Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
150
| What are you trying to do? Go away.
| HTTPOptions, RTSPRequest:
| 220-FileZilla Server 1.2.0
| Please visit https://filezilla-project.org/
| Wrong command.
| Help:
| 220-FileZilla Server 1.2.0
| Please visit https://filezilla-project.org/
| 214-The following commands are recognized.
| USER TYPE SYST SIZE
RNTO RNFR RMD REST QUIT
| HELP XMKD MLST MKD EPSV XCWD NOOP AUTH OPTS DELE
| CDUP APPE STOR ALLO RETR PWD FEAT CLNT MFMT
| MODE XRMD PROT ADAT ABOR XPWD MDTM LIST MLSD PBSZ
| NLST EPRT
PASS STRU PASV STAT PORT
|_ Help ok.
| ftp-syst:
|_ SYST: UNIX emulated by FileZilla.
| ssl-cert: Subject: commonName=filezilla-server self signed certificate
| Not valid before: 2022-01-06T15:37:24
|_Not valid after: 2023-01-07T15:42:24
|_ssl-date: TLS randomness does not represent time
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft
Windows netbios-ssn
445/tcp open microsoft-ds?
Nmap done: 1 IP address (1 host up) scanned in 55.67 seconds
Listing 68 - Using nmap for banner grabbing and/or service enumeration
In the above example we used the -A parameter to run a service scan with extra options. If we
want to run a plain service nmap scan we can do it by providing only the -sV parameter.
Banner grabbing significantly impacts the amount of traffic used as well as the speed of our
scan. We should always be mindful of the options we use with nmap and how they affect our
scans.
Banners can be modified by system administrators and intentionally set to fake
service names to mislead potential attackers.
Now that we have covered Nmap’s
major features, we’ll focus on specific Nmap scripts
encompassed by the
Nmap Scripting Engine
(NSE).
We can use the NSE
266
to launch user-created scripts in order to automate various scanning
tasks. These scripts perform a broad range of functions including DNS enumeration, brute force
attacks, and even vulnerability identification. NSE
scripts are located in the
/usr/share/nmap/scripts
directory.
The
http-headers
script, for example, attempts to connect to the HTTP service on a target system
and determine the supported headers.
266
(Nmap, 2022), http://nmap.org/book/nse.html
Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
151
kali@kali:~$
Yüklə
Dostları ilə paylaş: