Senin, 30 Januari 2012

scanning with information gatherin technique

in this method i use nmap, zenmap, netifera, wireshark, sites target is:

is2c-dojo.com
is2c-dojo.net
spentera.com

the first must i do is pinging to them..
root@cupenk:~# ping is2c-dojo.net
PING is2c-dojo.net (216.239.38.21) 56(84) bytes of data.
64 bytes from any-in-2615.1e100.net (216.239.38.21): icmp_seq=1 ttl=52 time=40.3 ms
64 bytes from any-in-2615.1e100.net (216.239.38.21): icmp_seq=2 ttl=52 time=40.8 ms
64 bytes from any-in-2615.1e100.net (216.239.38.21): icmp_seq=3 ttl=52 time=40.1 ms
^C
--- is2c-dojo.net ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2002ms
rtt min/avg/max/mdev = 40.176/40.469/40.899/0.351 ms
root@cupenk:~# ping is2c-dojo.com
PING is2c-dojo.com (67.222.154.106) 56(84) bytes of data.
^C
--- is2c-dojo.com ping statistics ---
14 packets transmitted, 0 received, 100% packet loss, time 12999ms

root@cupenk:~# ping spentera.com
PING spentera.com (74.81.66.104) 56(84) bytes of data.
^C
--- spentera.com ping statistics ---
14 packets transmitted, 0 received, 100% packet loss, time 13102ms

just is2c-dojo.net can be comunication.
ok next i scan is2c-dojo.net with nmap gui version with syntax => nmap -T4 -A -v is2c-dojo.net:
Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-01-31 11:42 WIT
NSE: Loaded 87 scripts for scanning.
NSE: Script Pre-scanning.
Initiating Ping Scan at 11:42
Scanning is2c-dojo.net (216.239.36.21) [4 ports]
Completed Ping Scan at 11:42, 0.11s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 11:42
Completed Parallel DNS resolution of 1 host. at 11:42, 0.21s elapsed
Initiating SYN Stealth Scan at 11:42
Scanning is2c-dojo.net (216.239.36.21) [1000 ports]
Discovered open port 80/tcp on 216.239.36.21
Completed SYN Stealth Scan at 11:43, 49.08s elapsed (1000 total ports)
Initiating Service scan at 11:43
Scanning 1 service on is2c-dojo.net (216.239.36.21)
Completed Service scan at 11:43, 13.98s elapsed (1 service on 1 host)
Initiating OS detection (try #1) against is2c-dojo.net (216.239.36.21)
Retrying OS detection (try #2) against is2c-dojo.net (216.239.36.21)
Initiating Traceroute at 11:43
Completed Traceroute at 11:43, 0.28s elapsed
Initiating Parallel DNS resolution of 6 hosts. at 11:43
Completed Parallel DNS resolution of 6 hosts. at 11:43, 0.07s elapsed
NSE: Script scanning 216.239.36.21.
Initiating NSE at 11:43
Completed NSE at 11:44, 14.23s elapsed
Nmap scan report for is2c-dojo.net (216.239.36.21)
Host is up (0.62s latency).
Other addresses for is2c-dojo.net (not scanned): 216.239.38.21 216.239.32.21 216.239.34.21
rDNS record for 216.239.36.21: any-in-2415.1e100.net
Not shown: 998 filtered ports
PORT    STATE  SERVICE VERSION
80/tcp  open   http    Google httpd 2.0 (GFE)
|_http-methods: No Allow or Public header in OPTIONS response (status code 301)
| http-title: 301 Moved
|_Did not follow redirect to http://www.is2c-dojo.net/
113/tcp closed ident
Device type: WAP|general purpose
Running (JUST GUESSING): Netgear embedded (86%), OpenBSD 3.X|4.X (85%)
OS CPE: cpe:/o:openbsd:openbsd:3 cpe:/o:openbsd:openbsd:4
Aggressive OS guesses: Netgear WGR614v7 wireless broadband router (86%), OpenBSD 3.8 - 4.6 (85%), OpenBSD 4.3 (85%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 0.000 days (since Tue Jan 31 11:43:52 2012)
Network Distance: 6 hops
TCP Sequence Prediction: Difficulty=252 (Good luck!)
IP ID Sequence Generation: Randomized
Service Info: OS: Linux; CPE: cpe:/o:linux:kernel

TRACEROUTE (using port 113/tcp)
HOP RTT       ADDRESS
1   2.68 ms   192.168.4.1
2   6.34 ms   202.162.33.49
3   6.30 ms   202.162.38.74
4   15.09 ms  202.162.38.205
5   31.31 ms  ip-117-1.mcs.internet.exchange (119.110.117.1)
6   280.43 ms any-in-2415.1e100.net (216.239.36.21)

NSE: Script Post-scanning.
Read data files from: /usr/local/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 93.92 seconds
           Raw packets sent: 3104 (140.644KB) | Rcvd: 96 (4.984KB)

service running port 80 http by google. its blogger.
terminal:
root@cupenk:~# nmap -Pn -sS -A is2c.dojo.net

Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-01-31 12:06 WIT
Nmap scan report for is2c.dojo.net (173.212.56.201)
Host is up (0.34s latency).
Not shown: 999 filtered ports
PORT   STATE SERVICE VERSION
80/tcp open  http    Apache httpd 2.2.3 ((CentOS))
| http-robots.txt: 2 disallowed entries 
|_/click.php /result.php
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-title: dojo.net
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Linux 2.6.X (88%)
OS CPE: cpe:/o:linux:kernel:2.6
Aggressive OS guesses: Linux 2.6.9 - 2.6.18 (88%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 13 hops

TRACEROUTE (using port 80/tcp)
HOP RTT       ADDRESS
1   3.07 ms   192.168.4.1
2   4.13 ms   202.162.33.49
3   4.11 ms   202.162.38.74
4   4.86 ms   118.97.5.229
5   30.86 ms  118.subnet118-98-56.astinet.telkom.net.id (118.98.56.118)
6   29.97 ms  30.subnet118-98-58.astinet.telkom.net.id (118.98.58.30)
7   29.07 ms  30.190.240.180.telin.sg (180.240.190.30)
8   43.72 ms  58.27.14.57
9   ...
10  353.55 ms ae3-155.lon25.ip4.tinet.net (77.67.75.149)
11  341.05 ms xe-0-1-0.dal33.ip4.tinet.net (89.149.183.214)
12  343.18 ms hunt-brothers-of-louisiana.ip4.tinet.net (77.67.71.226)
13  342.95 ms 173.212.56.201

OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 61.03 seconds

try scan with netifera;
on netifera i can see directory from is2c.dojo.net

try again with wireshark:



0 komentar:

Posting Komentar

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Cup3nK - Premium Blogger Themes | Hosted Desktop