Detecting and Tracking the Red-Team.pdf
1.5 MB
Detecting and Tracking #Tips
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Terms related to ss/encrypt/OpenSSL that we will use:
genpkey (replaces genrsa , gendh and gendsa ) - generates private keys
req - utility for creating certificate signing requests and for generating self-signed PKCS # 10 certificates
x509 - utility for signing certificates and for showing properties of certificates
rsa - utility for working with RSA keys, for example, for converting
keys to various formats
enc - various actions with symmetric ciphers
pkcs12 - Create and parse PKCS # 12 files
crl2pkcs7 - program for converting CRL to PKCS # 7
pkcs7 - Performs operations on PKCS # 7 files in DER or PEM format
verify - program for verifying certificate chains
s_client - This command implements an SSL / TLS client that connects to a remote host using SSL / TLS. This is a very useful diagnostic tool for SSL servers
ca - is a minimal CA application. It can be used to sign various forms of certificate requests and generate CRLs. It also maintains a text database of issued certificates and their status
rand - This command generates the specified number of random bytes using a cryptographically secure pseudo-random number generator (CSPRNG)
rsautl - command can be used to sign, verify, encrypt and decrypt data using the RSA algorithm
smime - the command processes S / MIME mail. It can encrypt, decrypt, sign and verify S / MIME messages
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Terms related to ss/encrypt/OpenSSL that we will use:
genpkey (replaces genrsa , gendh and gendsa ) - generates private keys
req - utility for creating certificate signing requests and for generating self-signed PKCS # 10 certificates
x509 - utility for signing certificates and for showing properties of certificates
rsa - utility for working with RSA keys, for example, for converting
keys to various formats
enc - various actions with symmetric ciphers
pkcs12 - Create and parse PKCS # 12 files
crl2pkcs7 - program for converting CRL to PKCS # 7
pkcs7 - Performs operations on PKCS # 7 files in DER or PEM format
verify - program for verifying certificate chains
s_client - This command implements an SSL / TLS client that connects to a remote host using SSL / TLS. This is a very useful diagnostic tool for SSL servers
ca - is a minimal CA application. It can be used to sign various forms of certificate requests and generate CRLs. It also maintains a text database of issued certificates and their status
rand - This command generates the specified number of random bytes using a cryptographically secure pseudo-random number generator (CSPRNG)
rsautl - command can be used to sign, verify, encrypt and decrypt data using the RSA algorithm
smime - the command processes S / MIME mail. It can encrypt, decrypt, sign and verify S / MIME messages
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦COMMUN METHODES HACK NETFLIX FOR BEGINERS
#fASTtIPS
> Unfortunately, password theft is very common within cyber security, especially for Netflix accounts.
> With over 75 million subscribers, Netflix passwords grant cyber criminals to both access user accounts without paying for a subscription, or even worseβ¦
> sell the userβs password details and payment information on the Deep Web.
π¦How do they do it? β Some examples
1) Phishing
Hackers often use phishing campaigns to obtain access to userβs device. They accomplish this by tricking users (often via a malicious email link that leads the user to a fake Netflix login page).
Once the user clicks on the link, the malware steals their account information.
2) Keyloggers
Keylogging is a password-theft tactic that resides in a deviceβs system memory, runs every time you startup your PC, and logs all your keystrokes. The logs are then sent to the hacker.
3) Trojan Horse Viruses
Trojan horses are sent to victims via malicious links or file attachments that trick users into downloading malicious software onto their device. Once downloaded this malware can take full control of the computer. Its main goal is to damage, disrupt, steal or damage your data or network.
> Once installed, it can extract user logins of any website or software that the infected computer uses, way more than just Netflix accounts; Skype, Facebook, Emails, and more.
> Unfortunately, computer passwords arenβt really a safety measure against hackers who access your device remotely, as they access the system through other tactics.
> Computer passwords are more of a protection against physical theft so that somebody whose obtained physical possession of your PC cannot login to the device.
ENJOYβ€οΈππ»
deepwiki
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦COMMUN METHODES HACK NETFLIX FOR BEGINERS
#fASTtIPS
> Unfortunately, password theft is very common within cyber security, especially for Netflix accounts.
> With over 75 million subscribers, Netflix passwords grant cyber criminals to both access user accounts without paying for a subscription, or even worseβ¦
> sell the userβs password details and payment information on the Deep Web.
π¦How do they do it? β Some examples
1) Phishing
Hackers often use phishing campaigns to obtain access to userβs device. They accomplish this by tricking users (often via a malicious email link that leads the user to a fake Netflix login page).
Once the user clicks on the link, the malware steals their account information.
2) Keyloggers
Keylogging is a password-theft tactic that resides in a deviceβs system memory, runs every time you startup your PC, and logs all your keystrokes. The logs are then sent to the hacker.
3) Trojan Horse Viruses
Trojan horses are sent to victims via malicious links or file attachments that trick users into downloading malicious software onto their device. Once downloaded this malware can take full control of the computer. Its main goal is to damage, disrupt, steal or damage your data or network.
> Once installed, it can extract user logins of any website or software that the infected computer uses, way more than just Netflix accounts; Skype, Facebook, Emails, and more.
> Unfortunately, computer passwords arenβt really a safety measure against hackers who access your device remotely, as they access the system through other tactics.
> Computer passwords are more of a protection against physical theft so that somebody whose obtained physical possession of your PC cannot login to the device.
ENJOYβ€οΈππ»
deepwiki
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦NMAP USEFUL COMMANDS :
Scan network for live hosts
(nmap/zenmap)
For NMAP β
nmap -vv -sP 192.168.0.1-254 -oG hosts_up.txt
cat hosts_up.txt | grep -i βupβ
nmap -PN 192.168.9.200-254
(this will also show open ports for each host)
Identify OS
(nmap/zenmap)
For NMAP β
nmap -O 192.168.0.100 (just OS fingerprint)
nmap -A 192.168.9.201 (runs an βaggressiveβ scan β scan,OS fingerprint, version scan, scripts and traceroute)
Check hosts for services
(nmap/zenmap)
For NMAP
- nmap -sS 192.168.9.254 (TCP)
- nmap -sU 192.168.9.254 (UDP)
(Could be better to do this in zenmap and group servers by services)
FOR SNMP
- snmpwalk -c public -v1 192.168.9.254 1 |grep hrSWRunName|cut -dβ β -f
For a known port
- nmap β p 139 192.168.9.254
DNS Lookups/Hostnames
host -l <domain> <dns server>
e.g. host -l acme.local 192.168.0.220
Banner grab/Version services
(nmap/zenmap/SNMP)
Check versions of software/services against milw0rm and security focus)
For NMAP
- nmap -sV 192.168.9.254
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦NMAP USEFUL COMMANDS :
Scan network for live hosts
(nmap/zenmap)
For NMAP β
nmap -vv -sP 192.168.0.1-254 -oG hosts_up.txt
cat hosts_up.txt | grep -i βupβ
nmap -PN 192.168.9.200-254
(this will also show open ports for each host)
Identify OS
(nmap/zenmap)
For NMAP β
nmap -O 192.168.0.100 (just OS fingerprint)
nmap -A 192.168.9.201 (runs an βaggressiveβ scan β scan,OS fingerprint, version scan, scripts and traceroute)
Check hosts for services
(nmap/zenmap)
For NMAP
- nmap -sS 192.168.9.254 (TCP)
- nmap -sU 192.168.9.254 (UDP)
(Could be better to do this in zenmap and group servers by services)
FOR SNMP
- snmpwalk -c public -v1 192.168.9.254 1 |grep hrSWRunName|cut -dβ β -f
For a known port
- nmap β p 139 192.168.9.254
DNS Lookups/Hostnames
host -l <domain> <dns server>
e.g. host -l acme.local 192.168.0.220
Banner grab/Version services
(nmap/zenmap/SNMP)
Check versions of software/services against milw0rm and security focus)
For NMAP
- nmap -sV 192.168.9.254
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE HACKING
3 Billiar combo.rar
15.4 MB
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST 2020 SITES FOR CRACKED APK
β https://acmarket.net/
β https://www.apkwhale.com/
β https://apkmb.com/
β https://ihackedit.com/
β https://apk4free.net/
β https://rexdl.com/
β https://www.revdl.com
β https://aptoide.com
β https://www.apk4fun.com/
β https://apkpure.com
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST 2020 SITES FOR CRACKED APK
β https://acmarket.net/
β https://www.apkwhale.com/
β https://apkmb.com/
β https://ihackedit.com/
β https://apk4free.net/
β https://rexdl.com/
β https://www.revdl.com
β https://aptoide.com
β https://www.apk4fun.com/
β https://apkpure.com
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
acmarket.net
ACMarket - Cracked Apps, Games, Mods for Android
How to bypass AMSI and execute ANY malicious Powershell code.pdf
398 KB
the most #requested tutorial
How to bypass AMSI and execute ANY malicious Powershell code
How to bypass AMSI and execute ANY malicious Powershell code
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦METASPLOIT MODULES & HACKING :
Http://www.indepthdefense.com/2009/02/reverse-pivots-with-metasploit-how-not.html
http://code.google.com/p/msf-hack/wiki/WmapNikto
Http://www.indepthdefense.com/2009/01/metasploit-visual-basic-payloads-in.html
Http://seclists.org/metasploit/
Http://pauldotcom.com/2010/03/nessus-scanning-through-
a-meta.html
Http://meterpreter.illegalguy.hostzi.com/
Http://blog.metasploit.com/2010/03/automating-metasploit-console.html
Http://www.workrobot.com/sansfire2009/561.html
Http://www.securitytube.net/video/711
http://en.wikibooks.org/wiki/Metasploit/
MeterpreterClient#download
Http://vimeo.com/16852783
Http://milo2012.wordpress.com/2009/09/27/xlsinjector/
Http://www.fastandeasyhacking.com/
Http://trac.happypacket.net/
http://www.blackhat.com/presentations/bh-dc-10/Ames_Colin/BlackHat-DC-2010-colin-david-neurosurgery-with-meterpreter-wp.pdf
http://www.blackhat.com/presentations/bh-dc-10/Egypt/BlackHat-DC-2010-Egypt-UAV-slides.pdf
http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Training
Http://www.irongeek.com/i.php?page=videos/metasploit-class
Http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,6158.0/
Http://vimeo.com/16925188
Http://www.ustream.tv/recorded/13396511
Http://www.ustream.tv/recorded/13397426
Http://www.ustream.tv/recorded/13398740
enjoyβ€οΈππ»
β GIT 2020
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦METASPLOIT MODULES & HACKING :
Http://www.indepthdefense.com/2009/02/reverse-pivots-with-metasploit-how-not.html
http://code.google.com/p/msf-hack/wiki/WmapNikto
Http://www.indepthdefense.com/2009/01/metasploit-visual-basic-payloads-in.html
Http://seclists.org/metasploit/
Http://pauldotcom.com/2010/03/nessus-scanning-through-
a-meta.html
Http://meterpreter.illegalguy.hostzi.com/
Http://blog.metasploit.com/2010/03/automating-metasploit-console.html
Http://www.workrobot.com/sansfire2009/561.html
Http://www.securitytube.net/video/711
http://en.wikibooks.org/wiki/Metasploit/
MeterpreterClient#download
Http://vimeo.com/16852783
Http://milo2012.wordpress.com/2009/09/27/xlsinjector/
Http://www.fastandeasyhacking.com/
Http://trac.happypacket.net/
http://www.blackhat.com/presentations/bh-dc-10/Ames_Colin/BlackHat-DC-2010-colin-david-neurosurgery-with-meterpreter-wp.pdf
http://www.blackhat.com/presentations/bh-dc-10/Egypt/BlackHat-DC-2010-Egypt-UAV-slides.pdf
http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Training
Http://www.irongeek.com/i.php?page=videos/metasploit-class
Http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,6158.0/
Http://vimeo.com/16925188
Http://www.ustream.tv/recorded/13396511
Http://www.ustream.tv/recorded/13397426
Http://www.ustream.tv/recorded/13398740
enjoyβ€οΈππ»
β GIT 2020
β β β Uππ»βΊπ«Δπ¬πβ β β β
Markbaggett
Mark Baggett - In Depth Defense
A collection of articles, python tools, interviews and talk about information security, hacking, forensics, and defense using python coding
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FREE NEW COURSES :
Http://pentest.cryptocity.net/
Http://www.irongeek.com/i.php?page=videos/network-sniffers-class
http://samsclass.info/124/124_Sum09.shtml
Http://www.cs.ucsb.edu/~vigna/courses/cs279/
Http://crypto.stanford.edu/cs142/
Http://crypto.stanford.edu/cs155/
Http://cseweb.ucsd.edu/classes/wi09/cse227/
Http://www-inst.eecs.berkeley.edu/~cs161/sp11/
http://security.ucla.edu/pages/Security_Talks
Http://www.cs.rpi.edu/academics/courses/spring10/
csci4971/
Http://cr.yp.to/2004-494.html
Http://www.ece.cmu.edu/~dbrumley/courses/18732-f09/
Https://noppa.tkk.fi/noppa/kurssi/t-110.6220/luennot
Http://stuff.mit.edu/iap/2009/#websecurity
enjoyβ€οΈππ»
β GIT 2020
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FREE NEW COURSES :
Http://pentest.cryptocity.net/
Http://www.irongeek.com/i.php?page=videos/network-sniffers-class
http://samsclass.info/124/124_Sum09.shtml
Http://www.cs.ucsb.edu/~vigna/courses/cs279/
Http://crypto.stanford.edu/cs142/
Http://crypto.stanford.edu/cs155/
Http://cseweb.ucsd.edu/classes/wi09/cse227/
Http://www-inst.eecs.berkeley.edu/~cs161/sp11/
http://security.ucla.edu/pages/Security_Talks
Http://www.cs.rpi.edu/academics/courses/spring10/
csci4971/
Http://cr.yp.to/2004-494.html
Http://www.ece.cmu.edu/~dbrumley/courses/18732-f09/
Https://noppa.tkk.fi/noppa/kurssi/t-110.6220/luennot
Http://stuff.mit.edu/iap/2009/#websecurity
enjoyβ€οΈππ»
β GIT 2020
β β β Uππ»βΊπ«Δπ¬πβ β β β
trailofbits.github.io
Introduction Β· CTF Field Guide
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WEB VECTORS XSS
#RESOURCES
Http://www.infosecwriters.com/hhworld/hh8/csstut.htm
http://www.technicalinfo.net/papers/CSS.html
Http://msmvps.com/blogs/alunj/archive/2010/07/07/1773441.aspx
Http://forum.intern0t.net/web-hacking-war-games/112-cross-site-scripting-attack-defense-guide.html
https://media.blackhat.com/bh-eu-10/presentations/Lindsay_Nava/BlackHat-EU-2010-Lindsay-Nava-IE8-XSS-Filters-slides.pdf
Http://sirdarckcat.blogspot.com/2009/08/our-favorite-xss-filters-and-how-to.html
Http://www.securityaegis.com/filter-evasion-houdini-on-the-wire/
Http://heideri.ch/jso/#javascript
Http://www.reddit.com/r/xss/
Http://sla.ckers.org/forum/list.php?2
enjoyβ€οΈππ»
β GIT 2020
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WEB VECTORS XSS
#RESOURCES
Http://www.infosecwriters.com/hhworld/hh8/csstut.htm
http://www.technicalinfo.net/papers/CSS.html
Http://msmvps.com/blogs/alunj/archive/2010/07/07/1773441.aspx
Http://forum.intern0t.net/web-hacking-war-games/112-cross-site-scripting-attack-defense-guide.html
https://media.blackhat.com/bh-eu-10/presentations/Lindsay_Nava/BlackHat-EU-2010-Lindsay-Nava-IE8-XSS-Filters-slides.pdf
Http://sirdarckcat.blogspot.com/2009/08/our-favorite-xss-filters-and-how-to.html
Http://www.securityaegis.com/filter-evasion-houdini-on-the-wire/
Http://heideri.ch/jso/#javascript
Http://www.reddit.com/r/xss/
Http://sla.ckers.org/forum/list.php?2
enjoyβ€οΈππ»
β GIT 2020
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Tens of thousands of MSSQL servers have been invaded by blasting and have become Monero mining machines
#News
> a mining Trojan targeting MS SQL server attacks. The mining Trojan mainly targeted MS SQL services to blast weak password attacks. After successful blasting, Monero mining Trojans will be implanted for mining.
> At the same time, the attacker downloads the frpc intranet penetration tool to install the backdoor, and will add users to facilitate the intruder to log in to the server remotely.
> Judging from the HFS server count of the mining Trojan, tens of thousands of MS SQL servers have been implanted with the mining Trojan, and dozens of servers have been installed with backdoors.
> The attacker installs intranet penetration tools on the compromised server will further increase the risk of hacker intrusion, and the compromise of the corporate database server will lead to serious information leakage incidents.
#News
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Tens of thousands of MSSQL servers have been invaded by blasting and have become Monero mining machines
#News
> a mining Trojan targeting MS SQL server attacks. The mining Trojan mainly targeted MS SQL services to blast weak password attacks. After successful blasting, Monero mining Trojans will be implanted for mining.
> At the same time, the attacker downloads the frpc intranet penetration tool to install the backdoor, and will add users to facilitate the intruder to log in to the server remotely.
> Judging from the HFS server count of the mining Trojan, tens of thousands of MS SQL servers have been implanted with the mining Trojan, and dozens of servers have been installed with backdoors.
> The attacker installs intranet penetration tools on the compromised server will further increase the risk of hacker intrusion, and the compromise of the corporate database server will lead to serious information leakage incidents.
#News
β β β Uππ»βΊπ«Δπ¬πβ β β β
Information Gathering With Cobalt Strike.pdf
1.3 MB
Information Gathering With Cobalt Strike full tutorial
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SITE HACKING VIA WEB VECTORS UPLOADS TRICKS
Http://www.google.com/#hl=en&q=bypassing+upload+file+type&start=40&sa=N&fp=a2bb30ecf4f91972
Http://blog.skeptikal.org/2009/11/adobe-responds-sort-of.html
Http://blog.insicdesigns.com/2009/01/secure-file-upload-in-php-web-applications/
Http://perishablepress.com/press/2006/01/10/stupid-htaccess-tricks/
Http://ex.ploit.net/f20/tricks-tips-bypassing-image-uploaders-t3hmadhatt3r-38/
Http://www.ravenphpscripts.com/article2974.html
Http://www.acunetix.com/cross-site-scripting/scanner.htm
Http://www.vupen.com/english/advisories/2009/3634
Http://msdn.microsoft.com/en-us/library/aa478971.aspx
Http://dev.tangocms.org/issues/237
http://seclists.org/fulldisclosure/2006/Jun/508
Http://www.gnucitizen.org/blog/cross-site-file-upload-attacks/
http://www.ipolicynetworks.com/technology/files/TikiWiki_jhot.php_Script_File_Upload_Security_Bypass_Vulnerability.html
http://shsc.info/FileUploadSecurity
enjoyβ€οΈππ»
β GIT 2020
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SITE HACKING VIA WEB VECTORS UPLOADS TRICKS
Http://www.google.com/#hl=en&q=bypassing+upload+file+type&start=40&sa=N&fp=a2bb30ecf4f91972
Http://blog.skeptikal.org/2009/11/adobe-responds-sort-of.html
Http://blog.insicdesigns.com/2009/01/secure-file-upload-in-php-web-applications/
Http://perishablepress.com/press/2006/01/10/stupid-htaccess-tricks/
Http://ex.ploit.net/f20/tricks-tips-bypassing-image-uploaders-t3hmadhatt3r-38/
Http://www.ravenphpscripts.com/article2974.html
Http://www.acunetix.com/cross-site-scripting/scanner.htm
Http://www.vupen.com/english/advisories/2009/3634
Http://msdn.microsoft.com/en-us/library/aa478971.aspx
Http://dev.tangocms.org/issues/237
http://seclists.org/fulldisclosure/2006/Jun/508
Http://www.gnucitizen.org/blog/cross-site-file-upload-attacks/
http://www.ipolicynetworks.com/technology/files/TikiWiki_jhot.php_Script_File_Upload_Security_Bypass_Vulnerability.html
http://shsc.info/FileUploadSecurity
enjoyβ€οΈππ»
β GIT 2020
β β β Uππ»βΊπ«Δπ¬πβ β β β
Perishablepress
Stupid .htaccess Tricks | Perishable Press
An extensive htaccess reference including many htaccess tips, tricks, and examples. Enhance the functionality of your site with htaccess rewrite and redirect rules. Prevent hotlinking, secure files, and much more.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦1) What is investigation in hacking ?
Reconnaissance is to collect as much information as possible on the target network. From a hacker's point of view, information collection is very helpful for attacks. Generally speaking, the following information can be collected:
Email, port number, operating system, running service, Traceroute or DNS information, firewall identification and escape, etc.
2) Introduction to NMAP
Nmap is a network connection end scanning software, used to scan the open network connection end of the computer on the Internet. Determine which services are running on which connections, and infer which operating system the computer is running (this is also known as fingerprinting). It is one of the necessary software for network administrators and is used to evaluate network system security.
3) NMAP script engine
The NMAP script engine is the most powerful and flexible feature of NMAP. It allows users to write simple scripts to automate various network tasks, basically these scripts are written in lua language. Usually NMAP script engine can do many things, such as:
4) Network discovery
This is the basic function of NMAP. Examples include finding the whois information of the target domain name, querying the ownership of the target ip on ARIN, RIPE, or APNIC, finding open ports, SNMP query and listing available NFS/SMB/RPC shares and services .
5) Vulnerability detection
When a new vulnerability is discovered, you want to quickly scan the network to identify vulnerable systems before intruders. Although NMAP is not a comprehensive vulnerability scanner, NSE is powerful enough to handle demanding vulnerability checks. Many vulnerable scripts are already available, and more scripts are planned.
6) Backdoor detection
Many attackers and some automated worms will leave back doors so that they can be re-entered later. Some of them can be detected by NMAP based on regular expressions.
7) Exploit
As a scripting language, NSE can even exploit vulnerabilities, not just find them. The ability to add custom attack scripts may be valuable to some people (especially penetration testers), but it is not intended to develop NMAP into something like the metasploit framework.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦1) What is investigation in hacking ?
Reconnaissance is to collect as much information as possible on the target network. From a hacker's point of view, information collection is very helpful for attacks. Generally speaking, the following information can be collected:
Email, port number, operating system, running service, Traceroute or DNS information, firewall identification and escape, etc.
2) Introduction to NMAP
Nmap is a network connection end scanning software, used to scan the open network connection end of the computer on the Internet. Determine which services are running on which connections, and infer which operating system the computer is running (this is also known as fingerprinting). It is one of the necessary software for network administrators and is used to evaluate network system security.
3) NMAP script engine
The NMAP script engine is the most powerful and flexible feature of NMAP. It allows users to write simple scripts to automate various network tasks, basically these scripts are written in lua language. Usually NMAP script engine can do many things, such as:
4) Network discovery
This is the basic function of NMAP. Examples include finding the whois information of the target domain name, querying the ownership of the target ip on ARIN, RIPE, or APNIC, finding open ports, SNMP query and listing available NFS/SMB/RPC shares and services .
5) Vulnerability detection
When a new vulnerability is discovered, you want to quickly scan the network to identify vulnerable systems before intruders. Although NMAP is not a comprehensive vulnerability scanner, NSE is powerful enough to handle demanding vulnerability checks. Many vulnerable scripts are already available, and more scripts are planned.
6) Backdoor detection
Many attackers and some automated worms will leave back doors so that they can be re-entered later. Some of them can be detected by NMAP based on regular expressions.
7) Exploit
As a scripting language, NSE can even exploit vulnerabilities, not just find them. The ability to add custom attack scripts may be valuable to some people (especially penetration testers), but it is not intended to develop NMAP into something like the metasploit framework.
β β β Uππ»βΊπ«Δπ¬πβ β β β