projects:cybersecurity:methodology
General network scanning:
> sudo netdiscover Currently scanning: 172.16.6.0/16 | Screen View: Unique Hosts 6 Captured ARP Req/Rep packets, from 3 hosts. Total size: 360 _____________________________________________________________________________ IP At MAC Address Count Len MAC Vendor / Hostname ----------------------------------------------------------------------------- 192.168.23.1 00:50:56:c0:00:01 4 240 VMware, Inc. 192.168.23.128 00:0c:29:9d:12:a9 1 60 VMware, Inc. 192.168.23.254 00:50:56:f6:48:0c 1 60 VMware, Inc.
Using nmap:
> ifconfig eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 192.168.23.129 netmask 255.255.255.0 broadcast 192.168.23.255 inet6 fe80::20c:29ff:fe8c:e877 prefixlen 64 scopeid 0x20<link> ether 00:0c:29:8c:e8:77 txqueuelen 1000 (Ethernet) RX packets 1063 bytes 69860 (68.2 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 69340 bytes 4178714 (3.9 MiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536 inet 127.0.0.1 netmask 255.0.0.0 inet6 ::1 prefixlen 128 scopeid 0x10<host> loop txqueuelen 1000 (Local Loopback) RX packets 2814 bytes 171556 (167.5 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 2814 bytes 171556 (167.5 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 > nmap 192.168.23.1-255 Starting Nmap 7.92 ( https://nmap.org ) at 2022-06-29 00:48 EDT Nmap scan report for 192.168.23.128 Host is up (0.0025s latency). Not shown: 977 closed tcp ports (conn-refused) PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 25/tcp open smtp 80/tcp open http 110/tcp open pop3 111/tcp open rpcbind 139/tcp open netbios-ssn 143/tcp open imap 443/tcp open https 445/tcp open microsoft-ds 993/tcp open imaps 995/tcp open pop3s 3306/tcp open mysql 5801/tcp open vnc-http-1 5802/tcp open vnc-http-2 5901/tcp open vnc-1 5902/tcp open vnc-2 5903/tcp open vnc-3 5904/tcp open unknown 6001/tcp open X11:1 6002/tcp open X11:2 6003/tcp open X11:3 6004/tcp open X11:4 Nmap scan report for 192.168.23.129 Host is up (0.0013s latency). All 1000 scanned ports on 192.168.23.129 are in ignored states. Not shown: 1000 closed tcp ports (conn-refused) Nmap done: 255 IP addresses (2 hosts up) scanned in 22.76 seconds
projects/cybersecurity/methodology.txt · Last modified: 19 months ago ( 2 May 2023) by 127.0.0.1