Repository

Looks good to me!

User Tools

Site Tools


projects:cybersecurity:methodology

General network scanning:

> sudo netdiscover

 Currently scanning: 172.16.6.0/16   |   Screen View: Unique Hosts          
                                                                            
 6 Captured ARP Req/Rep packets, from 3 hosts.   Total size: 360            
 _____________________________________________________________________________
   IP            At MAC Address     Count     Len  MAC Vendor / Hostname      
 -----------------------------------------------------------------------------
 192.168.23.1    00:50:56:c0:00:01      4     240  VMware, Inc.             
 192.168.23.128  00:0c:29:9d:12:a9      1      60  VMware, Inc.             
 192.168.23.254  00:50:56:f6:48:0c      1      60  VMware, Inc.    

Using nmap:

> ifconfig

eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.23.129  netmask 255.255.255.0  broadcast 192.168.23.255
        inet6 fe80::20c:29ff:fe8c:e877  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:8c:e8:77  txqueuelen 1000  (Ethernet)
        RX packets 1063  bytes 69860 (68.2 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 69340  bytes 4178714 (3.9 MiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 2814  bytes 171556 (167.5 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 2814  bytes 171556 (167.5 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

> nmap 192.168.23.1-255

Starting Nmap 7.92 ( https://nmap.org ) at 2022-06-29 00:48 EDT
Nmap scan report for 192.168.23.128
Host is up (0.0025s latency).
Not shown: 977 closed tcp ports (conn-refused)
PORT     STATE SERVICE
21/tcp   open  ftp
22/tcp   open  ssh
25/tcp   open  smtp
80/tcp   open  http
110/tcp  open  pop3
111/tcp  open  rpcbind
139/tcp  open  netbios-ssn
143/tcp  open  imap
443/tcp  open  https
445/tcp  open  microsoft-ds
993/tcp  open  imaps
995/tcp  open  pop3s
3306/tcp open  mysql
5801/tcp open  vnc-http-1
5802/tcp open  vnc-http-2
5901/tcp open  vnc-1
5902/tcp open  vnc-2
5903/tcp open  vnc-3
5904/tcp open  unknown
6001/tcp open  X11:1
6002/tcp open  X11:2
6003/tcp open  X11:3
6004/tcp open  X11:4

Nmap scan report for 192.168.23.129
Host is up (0.0013s latency).
All 1000 scanned ports on 192.168.23.129 are in ignored states.
Not shown: 1000 closed tcp ports (conn-refused)

Nmap done: 255 IP addresses (2 hosts up) scanned in 22.76 seconds
projects/cybersecurity/methodology.txt · Last modified: 19 months ago ( 2 May 2023) by 127.0.0.1