NMap扫描器进阶用法

NMap扫描器进阶

一、基础功能回顾

扫描IP地址(只做ping扫描,不做端口扫描):nmap -sn 192.168.112.0/24  192.168.112.1-255
基于SYN包扫描端口号:nmap -sS 192.168.112.188
基于三次握手扫描端口号:nmap -sT 192.168.112.188
指定端口扫描:nmap -p10-200, -p21,22,25,80,445,3306,1521,8080,8888 192.168.112.188
扫描端口和版本:nmap -sV 192.168.112.188
扫描操作系统:nmap -O 192.168.112.188
万能开关:nmap -A 192.168.112.188

二、内置脚本扫描

可以使用内置脚本进行功能扩展,命令语法为:nmap —script=brute 192.168.112.188。

auth: 负责处理鉴权证书(绕开鉴权)的脚本  
broadcast: 在局域网内探查更多服务开启状况,如dhcp/dns/sqlserver等服务  
brute: 提供暴力破解方式,针对常见的应用如http/snmp等  
default: 使用-sC或-A选项扫描时候默认的脚本,提供基本脚本扫描能力  
discovery: 对网络进行更多的信息,如SMB枚举、SNMP查询等  
dos: 用于进行拒绝服务攻击  
exploit: 利用已知的漏洞入侵系统  
external: 利用第三方的数据库或资源,例如进行whois解析  
fuzzer: 模糊测试的脚本,发送异常的包到目标机,探测出潜在漏洞 
intrusive: 入侵性的脚本,此类脚本可能引发对方的IDS/IPS的记录或屏蔽  
malware: 探测目标机是否感染了病毒、开启了后门等信息  
safe: 此类与intrusive相反,属于安全性脚本  
version: 负责增强服务与版本扫描(Version Detection)功能的脚本  
vuln: 负责检查目标机是否有常见的漏洞(Vulnerability),如是否有MS08_067

所有扫描脚本,可以查看Kali下的目录:/usr/share/nmap/scripts,具体各个脚本的用法及参数,参考:https://nmap.org/nsedoc/

三、 脚本实战应用

1、扫描SSH登录认证情况

┌──(root@kaliQiang)-[/home/denny]
└─# nmap -p22 --script=auth 192.168.112.188                       
Starting Nmap 7.91 ( https://nmap.org ) at 2021-11-28 22:23 CST
Nmap scan report for 192.168.112.188 (192.168.112.188)
Host is up (0.00044s latency).

PORT   STATE SERVICE
22/tcp open  ssh
| ssh-auth-methods: 
|   Supported authentication methods: 
|     publickey
|     gssapi-keyex
|     gssapi-with-mic
|_    password
| ssh-publickey-acceptance: 
|_  Accepted Public Keys: No public keys accepted
Nmap done: 1 IP address (1 host up) scanned in 0.35 seconds

2、扫描主机漏洞

┌──(root@kaliQiang)-[/home/denny]
└─# nmap --script=vuln 192.168.112.158              
Starting Nmap 7.91 ( https://nmap.org ) at 2021-11-28 22:27 CST
Nmap scan report for 192.168.112.158 (192.168.112.158)
Host is up (0.00023s latency).
Not shown: 996 closed ports
PORT     STATE SERVICE
135/tcp  open  msrpc
139/tcp  open  netbios-ssn
445/tcp  open  microsoft-ds
1025/tcp open  NFS-or-IIS
MAC Address: 00:0C:29:5E:35:7D (VMware)

Host script results:
| smb-vuln-ms08-067: 
|   VULNERABLE:
|   Microsoft Windows system vulnerable to remote code execution (MS08-067)
|     State: VULNERABLE
|     IDs:  CVE:CVE-2008-4250
|The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2,
|           Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary
|           code via a crafted RPC request that triggers the overflow during path canonicalization.
|           
|     Disclosure date: 2008-10-23
|     References:
|       https://technet.microsoft.com/en-us/library/security/ms08-067.aspx
|_      https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4250
|_smb-vuln-ms10-054: false
|_smb-vuln-ms10-061: NT_STATUS_OBJECT_NAME_NOT_FOUND
| smb-vuln-ms17-010: 
|   VULNERABLE:
|   Remote Code Execution vulnerability in Microsoft SMBv1 servers (ms17-010)
|     State: VULNERABLE
|IDs:  CVE:CVE-2017-0143
|     Risk factor: HIGH
|       A critical remote code execution vulnerability exists in Microsoft SMBv1
|        servers (ms17-010).
|           
|     Disclosure date: 2017-03-14
|     References:
|       https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
|       https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
|_      https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0143

Nmap done: 1 IP address (1 host up) scanned in 39.55 seconds

3、爆破模块

nmap -p22 --script=brute 192.168.112.188
nmap -p3306 --script=brute 192.168.112.188

┌──(root@kaliQiang)-[/home/denny]
└─# nmap --script=brute 192.168.112.158                                                                                                                                   
130 ⨯
Starting Nmap 7.91 ( https://nmap.org ) at 2021-11-28 23:06 CST
Nmap scan report for 192.168.112.158 (192.168.112.158)
Host is up (0.000092s latency).
Not shown: 996 closed ports
PORT     STATE SERVICE
135/tcp  open  msrpc
139/tcp  open  netbios-ssn
445/tcp  open  microsoft-ds
1025/tcp open  NFS-or-IIS
MAC Address: 00:0C:29:5E:35:7D (VMware)

Host script results:
| smb-brute: 
|_  guest:<blank> => Valid credentials, account disabled

Nmap done: 1 IP address (1 host up) scanned in 28.48 seconds

4、指定字典爆破

map -p3306 --script=brute --script-args 'userdb=./usertest.txt,passdb=./password-3000.txt' 192.168.112.188

爆破频率过高,很容易导致服务器拒绝服务,所以爆破虽然技术不难,但是实际应用中还需要注意。

四、SNetCracker爆破工具

image-20240908165508042

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值