1、 Banner grabbing with Netcat

Netcat is multipurpose networking tool that can be used to perform multiple information gathering an d scanning tasks with kali linux ,this specific recipe will demonstrate how to use Netcat to acquire service banners in order to identify the service banners eto indetify the service association with open ports on a target system .

To use the Netcat to grab service banners , on must establish a socket connection to the intended port on the remote system .to quickly understand the usage of the Netcat an how it can be used for thhis purpose ,one can call upon the usage output, we can use the   command  nc -h option : 
 2、the -v opton was used to provide verbose output and the the -n option was used to connnect with the the ip address without DNS resolution ,  we can see the banner returned by the remote host identifies the service as SSH ,the vendor as openSSH,besides , we can use the siminal scan on port 21 of the same the system ,we can easily acqurie service and the version information ot the running TFP service .

2、Banner grabbing with Python sockets

the sockets mouule  in python can be used to connect to network services running on remote ports .     Once can interact directly with remote network service using the python interactive interpreter ,you  can begin use the python interpreter by calling it driectly m in this here ,we can import any specific modules tha you wish to use ,  the specific is as follows :

the AF_INET arguments is used to indicate that the socket   will employed an IPV4 address and the SOCK_STREAM argument is used to indicate that TCP transport will be used ,if an attempt is made to connect to TCP port 443 on the Metasploitable2 system  ,an error will be returned indiciate taht the  connection was refused , because there is no service running on this remote system

3、 use the python script  to connect

the python script  what just i note by utilizing the socket library ,the script loops through each of the specified target port address an attempts to initialize a TCP connection with that pratical port ,if a connection is established and a banner is recived from the target service , the banner will then be printed in the output of the script ,of course ,if  a connection cannot be established with the remote port ,the script will then move to the next port address value in the loop.

4、Banner grabbing with Dmitry

Dmitry is a simple yet streamlined tool that can be used to connect to network services running on remote ports .Dmitry can be used to run a quick TCP ports scan on 150 of the remote commonly used services , this can be done using the -p option:

Dmitry is  a simple command-line tool that can perform the task of banner grabbing with minimal overhead .Dmitry can streanline the process by only attempting banner grabbing on a small selection of predefined an dcommonly used ports, banners recived from services running on those port address are then returned in the terminal output of the script

5、Banner  grabbing with Nmap NES

nmap has an intergateed Nmap Script Engrine script that can be used to read banners from network services running on remote ports , we can use the script ,use command --script option in Nmap and then specifiying the name of the descried script , for this particular script a -sT full-connect scan shjould be used as service banners can only be collected when a full TCP conection is established , the script will be applied to the same ports that are scanned by te fellows requests:

Nmap used the banner script to collect the service banner associated with the port , this same technical can be replied to a sequential range of the ports suing the --notation

the example command :   nmap -sT 192.168.142.182 -p 1-100 --script=banner

6、Banner grabbing with Amap

Amap is an application-mapping tool that can be used read banners from network services running on remote ports  , The  -B option in Amap can be used to run the application in banner mode , this will have it collect banners for the specific IP address and service ports ,Amap can be used to collect the banner from a single service by specifying the remote IP address and service number :

to remove the scan metadata ,we can   use grep the optput for a phrase that is unique to specific output entries and does not exist in the scan's metadata . we can use the command :   amap -B 192.168.142.182 1-65535 | grep "on"

7、service identification with Nmap

first we can connect with the Metasploitable2 system by TCP :   nc  -nv 192.168.142.182  80  then  to execute an Nmap service scan on the same port ,we can use the -sV option in conjunction eith the IP and Port  specification : nmap 192.168.142.182  -p 80 -sV

this service identification function can also be used against a specific sequential series of ports ,if   no port specificed ,the 1000 common ports will be scanned and  identification attempts will be made for all listening services that are identified .

8、Service identification with Amap

to perform service identification on a single port , run Amap, with the ip address and port number specifications : amap 192.168.142.182 80

amap can also be used to scan a senquential servies of port numbers using dash notation .   amap 192.168.142.182 20-90     To supress the information about unidentified ports , the -q option can be used   :  amap  192.168.142.182 1-100 -q   and  the banners can be appended to the output associated with each port using -n option :

amap 192.168.142.182  1-100 -qb

but amap is not updated and well-maintained in the same way that Nmap is ,as such, Aamp is less likely to produce reliable results

9、Operating system identification with Scapy

we know windows and linux/Unix   operating systems have different TTL starting values that are used by default ,this factor can be used to attempt to fingerprint the type of operating system:

generally speaking  the Windows TTL=128  and  the Linux/Unix OS TTL=64   but  TTL valus  can modify .

and then   we create both IP and ICMP layer , we need to construct the request by stacking those layse:

first  construct the IP layer   :    linux= "192.168.142.182"

windows= "192.168.1.101"

i=IP()

i.dst=linux

ping=ICMP()

request=(i/ping)

ans=sr1(request)

the follow figure is  Linux TTL

the follow figure is Windows TTL

addination , we can  use the python test the  TTL  values

note  the Scapy must use Python Version is  2.7

10、Operating system identification with Nmap

to perform an Nmap operating system identificatio  scan , Nmap should be called with the IP adddress specificatio adn the -O option : nmap 192.168.142.182 -O

the Nmap operating system identification sends a comprehensive series of probing requests and analyzes the responses to those quests in attempt to identify the undering operating system based on Os-specific signature and expected behavior,

11、Operating System identificatio  with xProbe2

the progrm needs to be passed a single argument that consists of the IP address of the system  to be scanned

11、Passive operating system identificatio with p0f

the tool perform operating system identification passively and without drectly intercacting with the target system

12、Snmp analysis with Onesixtyone

Onesixtyone is an Snmap tool that is named for  the UDP port upon with SNMP operate it is a very simple SNMP scanner that only requests the system description value for any specific IP address ,   SNMP is a protocol that can be used to manage netwoeked device and facilitate the sharing of information across those device , the usage of  this protocol is often necessary in enterprise network environment.

additional  we can use the SNMPwalk analysis the remote system device . SNmpwalk cycle througha series of request to gather as much  informationas possible from the service .

13、 Firewall  identification  with Scapy

to perform an Nmap SCK scan ,Nmap shjould be called with the ip address sepcification , the destination port ,and the -sA option :

nmap -sA  192.168.142.182 -p 22

notice that when we scanning a range of ports , the output only includes unfiltered ports:

nmap  -sA 83.166.169.228

13、 to use Metasploit ACK scan module to perform firewall and filtering identification.  for more systems , 25 threads is a fast and reasonably safe number of  concurrent processes .

Metasploit offers auxiliary module that perform firewall identification through many of teh some techniques that have been discussed in the previous recipe ,however, metasploit also offers the capbility to perform this analysis with the context of a farmework that can be used for other information gathering and even exploitation ,as well .

Gathering Fingerprinting的更多相关文章

  1. 帆布指纹识别(canvas fingerprinting)

    广告联盟或许网站运营者都希望能够精准定位并标识每一个个体,通过对用户行为的分析(浏览了哪些页面?搜索了哪些关键字?对什么感兴趣?点了哪些按钮?用了哪些功能?看了哪些商品?把哪些放入了购物车等等),为用 ...

  2. ACM ICPC 2015 Moscow Subregional Russia, Moscow, Dolgoprudny, October, 18, 2015 G. Garden Gathering

    Problem G. Garden Gathering Input file: standard input Output file: standard output Time limit: 3 se ...

  3. Requirements Gathering

    Requirements gathering is an essential part of any project and project management. Understanding ful ...

  4. Gathering Initial Troubleshooting Information for Analysis of ORA-4031 Errors on the Shared Pool

    In this Document   Purpose   Troubleshooting Steps   References APPLIES TO: Oracle Database - Enterp ...

  5. Family Gathering at Christmas(思维题)

    Family Gathering at Christmas 时间限制: 1 Sec  内存限制: 128 MB提交: 13  解决: 4[提交] [状态] [讨论版] [命题人:admin] 题目描述 ...

  6. codechef May Challenge 2016 FORESTGA: Forest Gathering 二分

    Description All submissions for this problem are available. Read problems statements in Mandarin Chi ...

  7. MaLoc: a practical magnetic fingerprinting approach to indoor localization using smartphones

    https://www.indooratlas.com/ MaLoc: a practical magnetic fingerprinting approach to indoor localizat ...

  8. Magnetic Fingerprinting Approach to Indoor Localization

    Magnetic Fingerprinting Approach to Indoor Localization

  9. HDU - 5887 2016青岛网络赛 Herbs Gathering(形似01背包的搜索)

    Herbs Gathering 10.76% 1000ms 32768K   Collecting one's own plants for use as herbal medicines is pe ...

随机推荐

  1. 尝试dapper和postgresql

    大多数地方和其他数据库(MySQL)没有什么不同.只有几点要注意: 1.PostgreSQL表名和字段是区分大小写的,大小写不对会说字段不存在 2.插入Json数据时,要在字符串后面加上::json ...

  2. 05VueCli

    详情请见: https://pizzali.github.io/2018/10/30/VueCli/ Vue CLI 是一个基于 Vue.js 进行快速开发的完整系统,Vue CLI 致力于将 Vue ...

  3. C++:位操作基础篇之位操作全面总结

    位操作篇共分为基础篇和提高篇,基础篇主要对位操作进行全面总结,帮助大家梳理知识.提高篇则针对各大IT公司如微软.腾讯.百度.360等公司的笔试面试题作详细的解答,使大家能熟练应对在笔试面试中位操作题目 ...

  4. 无法获得锁 /var/lib/dpkg/lock - open (11: 资源暂时不可用) ubuntu 安装vim 及遇到的错误处理

    今天,处理完问题,闲来无事,打算在虚拟机中的Ubuntu中练习shell脚本编写. 无奈,虚拟机系统所装的只有vi,这个编辑软件对于我们来说还是比较不习惯的,所以打算安装vim.好了,闲言少叙. 安装 ...

  5. java 日期格式化

    DateFormat DateFormat 是日期/时间格式化子类的抽象类,它以与语言无关的方式格式化并解析日期或时间. SimpleDateFormat SimpleDateFormat 是一个以与 ...

  6. Browserify模块化使用教程

    Browserify模块化使用教程 创建项目结构 |-js |-dist //打包生成文件的目录 |-src //源码所在的目录   |-module1.js   |-module2.js   |-m ...

  7. Hadoop基础-Hadoop的集群管理之服役和退役

    Hadoop基础-Hadoop的集群管理之服役和退役 作者:尹正杰 版权声明:原创作品,谢绝转载!否则将追究法律责任. 在实际生产环境中,如果是上千万规模的集群,难免一个一个月会有那么几台服务器出点故 ...

  8. 将matlab数据保存为excel文件

    摘录网址:https://blog.csdn.net/wangh0802/article/details/70312415 参考网址:https://jingyan.baidu.com/article ...

  9. Quartz.net 3.x使用总结(二)——Db持久化和集群

    上一篇简单介绍了Quartz.net的概念和基本用法,这一篇记录一下Quartz.net通过数据库持久化Trigger和Jobs等数据,并简单配置Quartz.net的集群. 1.JobStore介绍 ...

  10. SpringBoot系列: 使用 consul 作为服务注册组件

    本文基本上摘自纯洁的微笑的博客 http://www.ityouknow.com/springcloud/2018/07/20/spring-cloud-consul.html . 感谢作者的付出. ...