NMap 101: Scanning Networks For Open Ports To Access, HakTip 94
Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
____________________________________________
NMap can be used to obtain a much more aggressive scan than the ones we have seen so far. It's very simple to do this too, by simply adding the -A command, like this: nmap -A 10.73.31.64
Aggressive scans simply put together some of the most popularly used commands in Nmap, into one command for you to type. It uses commands such as -O, -sC --traceroute and others. We'll go over these in more detail soon. For now, simply know that -O works for operating system detection, and -sC runs several scripts inside nmap at once such as speed and verbosity. When running this scan, which will take longer because of the extra scripts involved, you'll receive back a bunch of strange looking fingerprint information. I tried running this on our printer, which doesn't give us much information. But running this against our NAS gives us some interesting facts, such as the name of our NAS (Synology Diskstation), the open ports with more information, even the SSH hostkey with DSA and RSA encryptions.
If I nmap our network... This is what I find. nmap 10.73.31.0/24 ---- we found .64 which is an HP printer with telnet open on port 23. So now I'll open netcat in another window and connect to it. nc 10.73.31.64 23 We've just telnetted into our HP printer. Now we can ls and see what directories are available, change directories, etc.
What would you like to see next about NMAP? Send me a comment below or email us at tips@hak5.org. If you like NMap, perhaps you'll enjoy our new show, Metasploit Minute with Mubix, airing every Monday at hak5.org. And be sure to check out our sister show, Hak5 for more great stuff just like this. I'll be there, reminding you to trust your technolust.
-~-~~-~~~-~~-~-
Please watch: "Bash Bunny Primer - Hak5 2225"
https://www.youtube.com/watch?v=8j6hrjSrJaM
-~-~~-~~~-~~-~-
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.
Видео NMap 101: Scanning Networks For Open Ports To Access, HakTip 94 канала Hak5
____________________________________________
NMap can be used to obtain a much more aggressive scan than the ones we have seen so far. It's very simple to do this too, by simply adding the -A command, like this: nmap -A 10.73.31.64
Aggressive scans simply put together some of the most popularly used commands in Nmap, into one command for you to type. It uses commands such as -O, -sC --traceroute and others. We'll go over these in more detail soon. For now, simply know that -O works for operating system detection, and -sC runs several scripts inside nmap at once such as speed and verbosity. When running this scan, which will take longer because of the extra scripts involved, you'll receive back a bunch of strange looking fingerprint information. I tried running this on our printer, which doesn't give us much information. But running this against our NAS gives us some interesting facts, such as the name of our NAS (Synology Diskstation), the open ports with more information, even the SSH hostkey with DSA and RSA encryptions.
If I nmap our network... This is what I find. nmap 10.73.31.0/24 ---- we found .64 which is an HP printer with telnet open on port 23. So now I'll open netcat in another window and connect to it. nc 10.73.31.64 23 We've just telnetted into our HP printer. Now we can ls and see what directories are available, change directories, etc.
What would you like to see next about NMAP? Send me a comment below or email us at tips@hak5.org. If you like NMap, perhaps you'll enjoy our new show, Metasploit Minute with Mubix, airing every Monday at hak5.org. And be sure to check out our sister show, Hak5 for more great stuff just like this. I'll be there, reminding you to trust your technolust.
-~-~~-~~~-~~-~-
Please watch: "Bash Bunny Primer - Hak5 2225"
https://www.youtube.com/watch?v=8j6hrjSrJaM
-~-~~-~~~-~~-~-
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.
Видео NMap 101: Scanning Networks For Open Ports To Access, HakTip 94 канала Hak5
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Advanced NMap Techniques - Hak5 2415Nmap Tutorial to find Network VulnerabilitiesPort Numbers Explained | Cisco CCNA 200-301NMap 101: Fun With Firewalls! HakTip 102NMap 101: Scanning Networks Using Alternative Packets, Haktip 95Network Security 101: Full WorkshopNetwork Threats: Port ScanningPort Forwarding ExplainedHow Hackers Could Brute-Force SSH Credentials to Gain Access to ServersLinux Terminal 101: Netcatlet's hack your home network // FREE CCNA // EP 9Linux for Ethical Hackers (Kali Linux Tutorial)How easy is it to capture data on public free Wi-Fi? - Gary explainsUse Nmap for Tactical Network Reconnaissance [Tutorial]The Top 10 Things to Do After Installing Kali Linux on Your Computer [Tutorial]Netcat 101: Remote Shells in Windows, HakTip 86Disabling Defender With Viss Episode 1 - Hak5 2416learning hacking? DON'T make this mistake!! (hide yourself with Kali Linux and ProxyChains)how Hackers SNiFF (capture) network traffic // MiTM attackNmap Tutorial For Beginners | How to Scan Your Network Using Nmap | Ethical Hacking Tool | Edureka