1,Nmap
Nmap工具是用于端口扫描和漏洞诊断的代表性工具。
/usr/share/nmap
# nmap -v
Starting Nmap 7.01 ( https://nmap.org ) at 2016-05-14 17:27 UTC
常用参数:
-sT : TCP open扫描
-sS: TCP half open扫描,不建立SYN扫描
-sF: TCP FIN扫描利用,fin数据包扫描
-sN: TCP NULL扫描,利用NULL数据包扫描
-sX: TCP Xmas扫描,利用FIN,PSH,URG数据包扫描
-sP: 利用ping协议查看主机激活状态
-sU: UDP端口扫描
-O: 辨认对象主机操作系统
Example:
# nmap -sT -p22 121.42.27.192
# nmap -sS -p 80,8080,8081,8082,8088,9000 192.168.1.0/24 -oA file.xml
2,Nmap NSE
Nmap NSE比Nmap更强大且灵活,不仅可以搜集,NFS,SMB,RPC等信息,而且还可以执行域名查询,whios搜集以及其他网络频段服务器的后门安装检测,漏洞诊断等诸多业务。
/usr/share/nmap/scripts 所有脚本的存放路径。使用nmap –script=scriptname 就可以使用。
#nmap –script-update 可以更新脚本数据
http://nmap.org/nsedoc/lib/nmap.html
Example:
# nmap –script=default www.mrliangqi.com
Starting Nmap 7.01 ( https://nmap.org ) at 2016-05-14 17:32 UTC
Nmap scan report for www.mrliangqi.com (121.42.27.192)
Host is up (0.063s latency).
Not shown: 994 closed ports
PORT STATE SERVICE
22/tcp open ssh
| ssh-hostkey:
| 1024 b8:0f:34:1b:4d:a2:88:0e:ef:ad:5d:81:5f:b1:9d:cf (DSA)
|_ 2048 84:75:c3:3b:67:a7:9e:92:c1:d4:df:a1:5d:80:c3:89 (RSA)
80/tcp open http
|_http-title: Waf\xE9\x98\xB2\xE7\x81\xAB\xE5\xA2\x99
139/tcp filtered netbios-ssn
443/tcp open https
|_http-title: Waf\xE9\x98\xB2\xE7\x81\xAB\xE5\xA2\x99
| ssl-cert: Subject: commonName=mrliangqi.com
| Not valid before: 2016-04-28T09:23:49
|_Not valid after: 2018-04-28T09:23:49
|_ssl-date: 2016-05-14T09:32:21+00:00; -8h00m05s from scanner time.
| tls-nextprotoneg:
|_ http/1.1
1720/tcp filtered h323q931
3306/tcp open mysql
| mysql-info:
| Protocol: 53
| Version: .6.29
| Thread ID: 135524
| Capabilities flags: 63487
| Some Capabilities: IgnoreSigpipes, ConnectWithDatabase, Speaks41ProtocolOld, DontAllowDatabaseTableColumn, SupportsTransactions, Support41Auth, InteractiveClient, IgnoreSpaceBeforeParenthesis, FoundRows, LongPassword, ODBCClient, SupportsCompression, Speaks41ProtocolNew, SupportsLoadDataLocal, LongColumnFlag
| Status: Autocommit
|_ Salt: Qv!=PXJL}Q[Ux{%AXudu
3,Dmitry
dmitry是简单的控制台环境应用程序,在linux中尽可能更多的收集相关主机信息,由c编写,dmitry的基本功能是利用启动时间报告和TCP端口扫描信息,简单的whios查询来获取对象主机信息。
Usage: dmitry [-winsepfb] [-t 0-9] [-o %host.txt] host
-o Save output to %host.txt or to file specified by -o file 将内容保存文件
-i Perform a whois lookup on the IP address of a host 对ip进行whios查询
-w Perform a whois lookup on the domain name of a host 对域名进行whios查询
-n Retrieve Netcraft.com information on a host 搜索主机的netcraft.com信息
-s Perform a search for possible subdomains 搜索正在使用的下级域名
-e Perform a search for possible email addresses 搜索正在使用的下级邮箱
-p Perform a TCP port scan on a host TCP端口扫描
-f Perform a TCP port scan on a host showing output reporting filtered ports 执行TCP端口扫描并同时显示筛选端口
-b Read in the banner received from the scanned port 读取被扫描端口发送的标志
-t 0-9 Set the TTL in seconds when scanning a TCP port ( Default 2 )Requires the -p flagged to be passed 进行TCP端口扫描作业时指定的TTL值默认2
Example:
# dmitry -p 5 www.mrliangqi.com
4,Wafw00f (查看IDS/IPS是否启用)
wafwoof是python脚本写的,用于监测网络服务器是否处于网络WAF保护状态,这个不仅可以发展测试战略,还能开发出绕过WAF的高级应用。
Options:
-h, –help show this help message and exit
-v, –verbose enable verbosity – multiple -v options increase
verbosity
-a, –findall Find all WAFs, do not stop testing on the first one
-r, –disableredirect
Do not follow redirections given by 3xx responses
-t TEST, –test=TEST Test for one specific WAF
-l, –list List all WAFs that we are able to detect
–xmlrpc Switch on the XML-RPC interface instead of CUI
–xmlrpcport=XMLRPCPORT
Specify an alternative port to listen on, default 8001
-V, –version Print out the version
Example:
# wafw00f www.mrliangqi.com
^ ^
_ __ _ ____ _ __ _ _ ____
///7/ /.’ \ / __////7/ /,’ \ ,’ \ / __/
| V V // o // _/ | V V // 0 // 0 // _/
|_n_,’/_n_//_/ |_n_,’ \_,’ \_,’/_/
< …’
WAFW00F – Web Application Firewall Detection Tool
By Sandro Gauci && Wendel G. Henrique
Checking http://www.mrliangqi.com
Generic Detection results:
#No WAF detected by the generic detection #当看到这段,表示没有waf.感觉也不是非常准确。
Number of requests: 14
5,UA-tester (收集网络服务信息)
UA-tester是在user-agent字符串目录基础上比较网络服务器回应头的渗透测试python脚本。
Usage :
-u / –url Complete URL
-f / –file <Path to User Agent file>
-s / –single provide single user-agent string
-d / –default Select the UA String type(s) to check.
-o / –output <Path to output file> CSV formated output
-v / –verbose results>> Recommended
–debug See debug messages (This isn’t the switch you’re looking for)
Example :
# ua-tester -d -m -u www.mrliangqi.com
more Example:
./UATester.py -u www.example.com -f ./useragentlist.txt -v
./UATester.py -u https://www.wordpress.com
./UATester.py -u http://www.defaultserver.com -v –debug
./UATester.py -u facebook.com -v -d MDBX
./UATester.py -u https://www.google.com -s “MySpecialUserAgent”
./UATester.py -u blog.c22.cc -d MC -o ./output.csv
以上内容pdf版本下载:kali下服务信息搜集及Wafw00f 检测IDS_IPS.pdf