首頁>技術>

系統指紋識別1. 可以使用nmap進行識別 O引數

nmap -O 10.10.100.103#返回資料如下Starting Nmap 7.91 ( https://nmap.org ) at 2021-02-05 22:41 CSTNmap scan report for 10.10.100.103Host is up (0.00028s latency).Not shown: 993 closed portsPORT     STATE SERVICE21/tcp   open  ftp80/tcp   open  http135/tcp  open  msrpc139/tcp  open  netbios-ssn445/tcp  open  microsoft-ds1026/tcp open  LSA-or-nterm3306/tcp open  mysqlMAC Address: 00:0C:29:28:F9:63 (VMware)Device type: general purposeRunning: Microsoft Windows 2003OS CPE: cpe:/o:microsoft:windows_server_2003::sp1 cpe:/o:microsoft:windows_server_2003::sp2OS details: Microsoft Windows Server 2003 SP1 or SP2Network Distance: 1 hopOS detection performed. Please report any incorrect results at https://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in 9.11 seconds

還有一個p0f這個工具,它是被動掃描識別工具,在最新的kali上並沒有安裝它,需要執行sudo apt-get install p0f 安裝

#操作方法p0f -h 檢視引數 p0f -h--- p0f 3.09b by Michal Zalewski <[email protected]> ---p0f: invalid option -- 'h'Usage: p0f [ ...options... ] [ 'filter rule' ]Network interface options:  -i iface  - listen on the specified network interface  -r file   - read offline pcap data from a given file  -p        - put the listening interface in promiscuous mode  -L        - list all available interfacesOperating mode and output settings:  -f file   - read fingerprint database from 'file' (/etc/p0f/p0f.fp)  -o file   - write information to the specified log file  -s name   - answer to API queries at a named unix socket  -u user   - switch to the specified unprivileged account and chroot  -d        - fork into background (requires -o or -s)Performance-related options:  -S limit  - limit number of parallel API connections (20)  -t c,h    - set connection / host cache age limits (30s,120m)  -m c,h    - cap the number of active connections / hosts (1000,10000)Optional filter expressions (man tcpdump) can be specified in the commandline to prevent p0f from looking at incidental network traffic.Problems? You can reach the author at <[email protected]>.#監聽一塊網絡卡,telnet ,ping ,手動觸發等如 p0f -i eth0  監聽網絡卡,訪問10.10.100.103 顯示為如下.-[ 10.10.100.110/52530 -> 10.10.100.103/80 (syn+ack) ]-|這裡並沒有獲取到伺服器資訊| server   = 10.10.100.103/80| os       = ??? 這裡並沒有獲取到伺服器資訊| dist     = 0| params   = none| raw_sig  = 4:128+0:0:1460:mss*44,0:mss,nop,ws,nop,nop,ts,nop,nop,sok:ts1-:0|`----.-[ 10.10.100.110/52530 -> 10.10.100.103/80 (mtu) ]-|| server   = 10.10.100.103/80| link     = Ethernet or modem| raw_mtu  = 1500|`----.-[ 10.10.100.110/52530 -> 10.10.100.103/80 (http request) ]-|| client   = 10.10.100.110/52530| app      = Firefox 10.x or newer| lang     = English| params   = none| raw_sig  = 1:Host,User-Agent,Accept=[text/html,application/xhtml+xml                                       ,application/xml;q=0.9,image/webp,*/*;q=0.8],                                       Accept-Language=[en-US,en;q=0.5],                                       Accept-Encoding=[gzip, deflate],Connection=[keep-alive],                                       Upgrade-Insecure-Requests=[1],?Cache-Control:Accept-Charset                                       ,Keep-Alive:Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101                                       Firefox/78.0|`----.-[ 10.10.100.110/52530 -> 10.10.100.103/80 (http response) ]-|| server   = 10.10.100.103/80| app      = Apache 2.x  #app地址| lang     = none| params   = none包括一些詳細資訊| raw_sig  = 1:Date,Server,X-Powered-By=[PHP/5.4.45],Keep-Alive=[timeout=5, max=100],Connection=[Keep-Alive],Transfer-Encoding=[chunked],Content-Type:Accept-Ranges:Apache/2.4.23 (Win32) OpenSSL/1.0.2j PHP/5.4.45
其他資訊收集工具1.recon-ng
它是由python編寫的一個開源框架和msf長的差不多,用它來查詢子域名是比較方便的  ,在最新的kali裡沒有安裝應用,預設開啟是使用不了的,如下圖
這個可以看到,沒有可用的模組可以 使用,需要使用 marketplace install all 進行安裝,安裝後如下
使用模組 modules load 模組名搜尋模組 modules search  模組名案例:查詢百度子域名(一個完整的流程)#建立一個新的工作區recon-ng -w baidu#使用對應的模組這裡選用bing  可以搜尋
使用modules load 模組名進行載入,這裡可以用tab鍵補全哦
檢視引數並設定
執行 run (這裡只截取了一部分)
搜尋到的結果會顯示的hosts裡show hosts 可以檢視
這裡已經知道域名了,但是想顯示ip地址,也可以載入另一個模組,使用上一個查詢出來的結果使用這個模組 modules load recon/hosts-hosts/resolve
options set source query select host from hosts (這裡呢相當於在hosts裡查指定的列的資料做為source)
執行run,可以對域名進行解析
執行 show hosts 也可以進行檢視
也可以執行匯出,查詢匯出模組modules search report
和使用別的模組一樣,這裡省略了呀,只顯示最後結果吧
更多的模組,可以檢視幫助文件

11
最新評論
  • BSA-TRITC(10mg/ml) TRITC-BSA 牛血清白蛋白改性標記羅丹明
  • 不貼程式碼,Spring的Bean例項化過程應該是怎樣的?