地址作为对应的识别地址)
1、速度快
2、可靠性高
无法扫描经过路由的主机

二层发现工具:

arping
netdiscover

三层发现工具:

ping 查看一个网段存活的三层主机fping -g 192.168.1.1/24对目标进行三层发现,特点,发送自定义ICMP包hping3 -c 2 --icmp 192.168.1.1自定义icmp的code进行pinghping3 -c 3 -1 192.168.1.1 --icmpcode 1`

四层发现工具:

nmap 192.168.1.54

┌──(root㉿kali)-[~]
└─# nmap 192.168.1.54
Starting Nmap 7.92 ( https://nmap.org ) at 2022-12-16 12:15 EST
Nmap scan report for 192.168.1.54
Host is up (0.00028s latency).
Not shown: 988 filtered tcp ports (no-response), 10 filtered tcp ports (admin-prohibited)
PORT     STATE  SERVICE
22/tcp   open   ssh
9090/tcp closed zeus-admin
MAC Address: 00:0C:29:84:47:4B (VMware)

Nmap done: 1 IP address (1 host up) scanned in 5.28 seconds

hping3 --udp -c 3 IP

nWatch.py什么脚本

git clone https://github.com/Cyber-Forensic/nWatch.git
用不了。。。

=================================================

=================================================

4、端口扫描

nmap
nmap IP地
dmitry
dmitry -p 进行tcp端口扫描

netcat
nc -nvz IP地址 端口范围

端口分类

0-65535
TCP端口和UDP端口,
TCP和UDP 两个协议是独立的,因此各自的端口好也是相互独立的,
TCP有235端口
UDP也有235端口

默认端口0-1023
注册端口1024-49151
动态端口49152-65535

nmap IP地址 --script banner -p 端口号

单个端口扫描

┌──(root㉿kali)-[~]
└─# nmap -p 22 192.168.1.122 --script banner
Starting Nmap 7.92 ( https://nmap.org ) at 2022-12-17 22:53 EST
Nmap scan report for 192.168.1.122
Host is up (0.00019s latency).

PORT   STATE SERVICE
22/tcp open  ssh
|_banner: SSH-2.0-OpenSSH_8.7
MAC Address: 00:0C:29:42:60:34 (VMware)

Nmap done: 1 IP address (1 host up) scanned in 0.32 seconds

多个端口扫描

┌──(root㉿kali)-[~]
└─# nmap 192.168.1.222 --script banner -p 20-30
Starting Nmap 7.92 ( https://nmap.org ) at 2022-12-18 00:12 EST
Nmap scan report for 192.168.1.222
Host is up (0.00030s latency).

PORT   STATE    SERVICE
20/tcp filtered ftp-data
21/tcp filtered ftp
22/tcp open     ssh
|_banner: SSH-2.0-OpenSSH_8.7
23/tcp filtered telnet
24/tcp filtered priv-mail
25/tcp filtered smtp
26/tcp filtered rsftp
27/tcp filtered nsw-fe
28/tcp filtered unknown
29/tcp filtered msg-icp
30/tcp filtered unknown
MAC Address: 00:0C:29:42:60:34 (VMware)

Nmap done: 1 IP address (1 host up) scanned in 1.52 seconds

dmitry -pb IP地址

┌──(root㉿kali)-[~]
└─# dmitry -pb 22 192.168.1.122
Deepmagic Information Gathering Tool
"There be some deep magic going on"

ERROR: Unable to locate Host Name for 192.168.1.122
Continuing with limited modules
HostIP:192.168.1.122
HostName:

Gathered TCP Port information for 192.168.1.122
---------------------------------

 Port           State
22/tcp          open
>> SSH-2.0-OpenSSH_8.7

Portscan Finished: Scanned 150 ports, 148 ports were in state closed

All scans completed, exiting

nc -nv 192.168.1.222 22

┌──(root㉿kali)-[~]
└─# nc -nv 192.168.1.222 20-30
(UNKNOWN) [192.168.1.222] 30 (?) : No route to host
(UNKNOWN) [192.168.1.222] 29 (?) : No route to host
(UNKNOWN) [192.168.1.222] 28 (?) : No route to host
(UNKNOWN) [192.168.1.222] 27 (?) : No route to host
(UNKNOWN) [192.168.1.222] 26 (?) : No route to host
(UNKNOWN) [192.168.1.222] 25 (smtp) : No route to host
(UNKNOWN) [192.168.1.222] 24 (?) : No route to host

(UNKNOWN) [192.168.1.222] 23 (telnet) : No route to host
(UNKNOWN) [192.168.1.222] 22 (ssh) open
SSH-2.0-OpenSSH_8.7
Invalid SSH identification string.
(UNKNOWN) [192.168.1.222] 21 (ftp) : No route to host
(UNKNOWN) [192.168.1.222] 20 (ftp-data) : No route to host

端口服务版本信息获取

nmap -p 端口 -sV IP地址

查看目标主机所有开放的端口服务版本

┌──(root㉿kali)-[~]
└─# nmap -sV 192.168.1.222
Starting Nmap 7.92 ( https://nmap.org ) at 2022-12-18 00:23 EST
Nmap scan report for 192.168.1.222
Host is up (0.00024s latency).
Not shown: 988 filtered tcp ports (no-response), 10 filtered tcp ports (admin-prohibited)
PORT     STATE  SERVICE    VERSION
22/tcp   open   ssh        OpenSSH 8.7 (protocol 2.0)
9090/tcp closed zeus-admin
MAC Address: 00:0C:29:42:60:34 (VMware)

Service detection performed. 
Nmap done: 1 IP address (1 host up) scanned in 5.25 seconds

查看单个端口的服务版本信息

┌──(root㉿kali)-[~]
└─# nmap -p 22 -sV 192.168.1.222               
Starting Nmap 7.92 ( https://nmap.org ) at 2022-12-18 00:21 EST
Nmap scan report for 192.168.1.222
Host is up (0.00025s latency).

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.7 (protocol 2.0)
MAC Address: 00:0C:29:42:60:34 (VMware)

Service detection performed. 
Nmap done: 1 IP address (1 host up) scanned in 0.48 seconds

操作系统版本信息获取

查看目标主机运行在什么操作系统上
nmap -O 192.168.1.222

┌──(root㉿kali)-[~]
└─# nmap -O 192.168.1.222 
Starting Nmap 7.92 ( https://nmap.org ) at 2022-12-18 00:27 EST
Nmap scan report for 192.168.1.222
Host is up (0.00035s latency).
Not shown: 988 filtered tcp ports (no-response), 10 filtered tcp ports (admin-prohibited)
PORT     STATE  SERVICE
22/tcp   open   ssh
9090/tcp closed zeus-admin
MAC Address: 00:0C:29:42:60:34 (VMware)
Device type: general purpose
Running: Linux 5.X
OS CPE: cpe:/o:linux:linux_kernel:5
OS details: Linux 5.0 - 5.4
Network Distance: 1 hop

OS detection performed.
Nmap done: 1 IP address (1 host up) scanned in 6.72 seconds

查看目标主机所有信息!!!需授权!!!

nmap -A -v -T4 192.168.1.222

┌──(root㉿kali)-[~]
└─# nmap -A -v -T4 192.168.1.222
Starting Nmap 7.92 ( https://nmap.org ) at 2022-12-18 00:29 EST
NSE: Loaded 155 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 00:29
Completed NSE at 00:29, 0.00s elapsed
Initiating NSE at 00:29
Completed NSE at 00:29, 0.00s elapsed
Initiating NSE at 00:29
Completed NSE at 00:29, 0.00s elapsed
Initiating ARP Ping Scan at 00:29
Scanning 192.168.1.222 [1 port]
Completed ARP Ping Scan at 00:29, 0.06s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 00:29
Completed Parallel DNS resolution of 1 host. at 00:29, 0.03s elapsed
Initiating SYN Stealth Scan at 00:29
Scanning 192.168.1.222 [1000 ports]
Discovered open port 22/tcp on 192.168.1.222
Completed SYN Stealth Scan at 00:29, 4.89s elapsed (1000 total ports)
Initiating Service scan at 00:29
Scanning 1 service on 192.168.1.222
Completed Service scan at 00:29, 0.01s elapsed (1 service on 1 host)
Initiating OS detection (try #1) against 192.168.1.222
NSE: Script scanning 192.168.1.222.
Initiating NSE at 00:29
Completed NSE at 00:29, 0.06s elapsed
Initiating NSE at 00:29
Completed NSE at 00:29, 0.00s elapsed
Initiating NSE at 00:29
Completed NSE at 00:29, 0.00s elapsed
Nmap scan report for 192.168.1.222
Host is up (0.00028s latency).
Not shown: 988 filtered tcp ports (no-response), 10 filtered tcp ports (admin-prohibited)
PORT     STATE  SERVICE    VERSION
22/tcp   open   ssh        OpenSSH 8.7 (protocol 2.0)
| ssh-hostkey: 
|   256 bb:bd:8d:05:08:4c:18:2b:34:ff:ef:2a:76:2b:e7:9f (ECDSA)
|_  256 c2:68:1a:b7:1a:97:92:81:1f:06:d3:b0:3c:c5:bc:c1 (ED25519)
9090/tcp closed zeus-admin
MAC Address: 00:0C:29:42:60:34 (VMware)
Device type: general purpose
Running: Linux 5.X
OS CPE: cpe:/o:linux:linux_kernel:5
OS details: Linux 5.0 - 5.4
Uptime guess: 35.317 days (since Sat Nov 12 16:53:42 2022)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=262 (Good luck!)
IP ID Sequence Generation: All zeros

TRACEROUTE
HOP RTT     ADDRESS
1   0.28 ms 192.168.1.222

NSE: Script Post-scanning.
Initiating NSE at 00:29
Completed NSE at 00:29, 0.00s elapsed
Initiating NSE at 00:29
Completed NSE at 00:29, 0.00s elapsed
Initiating NSE at 00:29
Completed NSE at 00:29, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 6.85 seconds
           Raw packets sent: 2018 (90.486KB) | Rcvd: 27 (2.398KB)

nmap -script vuln -T4 192.168.1.101

=================================================

=================================================

5、Web应用程序漏洞扫描

Web漏洞扫描器:
1、Owasp-zap
2、AWVS
3、Appscan
4、Nikto
5、Burpsuite

OWASP-ZAP是OWASP组织开发的用于Web应用程序漏洞扫描器,免费开源,并且不断更新

nikto -host IP地址 --针对HTTP服务器

sqlmap -u "注入地址"

sqlmap -u "注入地址" --tables 获取对应的表名
弹出admin后
sqlmap -u "注入地址" -T admin --columns

sqlmap -u "注入地址" -T admin -C "admin,password" --dump
获取对应的数据

获取的数据是md5加密的密文。
可以解密,看运气。

相关文章

网友评论

      本文标题:1-5、环境配置、主机探测、端口扫描、漏洞扫描

      本文链接:https://www.haomeiwen.com/subject/afrdqdtx.html