27.06.2013 Views

Hack Security Pro.pdf - Index of

Hack Security Pro.pdf - Index of

Hack Security Pro.pdf - Index of

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

C) Fingerprinting the system<br />

The nmap scanner has an active fingerprinting option:<br />

nmap -O 192.168.124.20<br />

Starting nmap 3.50 ( http://www.insecure.org/nmap/ ) at 2004-05-18 22:02<br />

CEST<br />

Interesting ports on Dantes (192.168.124.20):<br />

(The 1648 ports scanned but not shown below are in state: closed)<br />

PORT STATE SERVICE<br />

...<br />

Device type: general purpose<br />

Running: Linux 2.4.X|2.5.X<br />

OS details: Linux Kernel 2.4.0 - 2.5.20<br />

Uptime 19.098 days (since Thu Apr 29 19:41:12 2004)<br />

Nmap run completed -- 1 IP address (1 host up) scanned in 5.626 seconds<br />

With Linux:<br />

Laptop:/home/xdream# p0f<br />

p0f - passive os fingerprinting utility, version 2.0.2<br />

(C) M. Zalewski , W. Stearns <br />

p0f: listening (SYN) on 'wlan0', 193 sigs (9 generic), rule: 'all'.<br />

192.168.124.12:35657 - Linux 2.4/2.6 (up: 85 hrs)<br />

-> 192.168.124.20:80 (distance 0, link: ethernet/modem)<br />

192.168.124.12:35658 - Linux 2.4/2.6 (up: 85 hrs)<br />

-> 192.168.124.20:80 (distance 0, link: ethernet/modem)<br />

D) Port scanning<br />

All open ports <strong>of</strong> the target system are listed to deduce the active services accessible by the attacking<br />

machine. Some ports are generally associated to some standard services:<br />

Port <strong>Pro</strong>tocol Associated<br />

Service<br />

21 TCP FTP<br />

22 TCP SSH<br />

23 TCP Telnet<br />

25 TCP SMTP<br />

53 UDP DNS<br />

80 TCP HTTP<br />

110 TCP POP3<br />

111 TCP Portmapper<br />

139 TCP Netbios<br />

443 TCP HTTPS<br />

2049 UDP NFS<br />

The <strong>Hack</strong>ademy DMP -29/209- SYSDREAM

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!