Facebook Twitter Friendfeed
Gratis berlangganan artikel Genesick Blog!

Jumat, 23 Desember 2011

Threads : Fingerprint Dengan NMAP

Jumat, 23 Desember 2011

Date
Tags →

caranya gampang dengan cara pertama saya menggunakan Nmap untuk menyecan ip satu jaringan
caranya bagaimana

ini dya caranya

1. TCP Connect scanning pada network 192.168.1.0/24
command : nmap -v -sT 192.168.1.0/24


    root@hatuhaha:~# nmap -v -sT 192.168.1.0/24
    Starting Nmap 5.00 ( http://nmap.org ) at 2010-08-13 07:56 WIT
    NSE: Loaded 0 scripts for scanning.
    Initiating ARP Ping Scan at 07:56
    Scanning 192.168.1.0 [1 port]
    Completed ARP Ping Scan at 07:56, 0.23s elapsed (1 total hosts)
    Initiating Parallel DNS resolution of 1 host. at 07:56
    Completed Parallel DNS resolution of 1 host. at 07:56, 0.03s elapsed
    Initiating ARP Ping Scan at 07:56
    Scanning 254 hosts [1 port/host]
    Completed ARP Ping Scan at 07:56, 1.85s elapsed (254 total hosts)
    Initiating Parallel DNS resolution of 254 hosts. at 07:56
    Completed Parallel DNS resolution of 254 hosts. at 07:56, 0.11s elapsed
    Initiating Connect Scan at 07:56
    Scanning 192.168.1.1 [1000 ports]
    Discovered open port 53/tcp on 192.168.1.1
    Discovered open port 80/tcp on 192.168.1.1
    Discovered open port 8080/tcp on 192.168.1.1
    Discovered open port 3128/tcp on 192.168.1.1
    Completed Connect Scan at 08:01, 6.21s elapsed (1000 total ports)
    Host 192.168.1.1 is up (0.00022s latency).
    Interesting ports on 192.168.1.1:
    Not shown: 996 filtered ports
    PORT STATE SERVICE
    53/tcp open domain
    80/tcp open http
    3128/tcp open squid-http
    8080/tcp open http-proxy
    Initiating Connect Scan at 08:01
    Scanning 17 hosts [1000 ports/host]
    .....
    .....
    .....
    Host 192.168.1.138 is up (0.00067s latency).
    Interesting ports on 192.168.1.138:
    Not shown: 997 closed ports
    PORT STATE SERVICE
    135/tcp open msrpc
    139/tcp open netbios-ssn
    445/tcp open microsoft-ds
    MAC Address: 00:17:9A:3B:00:76 (D-Link)
    Read data files from: /usr/share/nmap
    Nmap done: 256 IP addresses (18 hosts up) scanned in 15.01 seconds
    Raw packets sent: 493 (20.706KB) | Rcvd: 17 (714B)

2. nmap TCP SYN (half-open) scanning
Command : nmap -v -sS 192.168.1.0/24


    root@hatuhaha:~# nmap -v -sS 192.168.1.0/24
    Starting Nmap 5.00 ( http://nmap.org ) at 2010-08-13 08:13 WIT
    NSE: Loaded 0 scripts for scanning.
    Initiating ARP Ping Scan at 08:13
    Scanning 192.168.1.0 [1 port]
    Completed ARP Ping Scan at 08:13, 0.23s elapsed (1 total hosts)
    Initiating Parallel DNS resolution of 1 host. at 08:13
    Completed Parallel DNS resolution of 1 host. at 08:13, 0.02s elapsed
    Initiating ARP Ping Scan at 08:13
    Scanning 254 hosts [1 port/host]
    Completed ARP Ping Scan at 08:13, 1.84s elapsed (254 total hosts)
    Initiating Parallel DNS resolution of 254 hosts. at 08:13
    Completed Parallel DNS resolution of 254 hosts. at 08:13, 0.07s elapsed
    Initiating SYN Stealth Scan at 08:13
    Scanning 192.168.1.1 [1000 ports]
    Discovered open port 53/tcp on 192.168.1.1
    Discovered open port 8080/tcp on 192.168.1.1
    Discovered open port 80/tcp on 192.168.1.1
    Discovered open port 3128/tcp on 192.168.1.1
    Completed SYN Stealth Scan at 08:13, 0.05s elapsed (1000 total ports)
    Host 192.168.1.1 is up (0.0000090s latency).
    Interesting ports on 192.168.1.1:
    Not shown: 996 closed ports
    PORT STATE SERVICE
    53/tcp open domain
    80/tcp open http
    3128/tcp open squid-http
    8080/tcp open http-proxy
    Initiating SYN Stealth Scan at 08:13
    Scanning 11 hosts [1000 ports/host]
    ....
    ....
    Host 192.168.1.138 is up (0.000080s latency).
    Interesting ports on 192.168.1.138:
    Not shown: 997 closed ports
    PORT STATE SERVICE
    135/tcp open msrpc
    139/tcp open netbios-ssn
    445/tcp open microsoft-ds
    MAC Address: 00:17:9A:3B:00:76 (D-Link)
    Host 192.168.1.140 is up (0.00030s latency).
    All 1000 scanned ports on 192.168.1.140 are filtered
    MAC Address: 44:87:FC:5A:5B:68 (Unknown)
    Read data files from: /usr/share/nmap
    ......

3. nmap TCP FIN scanning
Command : nmap -v -sF 192.168.1.0/24


    root@hatuhaha:~# nmap -v -sF 192.168.1.0/24
    Starting Nmap 5.00 ( http://nmap.org ) at 2010-08-13 08:18 WIT
    NSE: Loaded 0 scripts for scanning.
    Initiating ARP Ping Scan at 08:18
    Scanning 192.168.1.0 [1 port]
    Completed ARP Ping Scan at 08:18, 0.23s elapsed (1 total hosts)
    Initiating Parallel DNS resolution of 1 host. at 08:18
    Completed Parallel DNS resolution of 1 host. at 08:18, 0.03s elapsed
    Initiating ARP Ping Scan at 08:18
    Scanning 254 hosts [1 port/host]
    Completed ARP Ping Scan at 08:18, 1.84s elapsed (254 total hosts)
    Initiating Parallel DNS resolution of 254 hosts. at 08:18
    Completed Parallel DNS resolution of 254 hosts. at 08:18, 0.07s elapsed
    Initiating FIN Scan at 08:18
    Scanning 192.168.1.1 [1000 ports]
    Completed FIN Scan at 08:18, 1.23s elapsed (1000 total ports)
    Host 192.168.1.1 is up (0.000011s latency).
    Interesting ports on 192.168.1.1:
    Not shown: 996 closed ports
    PORT STATE SERVICE
    53/tcp open|filtered domain
    80/tcp open|filtered http
    3128/tcp open|filtered squid-http
    8080/tcp open|filtered http-proxy
    Initiating FIN Scan at 08:18
    Scanning 11 hosts [1000 ports/host]
    ....
    ....
    Host 192.168.1.129 is up (0.00028s latency).
    All 1000 scanned ports on 192.168.1.129 are open|filtered
    MAC Address: 00:25:11:03:F7:96 (Elitegroup Computer System CO.)
    Host 192.168.1.138 is up (0.00075s latency).
    All 1000 scanned ports on 192.168.1.138 are closed
    MAC Address: 00:17:9A:3B:00:76 (D-Link)
    Host 192.168.1.140 is up (0.00024s latency).
    All 1000 scanned ports on 192.168.1.140 are open|filtered
    MAC Address: 44:87:FC:5A:5B:68 (Unknown)
    ..... ......

4. nmap TCP Xmas tree scanning
Digunakan untuk melihat apakah proteksi firewall masih berjalan dengan baik atau tidak.
Command : nmap -v -sX 192.168.1.0/24


    root@hatuhaha:~# nmap -v -sX 192.168.1.0/24
    Starting Nmap 5.00 ( http://nmap.org ) at 2010-08-13 08:21 WIT
    NSE: Loaded 0 scripts for scanning.
    Initiating ARP Ping Scan at 08:21
    Scanning 192.168.1.0 [1 port]
    Completed ARP Ping Scan at 08:21, 0.23s elapsed (1 total hosts)
    Initiating Parallel DNS resolution of 1 host. at 08:21
    Completed Parallel DNS resolution of 1 host. at 08:21, 0.02s elapsed
    Initiating ARP Ping Scan at 08:21
    Scanning 254 hosts [1 port/host]
    Completed ARP Ping Scan at 08:21, 2.06s elapsed (254 total hosts)
    Initiating Parallel DNS resolution of 254 hosts. at 08:21
    Completed Parallel DNS resolution of 254 hosts. at 08:21, 0.07s elapsed
    Initiating XMAS Scan at 08:21
    Scanning 192.168.1.1 [1000 ports]
    Completed XMAS Scan at 08:21, 1.23s elapsed (1000 total ports)
    Host 192.168.1.1 is up (0.0000060s latency).
    Interesting ports on 192.168.1.1:
    Not shown: 996 closed ports
    PORT STATE SERVICE
    53/tcp open|filtered domain
    80/tcp open|filtered http
    3128/tcp open|filtered squid-http
    8080/tcp open|filtered http-proxy
    Initiating XMAS Scan at 08:21
    Scanning 11 hosts [1000 ports/host]
    ....
    ....

5. nmap TCP Null scanning
Digunakan untuk melihat apakah proteksi firewall masih berjalan dengan baik atau tidak.
Command : nmap -v -sN 192.168.1.0/24


    root@hatuhaha:~# nmap -v -sN 192.168.1.0/24
    Starting Nmap 5.00 ( http://nmap.org ) at 2010-08-13 08:23 WIT
    NSE: Loaded 0 scripts for scanning.
    Initiating ARP Ping Scan at 08:23
    Scanning 192.168.1.0 [1 port]
    Completed ARP Ping Scan at 08:23, 0.24s elapsed (1 total hosts)
    Initiating Parallel DNS resolution of 1 host. at 08:23
    Completed Parallel DNS resolution of 1 host. at 08:23, 0.03s elapsed
    Initiating ARP Ping Scan at 08:23
    Scanning 254 hosts [1 port/host]
    Completed ARP Ping Scan at 08:23, 2.05s elapsed (254 total hosts)
    Initiating Parallel DNS resolution of 254 hosts. at 08:23
    Completed Parallel DNS resolution of 254 hosts. at 08:23, 0.07s elapsed
    Initiating NULL Scan at 08:23
    Scanning 192.168.1.1 [1000 ports]
    Completed NULL Scan at 08:23, 1.25s elapsed (1000 total ports)
    Host 192.168.1.1 is up (0.0000060s latency).
    Interesting ports on 192.168.1.1:
    Not shown: 996 closed ports
    PORT STATE SERVICE
    53/tcp open|filtered domain
    80/tcp open|filtered http
    3128/tcp open|filtered squid-http
    8080/tcp open|filtered http-proxy
    Initiating NULL Scan at 08:23
    Scanning 11 hosts [1000 ports/host]
    ....
    .... 

6. nmap TCP Windows scanning
command : nmap -v -sW 192.168.1.0/24


    root@hatuhaha:~# nmap -v -sW 192.168.1.0/24
    Starting Nmap 5.00 ( http://nmap.org ) at 2010-08-13 08:28 WIT
    NSE: Loaded 0 scripts for scanning.
    Initiating ARP Ping Scan at 08:28
    Scanning 192.168.1.0 [1 port]
    Completed ARP Ping Scan at 08:28, 0.32s elapsed (1 total hosts)
    Initiating Parallel DNS resolution of 1 host. at 08:28
    Completed Parallel DNS resolution of 1 host. at 08:28, 0.06s elapsed
    Initiating ARP Ping Scan at 08:28
    Scanning 254 hosts [1 port/host]
    Completed ARP Ping Scan at 08:28, 2.42s elapsed (254 total hosts)
    Initiating Parallel DNS resolution of 254 hosts. at 08:28
    Completed Parallel DNS resolution of 254 hosts. at 08:28, 0.13s elapsed
    Initiating Window Scan at 08:28
    Scanning 192.168.1.1 [1000 ports]
    Completed Window Scan at 08:28, 0.09s elapsed (1000 total ports)
    Host 192.168.1.1 is up (0.0000090s latency).
    All 1000 scanned ports on 192.168.1.1 are closed
    Initiating Window Scan at 08:28
    Scanning 11 hosts [1000 ports/host]
    ....
    ....

7. nmap TCP RPC scanning
digunakan untuk mencari RPC services
Command : nmap -v -sR 192.168.1.0/24


    root@hatuhaha:~# nmap -v -sR 192.168.1.0/24
    Starting Nmap 5.00 ( http://nmap.org ) at 2010-08-13 08:35 WIT
    NSE: Loaded 0 scripts for scanning.
    Initiating ARP Ping Scan at 08:35
    Scanning 192.168.1.0 [1 port]
    Completed ARP Ping Scan at 08:35, 0.23s elapsed (1 total hosts)
    Initiating Parallel DNS resolution of 1 host. at 08:35
    Completed Parallel DNS resolution of 1 host. at 08:35, 0.03s elapsed
    Initiating ARP Ping Scan at 08:35
    Scanning 254 hosts [1 port/host]
    Completed ARP Ping Scan at 08:35, 2.05s elapsed (254 total hosts)
    Initiating Parallel DNS resolution of 254 hosts. at 08:35
    Completed Parallel DNS resolution of 254 hosts. at 08:35, 0.08s elapsed
    Initiating SYN Stealth Scan at 08:35
    Scanning 192.168.1.1 [1000 ports]
    Discovered open port 8080/tcp on 192.168.1.1
    Discovered open port 53/tcp on 192.168.1.1
    Discovered open port 80/tcp on 192.168.1.1
    Discovered open port 3128/tcp on 192.168.1.1
    Completed SYN Stealth Scan at 08:35, 0.05s elapsed (1000 total ports)
    Initiating RPCGrind Scan against 192.168.1.1 at 08:35
    Completed RPCGrind Scan against 192.168.1.1 at 08:35, 1.20s elapsed (4 ports)
    Host 192.168.1.1 is up (0.0000090s latency).
    Interesting ports on 192.168.1.1:
    Not shown: 996 closed ports
    PORT STATE SERVICE VERSION
    53/tcp open domain
    80/tcp open http
    3128/tcp open squid-http
    8080/tcp open http-proxy
    Initiating SYN Stealth Scan at 08:35
    Scanning 12 hosts [1000 ports/host]
    ....
    ....

8. nmap UDP scanning
digunakan untuk mencari port UDP yang terbuka
Command : nmap -v -O 192.168.1.0/24


    root@hatuhaha:~# nmap -v -O 192.168.1.0/24
    Starting Nmap 5.00 ( http://nmap.org ) at 2010-08-13 08:39 WIT
    NSE: Loaded 0 scripts for scanning.
    Initiating ARP Ping Scan at 08:39
    Scanning 192.168.1.0 [1 port]
    Completed ARP Ping Scan at 08:39, 0.24s elapsed (1 total hosts)
    Initiating Parallel DNS resolution of 1 host. at 08:39
    Completed Parallel DNS resolution of 1 host. at 08:39, 0.02s elapsed
    Initiating ARP Ping Scan at 08:39
    Scanning 254 hosts [1 port/host]
    Completed ARP Ping Scan at 08:39, 2.05s elapsed (254 total hosts)
    Initiating Parallel DNS resolution of 254 hosts. at 08:39
    Completed Parallel DNS resolution of 254 hosts. at 08:39, 0.08s elapsed
    Initiating SYN Stealth Scan at 08:39
    Scanning 192.168.1.1 [1000 ports]
    Discovered open port 80/tcp on 192.168.1.1
    Discovered open port 8080/tcp on 192.168.1.1
    Discovered open port 53/tcp on 192.168.1.1
    Discovered open port 3128/tcp on 192.168.1.1
    Completed SYN Stealth Scan at 08:39, 0.05s elapsed (1000 total ports)
    ....
    ....

9. nmap remote software version scanning
Digunakan untuk mengetahui versi software pada port yang terbuka
Command : nmap -v -sV 192.168.1.0/24


    root@hatuhaha:~# nmap -v -sV 192.168.1.0/24
    Starting Nmap 5.00 ( http://nmap.org ) at 2010-08-13 08:46 WIT
    NSE: Loaded 3 scripts for scanning.
    Initiating ARP Ping Scan at 08:46
    Scanning 192.168.1.0 [1 port]
    Completed ARP Ping Scan at 08:46, 0.30s elapsed (1 total hosts)
    Initiating Parallel DNS resolution of 1 host. at 08:46
    Completed Parallel DNS resolution of 1 host. at 08:46, 0.05s elapsed
    Initiating ARP Ping Scan at 08:46
    Scanning 254 hosts [1 port/host]
    Completed ARP Ping Scan at 08:47, 2.21s elapsed (254 total hosts)
    Initiating Parallel DNS resolution of 254 hosts. at 08:47
    Completed Parallel DNS resolution of 254 hosts. at 08:47, 0.10s elapsed
    Initiating SYN Stealth Scan at 08:47
    Scanning 192.168.1.1 [1000 ports]
    Discovered open port 8080/tcp on 192.168.1.1
    Discovered open port 53/tcp on 192.168.1.1
    Completed SYN Stealth Scan at 08:47, 0.06s elapsed (1000 total ports)
    Initiating Service scan at 08:47
    Scanning 4 services on 192.168.1.1
    Completed Service scan at 08:47, 11.06s elapsed (4 services on 1 host)
    NSE: Script scanning 192.168.1.1.
    NSE: Script Scanning completed.
    Host 192.168.1.1 is up (0.0000090s latency).
    Interesting ports on 192.168.1.1:
    Not shown: 996 closed ports
    PORT STATE SERVICE VERSION
    53/tcp open domain ISC BIND 9.6.1-P2
    80/tcp open http Apache httpd 2.2.12 ((Ubuntu))
    3128/tcp open http-proxy Squid webproxy 2.7.STABLE6
    8080/tcp open http-proxy HAVP anti-virus web proxy
    ....
    ....
    Host 192.168.1.131 is up (0.00010s latency).
    Interesting ports on 192.168.1.131:
    Not shown: 996 closed ports
    PORT STATE SERVICE VERSION
    135/tcp open msrpc Microsoft Windows RPC
    139/tcp open netbios-ssn
    445/tcp open microsoft-ds Microsoft Windows XP microsoft-ds
    3000/tcp open ppp?
    MAC Address: 00:1B:B9:AE:BB:F0 (Elitegroup Computer System Co.)
    Service Info: OS: Windows
    Host 192.168.1.138 is up (0.000092s latency).
    Interesting ports on 192.168.1.138:
    Not shown: 997 closed ports
    PORT STATE SERVICE VERSION
    135/tcp open msrpc Microsoft Windows RPC
    139/tcp open netbios-ssn
    445/tcp open microsoft-ds Microsoft Windows XP microsoft-ds
    MAC Address: 00:17:9A:3B:00:76 (D-Link)
    Service Info: OS: Windows
    ....
    ....


Sumber : Sahubawa Linux

Pengunjung Yang Baik Selalu Meninggalkan Komentar

Anda sedang membaca artikel Threads : Fingerprint Dengan NMAP dan artikel ini url permalinknya adalah http://gnsck.blogspot.com/2011/12/threads-fingerprint-dengan-nmap.html
Semoga artikel Threads : Fingerprint Dengan NMAP ini bisa bermanfaat.


 

Pengikut

GENESICK Blog is proudly powered by Blogger.com | Template by GENESICK Team