ASIX/M16/UF2/EX3/3
< ASIX/M16/UF2 | EX3
Salta a la navegació
Salta a la cerca
Primer de tot, podem executar un nmap
a tota la xarxa de VirtualBox per a detectar quina adreça IP ha sigut assignada a la màquina que analitzarem
root@kali-gsb:~# nmap 10.16.2.0/24 Starting Nmap 7.70 ( https://nmap.org ) at 2019-03-17 12:21 CET Nmap scan report for 10.16.2.1 Host is up (0.00038s latency). Not shown: 999 closed ports PORT STATE SERVICE 53/tcp open domain MAC Address: 52:54:00:12:35:00 (QEMU virtual NIC) Nmap scan report for 10.16.2.2 Host is up (0.00064s latency). Not shown: 994 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 631/tcp open ipp 3306/tcp open mysql 8010/tcp open xmpp 8888/tcp open sun-answerbook MAC Address: 52:54:00:12:35:00 (QEMU virtual NIC) Nmap scan report for 10.16.2.3 Host is up (0.00043s latency). All 1000 scanned ports on 10.16.2.3 are filtered MAC Address: 08:00:27:1D:7B:F3 (Oracle VirtualBox virtual NIC) Nmap scan report for 10.16.2.9 Host is up (0.00038s latency). Not shown: 992 closed ports PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 53/tcp open domain 110/tcp open pop3 143/tcp open imap 389/tcp open ldap 993/tcp open imaps 995/tcp open pop3s MAC Address: 08:00:27:DB:66:F2 (Oracle VirtualBox virtual NIC) Nmap scan report for 10.16.2.11 Host is up (0.0000060s latency). Not shown: 999 closed ports PORT STATE SERVICE 22/tcp open ssh Nmap done: 256 IP addresses (5 hosts up) scanned in 2.38 seconds
Deduïm que la màquina d'enumeració és la que es troba a 10.16.2.9
ja que la resta no tenen serveis publicats o bé és el Kali mateix,