issue145:tutoriel2
Différences
Ci-dessous, les différences entre deux révisions de la page.
Prochaine révision | Révision précédente | ||
issue145:tutoriel2 [2019/06/01 14:56] – créée auntiee | issue145:tutoriel2 [2019/06/11 11:41] (Version actuelle) – auntiee | ||
---|---|---|---|
Ligne 1: | Ligne 1: | ||
- | In issue FCM#144, we had a look at basic netcat. In this issue, we will take a deeper look at netcat. Josh, your wish is our command. Feel free to reach out to us on e-mail or Telegram if there is anything you would like to see more of in FCM. Also, feel free to make a donation to Patreon - https:// | + | **In issue FCM#144, we had a look at basic netcat. In this issue, we will take a deeper look at netcat. Josh, your wish is our command. Feel free to reach out to us on e-mail or Telegram if there is anything you would like to see more of in FCM. Also, feel free to make a donation to Patreon - https:// |
- | Port scan | + | Dans le numéro 144, nous avons regardé les bases de netcat. Dans ce numéro, nous allons pousser plus avant nos investigations sur netcat. Josh, vos désirs sont des ordres. N' |
+ | |||
+ | **Port scan | ||
We will be scanning http:// | We will be scanning http:// | ||
Ligne 15: | Ligne 17: | ||
nc -vz scanme.nmap.org ssh | nc -vz scanme.nmap.org ssh | ||
- | Like before, you can string multiple service ports together, but you will get results only from open ports. | + | Like before, you can string multiple service ports together, but you will get results only from open ports.** |
- | Banner grabbing. | + | Scan des ports |
+ | |||
+ | Nous scannerons http:// | ||
+ | |||
+ | nc -vz scanme.nmap.org 22 25 443 | ||
+ | |||
+ | Ceci scanne 3 ports habituels d'un coup (plus, si vous voudriez !). Vous pouvez revoir l' | ||
+ | |||
+ | nc -vz scanme.nmap.org 1-100 | ||
+ | |||
+ | Ce n'est pas la seule façon de scanner avec netcat. Vous pouvez scanner aussi par le nom du service. Dans le terminal, saisissez : | ||
+ | |||
+ | nc -vz scanme.nmap.org ssh | ||
+ | |||
+ | Comme précédemment, | ||
+ | |||
+ | **Banner grabbing. | ||
Port scanning is all well and good, for known ports; what about unknown ports? How do we figure out what services are running on those ports? That is where banner grabbing comes in. Banner grabbing nets you information on open ports on a computer. If you are a new administrator, | Port scanning is all well and good, for known ports; what about unknown ports? How do we figure out what services are running on those ports? That is where banner grabbing comes in. Banner grabbing nets you information on open ports on a computer. If you are a new administrator, | ||
- | If you look up the -v option in the man page, you see it is verbose. The -z option limits it slightly, so leaving it off will get the banner from that port printed to your terminal. Many times, you can guess the function of the port, as people are lazy and port 22 just gets remapped to port 2222. | + | If you look up the -v option in the man page, you see it is verbose. The -z option limits it slightly, so leaving it off will get the banner from that port printed to your terminal. Many times, you can guess the function of the port, as people are lazy and port 22 just gets remapped to port 2222. ** |
- | Why do you need to know this about your servers? Because this is how servers get hacked. As per Josh’s request, I will briefly try to explain how hackers use netcat to actually hack a server. The most common uses for netcat, when it comes to hacking, is setting up reverse and bind shells, piping and redirecting network traffic, port listening, and banner grabbing (which we have covered). Yes, all of this and more is possible with netcat! Once you see and understand how hackers compromise your systems, you can take preventative measures. | + | Prise de bannière |
+ | |||
+ | Le scan de ports, c'est bien beau... pour les ports connus ; mais quelle solution pour les ports inconnus ? Comment pouvons-nous découvrir les services qui tournent sur ces ports ? C'est là qu' | ||
+ | |||
+ | Si vous regardez l' | ||
+ | |||
+ | **Why do you need to know this about your servers? Because this is how servers get hacked. As per Josh’s request, I will briefly try to explain how hackers use netcat to actually hack a server. The most common uses for netcat, when it comes to hacking, is setting up reverse and bind shells, piping and redirecting network traffic, port listening, and banner grabbing (which we have covered). Yes, all of this and more is possible with netcat! Once you see and understand how hackers compromise your systems, you can take preventative measures. | ||
If you do not have a decent internet connection at home, or would prefer to follow along offline, you can download an insecure VM image and practice against that. I use the metasploit one, but you are welcome to use another. Here are a few: | If you do not have a decent internet connection at home, or would prefer to follow along offline, you can download an insecure VM image and practice against that. I use the metasploit one, but you are welcome to use another. Here are a few: | ||
https:// | https:// | ||
or | or | ||
- | https:// | + | https:// |
+ | |||
+ | Pourquoi connaître ces informations à propos de vos serveurs ? Parce que c'est comme ça que les serveurs sont piratés. À la demande de Josh, j' | ||
+ | |||
+ | Si vous n'avez pas de connexion décente à Internet à la maison, ou si vous préférez poursuivre hors connexion, vous pouvez télécharger une image non sûre d'une VM (machine virtuelle) et vous entraîner avec. J' | ||
+ | https:// | ||
+ | |||
+ | **Netcat is best used with other tools like nmap or metasploit, but since we will be focusing on netcat, I will break this information piece into three parts. Next issue we will look at creating backdoors and reverse shells. | ||
+ | |||
+ | AGAIN! I do not know what the laws in your country are, but do not scan outside your network as it may be illegal in your country or state. Yes, just simple port scans can be illegal. If in doubt, use the insecure virtual machine please. ** | ||
- | Netcat | + | Netcat |
- | AGAIN! I do not know what the laws in your country are, but do not scan outside your network as it may be illegal in your country or state. Yes, just simple | + | À NOUVEAU |
issue145/tutoriel2.1559393783.txt.gz · Dernière modification : 2019/06/01 14:56 de auntiee