kali下服务信息搜集及Wafw00f 检测IDS_IPS




# nmap -v

Starting Nmap 7.01 ( https://nmap.org ) at 2016-05-14 17:27 UTC


-sT : TCP open扫描

-sS:   TCP half open扫描,不建立SYN扫描

-sF:   TCP FIN扫描利用,fin数据包扫描

-sN:   TCP NULL扫描,利用NULL数据包扫描

-sX:   TCP Xmas扫描,利用FIN,PSH,URG数据包扫描

-sP:   利用ping协议查看主机激活状态

-sU:   UDP端口扫描

-O:    辨认对象主机操作系统


# nmap -sT -p22

# nmap  -sS -p 80,8080,8081,8082,8088,9000  -oA file.xml

2,Nmap NSE

Nmap NSE比Nmap更强大且灵活,不仅可以搜集,NFS,SMB,RPC等信息,而且还可以执行域名查询,whios搜集以及其他网络频段服务器的后门安装检测,漏洞诊断等诸多业务。

/usr/share/nmap/scripts  所有脚本的存放路径。使用nmap --script=scriptname 就可以使用。

#nmap  --script-update 可以更新脚本数据



# nmap --script=default    www.mrliangqi.com

Starting Nmap 7.01 ( https://nmap.org ) at 2016-05-14 17:32 UTC

Nmap scan report for www.mrliangqi.com (

Host is up (0.063s latency).

Not shown: 994 closed ports


22/tcp   open     ssh

| ssh-hostkey:

|   1024 b8:0f:34:1b:4d:a2:88:0e:ef:ad:5d:81:5f:b1:9d:cf (DSA)

|_  2048 84:75:c3:3b:67:a7:9e:92:c1:d4:df:a1:5d:80:c3:89 (RSA)

80/tcp   open     http

|_http-title: Waf\xE9\x98\xB2\xE7\x81\xAB\xE5\xA2\x99

139/tcp  filtered netbios-ssn

443/tcp  open     https

|_http-title: Waf\xE9\x98\xB2\xE7\x81\xAB\xE5\xA2\x99

| ssl-cert: Subject: commonName=mrliangqi.com

| Not valid before: 2016-04-28T09:23:49

|_Not valid after:  2018-04-28T09:23:49

|_ssl-date: 2016-05-14T09:32:21+00:00; -8h00m05s from scanner time.

| tls-nextprotoneg:

|_  http/1.1

1720/tcp filtered h323q931

3306/tcp open     mysql

| mysql-info:

|   Protocol: 53

|   Version: .6.29

|   Thread ID: 135524

|   Capabilities flags: 63487

|   Some Capabilities: IgnoreSigpipes, ConnectWithDatabase, Speaks41ProtocolOld, DontAllowDatabaseTableColumn, SupportsTransactions, Support41Auth, InteractiveClient, IgnoreSpaceBeforeParenthesis, FoundRows, LongPassword, ODBCClient, SupportsCompression, Speaks41ProtocolNew, SupportsLoadDataLocal, LongColumnFlag

|   Status: Autocommit

|_  Salt: Qv!=PXJL}Q[Ux{%AXudu



Usage: dmitry [-winsepfb] [-t 0-9] [-o %host.txt] host

-o   Save output to %host.txt or to file specified by -o file 将内容保存文件

-i     Perform a whois lookup on the IP address of a host 对ip进行whios查询

-w   Perform a whois lookup on the domain name of a host 对域名进行whios查询

-n   Retrieve Netcraft.com information on a host   搜索主机的netcraft.com信息

-s    Perform a search for possible subdomains        搜索正在使用的下级域名

-e    Perform a search for possible email addresses 搜索正在使用的下级邮箱

-p   Perform a TCP port scan on a host   TCP端口扫描

-f    Perform a TCP port scan on a host showing output reporting filtered ports 执行TCP端口扫描并同时显示筛选端口

-b   Read in the banner received from the scanned port 读取被扫描端口发送的标志

-t 0-9 Set the TTL in seconds when scanning a TCP port ( Default 2 )Requires the -p flagged to be passed 进行TCP端口扫描作业时指定的TTL值默认2


# dmitry  -p 5 www.mrliangqi.com

4,Wafw00f (查看IDS/IPS是否启用)



-h, --help            show this help message and exit

-v, --verbose         enable verbosity - multiple -v options increase


-a, --findall         Find all WAFs, do not stop testing on the first one

-r, --disableredirect

Do not follow redirections given by 3xx responses

-t TEST, --test=TEST  Test for one specific WAF

-l, --list            List all WAFs that we are able to detect

--xmlrpc              Switch on the XML-RPC interface instead of CUI


Specify an alternative port to listen on, default 8001

-V, --version         Print out the version


# wafw00f www.mrliangqi.com

^     ^

_   __  _   ____ _   __  _    _   ____

///7/ /.' \ / __////7/ /,' \ ,' \ / __/

| V V // o // _/ | V V // 0 // 0 // _/

|_n_,'/_n_//_/   |_n_,' \_,' \_,'/_/

<         ...'

WAFW00F - Web Application Firewall Detection Tool

By Sandro Gauci && Wendel G. Henrique

Checking http://www.mrliangqi.com

Generic Detection results:

#No WAF detected by the generic detection #当看到这段,表示没有waf.感觉也不是非常准确。

Number of requests: 14

5,UA-tester (收集网络服务信息)


Usage :

-u / --url Complete URL

-f / --file <Path to User Agent file>

-s / --single provide single user-agent string

-d / --default Select the UA String type(s) to check.

-o / --output <Path to output file> CSV formated output

-v / --verbose results>> Recommended

--debug See debug messages (This isn't the switch you're looking for)

Example :

# ua-tester  -d -m -u www.mrliangqi.com

more Example:

./UATester.py -u www.example.com -f ./useragentlist.txt -v

./UATester.py -u https://www.wordpress.com

./UATester.py -u http://www.defaultserver.com -v --debug

./UATester.py -u facebook.com -v -d MDBX

./UATester.py -u https://www.google.com -s "MySpecialUserAgent"

./UATester.py -u blog.c22.cc -d MC -o ./output.csv

以上内容pdf版本下载:kali下服务信息搜集及Wafw00f 检测IDS_IPS.pdf


登录 后发表评论.