Oke kali ini saya bakal ngebahas salah satu tools di terminal yaitu nmap. Tools tersebut biasanya digunakan buat memonitoring suatu IP tertentu untuk dicari kelemahannya. Biar cepet ini ada beberapa cara menggunakan nmap, selamat menikmati.
Melakukan Port Scanning pada sebuah host :
root@bufferdie:~# nmap -sS prima.net.id
Starting Nmap 4.76 ( http://nmap.org ) at 2009-06-12 19:03 WIT
Interesting ports on webhost.prima.net.id (202.57.0.19):
Not shown: 984 closed ports
PORT STATE SERVICE
1/tcp open tcpmux
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
53/tcp open domain
80/tcp open http
110/tcp open pop3
111/tcp open rpcbind
135/tcp filtered msrpc
143/tcp open imap
443/tcp open https
445/tcp filtered microsoft-ds
465/tcp open smtps
993/tcp open imaps
995/tcp open pop3s
3306/tcp open mysql
Nmap done: 1 IP address (1 host up) scanned in 9.09 seconds
Mengetahui OS yang digunakan pada host target :
root@bufferdie:~# nmap -O nusa.net.id
Starting Nmap 4.76 ( http://nmap.org ) at 2009-06-12 19:21 WIT
Interesting ports on asterix.mdn.nusa.net.id (202.162.192.230):
Not shown: 994 closed ports
PORT STATE SERVICE
80/tcp open http
135/tcp filtered msrpc
443/tcp open https
445/tcp filtered microsoft-ds
5222/tcp open unknown
5269/tcp open unknown
Device type: general purpose|firewall|router|WAP|specialized|printer
Running (JUST GUESSING) : Linux 2.4.X|2.6.X (91%), Secure Computing
Linux 2.4.X (90%), Enterasys embedded (90%), MikroTik RouterOS 3.X
(90%), Infoblox NIOS 4.X (90%), Lexmark embedded (89%), SonicWALL
embedded (88%)
Aggressive OS guesses: Linux 2.4.22 (Fedora Core 1, x86) (91%), Linux
2.4.31 (Slackware 10.2) (91%), Linux 2.6.11 (Auditor) (91%), Linux
2.6.21 (91%), Linux 2.6.24 – 2.6.25 (91%), Secure Computing SnapGear
SG560 firewall (Linux 2.4.31-uc0) (90%), Enterasys Matrix X router
(90%), Linux 2.6.9 – 2.6.19 (90%), MikroTik RouterOS software router
3.0beta5 (90%), OpenWrt 7.09 (Linux 2.6.22) (90%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 7 hops
OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.26 seconds
Menggunakan Fin Scan :
root@bufferdie:~# nmap -sF vip.net.id
Starting Nmap 4.76 ( http://nmap.org ) at 2009-06-12 19:40 WIT
All 1000 scanned ports on mail.vip.net.id (202.154.176.9) are closed (965) or open|filtered (35)
Nmap done: 1 IP address (1 host up) scanned in 10.87 seconds
Menggunakan SYN Stealth Scan :
root@bufferdie:~# nmap -PE main.telkomspeedy.com
Starting Nmap 4.76 ( http://nmap.org ) at 2009-06-12 19:45 WIT
Interesting ports on plasa2-acc.plasa.com (125.160.17.26):
Not shown: 997 closed ports
PORT STATE SERVICE
80/tcp open http
135/tcp filtered msrpc
445/tcp filtered microsoft-ds
Nmap done: 1 IP address (1 host up) scanned in 38.37 seconds
yupz seperti itulah kira-kira beberapa contoh cara penggunaan nmap, jika anda belum puas anda dapat membaca manual nya di nmap[dot][org] ataw dengan menggunakan perintah :
# man nmap
ataw bila anda ingin melihat opsi-opsi yang ada di dalam nmap anda bisa memanggil help nya dengan perintah :
# nmap -h
Tidak ada komentar:
Posting Komentar