Penetration Testing with Kali Linux OffSec


sudo nmap -sU -sS 192.168.50.149


səhifə78/132
tarix21.12.2023
ölçüsü
#187693
1   ...   74   75   76   77   78   79   80   81   ...   132
PEN-200

sudo nmap -sU -sS 192.168.50.149
Starting Nmap 7.92 ( https://nmap.org ) at 2022-03-09 08:16 EST 
Nmap scan report for 192.168.50.149 
Host is up (0.10s latency). 
Not shown: 989 closed tcp ports (reset), 977 closed udp ports (port-unreach) 
PORT STATE SERVICE 
53/tcp open domain 
88/tcp open kerberos-sec 
135/tcp open msrpc 
139/tcp open netbios-ssn 
389/tcp open ldap 
445/tcp open microsoft-ds 
464/tcp open kpasswd5 
593/tcp open http-rpc-epmap 
636/tcp open ldapssl 
3268/tcp open globalcatLDAP 
3269/tcp open globalcatLDAPssl 
53/udp open domain 
123/udp open ntp 
389/udp open ldap 
... 
Listing 61 - Using nmap to perform a combined UDP and SYN scan 
Our joint TCP and UDP scan revealed additional open UDP ports, further disclosing which services 
are running on the target host. 
We can now extend what we have learned from a single host and apply it to a full network range 
through 
Network Sweeping

To deal with large volumes of hosts, or to otherwise try to conserve network traffic, we can 
attempt to probe targets using 
Network Sweeping
techniques in which we begin with broad 
scans, then use more specific scans against hosts of interest. 
When performing a network sweep with Nmap using the -sn option, the host discovery process 
consists of more than just sending an ICMP echo request. Nmap also sends a TCP SYN packet to 
port 443, a TCP ACK packet to port 80, and an ICMP timestamp request to verify whether a host 
is available. 
kali@kali:~$ 
nmap -sn 192.168.50.1-253
Starting Nmap 7.92 ( https://nmap.org ) at 2022-03-10 03:19 EST 
Nmap scan report for 192.168.50.6 
Host is up (0.12s latency). 
Nmap scan report for 192.168.50.8 
Host is up (0.12s latency). 
... 
Nmap done: 254 IP addresses (13 hosts up) scanned in 3.74 seconds 


Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved. 
147 
Listing 62 - Using nmap to perform a network sweep 
Searching for live machines using the grep command on a standard nmap output can be 
cumbersome. Instead, let’s use Nmap’s “greppable” output parameter, -oG, to save these results 
in a more manageable format. 
kali@kali:~$ 

Yüklə

Dostları ilə paylaş:
1   ...   74   75   76   77   78   79   80   81   ...   132




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin