Senin, 30 Maret 2015

Tugas Komdat Prak 7

Oke kali ini saya bakal ngebahas salah satu tools di terminal yaitu nmap. Tools tersebut biasanya digunakan buat memonitoring suatu IP tertentu untuk dicari kelemahannya. Biar cepet ini ada beberapa cara menggunakan nmap, selamat menikmati.

Melakukan Port Scanning pada sebuah host :
root@bufferdie:~# nmap -sS prima.net.id
Starting Nmap 4.76 ( http://nmap.org ) at 2009-06-12 19:03 WIT
Interesting ports on webhost.prima.net.id (202.57.0.19):
Not shown: 984 closed ports
PORT     STATE    SERVICE
1/tcp    open     tcpmux
21/tcp   open     ftp
22/tcp   open     ssh
25/tcp   open     smtp
53/tcp   open     domain
80/tcp   open     http
110/tcp  open     pop3
111/tcp  open     rpcbind
135/tcp  filtered msrpc
143/tcp  open     imap
443/tcp  open     https
445/tcp  filtered microsoft-ds
465/tcp  open     smtps
993/tcp  open     imaps
995/tcp  open     pop3s
3306/tcp open     mysql
Nmap done: 1 IP address (1 host up) scanned in 9.09 seconds

Mengetahui OS yang digunakan pada host target :
root@bufferdie:~# nmap -O nusa.net.id
Starting Nmap 4.76 ( http://nmap.org ) at 2009-06-12 19:21 WIT
Interesting ports on asterix.mdn.nusa.net.id (202.162.192.230):
Not shown: 994 closed ports
PORT     STATE    SERVICE
80/tcp   open     http
135/tcp  filtered msrpc
443/tcp  open     https
445/tcp  filtered microsoft-ds
5222/tcp open     unknown
5269/tcp open     unknown
Device type: general purpose|firewall|router|WAP|specialized|printer
Running (JUST GUESSING) : Linux 2.4.X|2.6.X (91%), Secure Computing Linux 2.4.X (90%), Enterasys embedded (90%), MikroTik RouterOS 3.X (90%), Infoblox NIOS 4.X (90%), Lexmark embedded (89%), SonicWALL embedded (88%)
Aggressive OS guesses: Linux 2.4.22 (Fedora Core 1, x86) (91%), Linux 2.4.31 (Slackware 10.2) (91%), Linux 2.6.11 (Auditor) (91%), Linux 2.6.21 (91%), Linux 2.6.24 – 2.6.25 (91%), Secure Computing SnapGear SG560 firewall (Linux 2.4.31-uc0) (90%), Enterasys Matrix X router (90%), Linux 2.6.9 – 2.6.19 (90%), MikroTik RouterOS software router 3.0beta5 (90%), OpenWrt 7.09 (Linux 2.6.22) (90%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 7 hops
OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.26 seconds

Menggunakan Fin Scan :
root@bufferdie:~# nmap -sF vip.net.id
Starting Nmap 4.76 ( http://nmap.org ) at 2009-06-12 19:40 WIT
All 1000 scanned ports on mail.vip.net.id (202.154.176.9) are closed (965) or open|filtered (35)
Nmap done: 1 IP address (1 host up) scanned in 10.87 seconds

Menggunakan SYN Stealth Scan :
root@bufferdie:~# nmap -PE main.telkomspeedy.com
Starting Nmap 4.76 ( http://nmap.org ) at 2009-06-12 19:45 WIT
Interesting ports on plasa2-acc.plasa.com (125.160.17.26):
Not shown: 997 closed ports
PORT    STATE    SERVICE
80/tcp  open     http
135/tcp filtered msrpc
445/tcp filtered microsoft-ds
Nmap done: 1 IP address (1 host up) scanned in 38.37 seconds
yupz seperti itulah kira-kira beberapa contoh cara penggunaan nmap, jika anda belum puas anda dapat membaca manual nya di nmap[dot][org] ataw dengan menggunakan perintah :
# man nmap
ataw bila anda ingin melihat opsi-opsi yang ada di dalam nmap anda bisa memanggil help nya dengan perintah :
# nmap -h