ASIX/M16/UF2/EX3/3

De Lordwektabyte Wiki
Salta a la navegació Salta a la cerca

Primer de tot, podem executar un nmap a tota la xarxa de VirtualBox per a detectar quina adreça IP ha sigut assignada a la màquina que analitzarem

root@kali-gsb:~# nmap 10.16.2.0/24
Starting Nmap 7.70 ( https://nmap.org ) at 2019-03-17 12:21 CET
Nmap scan report for 10.16.2.1
Host is up (0.00038s latency).
Not shown: 999 closed ports
PORT   STATE SERVICE
53/tcp open  domain
MAC Address: 52:54:00:12:35:00 (QEMU virtual NIC)

Nmap scan report for 10.16.2.2
Host is up (0.00064s latency).
Not shown: 994 closed ports
PORT     STATE SERVICE
22/tcp   open  ssh
80/tcp   open  http
631/tcp  open  ipp
3306/tcp open  mysql
8010/tcp open  xmpp
8888/tcp open  sun-answerbook
MAC Address: 52:54:00:12:35:00 (QEMU virtual NIC)

Nmap scan report for 10.16.2.3
Host is up (0.00043s latency).
All 1000 scanned ports on 10.16.2.3 are filtered
MAC Address: 08:00:27:1D:7B:F3 (Oracle VirtualBox virtual NIC)

Nmap scan report for 10.16.2.9
Host is up (0.00038s latency).
Not shown: 992 closed ports
PORT    STATE SERVICE
22/tcp  open  ssh
25/tcp  open  smtp
53/tcp  open  domain
110/tcp open  pop3
143/tcp open  imap
389/tcp open  ldap
993/tcp open  imaps
995/tcp open  pop3s
MAC Address: 08:00:27:DB:66:F2 (Oracle VirtualBox virtual NIC)

Nmap scan report for 10.16.2.11
Host is up (0.0000060s latency).
Not shown: 999 closed ports
PORT   STATE SERVICE
22/tcp open  ssh

Nmap done: 256 IP addresses (5 hosts up) scanned in 2.38 seconds

Deduïm que la màquina d'enumeració és la que es troba a 10.16.2.9 ja que la resta no tenen serveis publicats o bé és el Kali mateix,