ARP detection Netdiscover Port Scan Zenmap and dark search engine Shodan

Source: Internet
Author: User
Tags mac vendor net command kali linux

ARP detection Netdiscover Port Scan Zenmap and dark search engine Shodan
ARP detection Netdiscover Port Scan Zenmap and dark search engine ShodanARP detection tool -- NetdiscoverNetdiscover is an active/passive ARP detection tool in the penetration test tutorial of Kail Linux. This tool is useful in wireless networks that do not use DHCP. The Netdiscover tool can be used to scan IP addresses on the network, check online hosts or search for ARP requests sent for them. The following describes how to use the Netdiscover tool.
First, check the help information of the Netdiscover tool and execute the following command:

Root @ kali :~ # Netdiscover-h

Netdiscover 0.3-beta7 [Active/passive arp reconnaissance tool]

Written by: Jaime Penalba

Usage: netdiscover [-I device] [-r range |-l file |-p] [-s time] [-n node] [-c count] [-f] [-d] [-S] [-P] [-C]

-I device: your network device

-R range: scan a given range instead of auto scan. 192.168.6.0/24,/16,/8

-L file: scan the list of ranges contained into the given file

-P passive mode: do not send anything, only sniff

-F filter: Customize pcap filter expression (default: "arp ")

-S time: time to sleep between each arp request (miliseconds)

-N node: last ip octet used for scanning (from 2 to 253)

-C count: number of times to send each arp reques (for nets with packet loss)

-F enable fastmode scan, saves a lot of time, recommended for auto

-D ignore home config files for autoscan and fast mode

-S enable sleep time supression betwen each request (hardcore mode)

? -P print results in a format suitable for parsing by another program

-L in parsable output mode (-P), continue listening after the active scan is completed

If-r,-l or-p are not enabled, netdiscover will scan for common lan addresses.

The output information shows the syntax format and available parameters of Netdiscover.

[Instance 3-3] Use Netdiscover to scan all hosts in the LAN. Run the following command:

Root @ kali :~ # Netdiscover

After the preceding command is executed, the following information is displayed:

Currently scanning: 10.7.99.0/8 | Screen View: Unique Hosts

 

692 Captured ARP Req/Rep packets, from 3 hosts. Total size: 41520

_____________________________________________________________________________

IP At MAC Address Count Len MAC Vendor

Bytes -------------------------------------------------------------------------------------------------------------------------------

192.168.6.102 00: e0: 1c: 3c: 18: 79 296 17760 Cradlepoint, Inc

192.168.6.1 14: e6: e4: ac: fb: 20 387 23220 Unknown vendor

192.168.6.110 00: 0c: 29: 2e: 2b: 02 09 540 VMware, Inc.

The output information shows that three hosts are scanned.

Port scanner -- Zenmap

Zenmap (port scanner) is an open-source network detection and security audit tool. It is the front-end of the graphic interface of the Nmap security scanning tool. It supports cross-platform. The Zenmap tool can be used to quickly scan information of a large network or a single host. For example, scan hosts to provide services and operating systems. This section describes how to use the Zenmap tool.

[Instance 3-4] Use Zenmap to scan all hosts in the 192.168.6.0/24 network. The procedure is as follows:

(1) Start the Zenmap tool. On the Kali Linux desktop, select Application | Kali Linux | "Information Collection" | "DNS Analysis" | zenmap command. The page shown in 3.2 is displayed.

Figure 3.2 Zenmap startup page

Or execute the following command on the terminal:

Root @ kali :~ # Zenmap

(2) The Zenmap tool is divided into three parts. The first part is used to specify scan targets, commands, and descriptions. The second part is used to display scan hosts. The third part is used to display scan details. Enter 192.168.6.0/24 in the text box corresponding to Target, and click Scan to display the page shown in 3.3.

Figure 3.3 scan results

(3) you can see the details of all hosts in the network of 192.168.6.0/24. The active hosts in the network are displayed in the left column of Zenmap, And the Nmap output information is displayed in the right column. You can also click the switch tab to view the port number, topology, and details of each host. For example, check the port number/host of host 192.168.6.1, as shown in Figure 3.4.

Figure 3.4 host port number information

(4) port 80 and port 1900 are enabled on the host 192.168.6.1. If you want to view the Details of the Host, select the Host Details tab. The page shown in 3.5 is displayed.

Figure 3.5 host details

(5) You can view the host status, address, and operating system on this page.

Dark search engine tool-Shodan

Shodan is the most powerful search engine tool on the Internet. This tool does not search for URLs on the Internet, but directly searches for servers. Shodan can be said to be a "dark" Google, constantly looking for all servers, cameras, printers, routers and other Internet connections. Every month, information is collected on around 0.5 billion servers day and night. This section describes how to use the Shodan tool. The official Shodan website is www.shodanhq.com. Open the web page, as shown in Figure 3.6.

Figure 3.6 shodan Official Website

If you want to search for something, enter the search content in the text box corresponding to SHODAN. Then, click the Search button to start searching. For example, if you want to Search for a Cisco router, enter Cisco in the Search box and click the Search button. After the search result is found, the page 3.7 is displayed.

Figure 3.7 search results

You can see that the more than 3 million Cisco router is found in the world. On this page, you can click any IP address to find the device.

When using the Shodan search engine, you can use a filter to quickly query required items by narrowing the search scope. To find all IIS services running on IIS 8.0 in the United States, you can use the following search method, as shown in Figure 3.8.

Figure 3.8 search for IIS services

An IIS 8.0 server is displayed on this page. You can view the title information, country, host name, and text information about the server from the device you have searched.

When searching Shodan, pay attention to the syntax of some filter commands. Common situations are as follows:

1. CITY and COUNTRY commands

You can use the City and Country commands to narrow down the search location. For example:

Q country: US indicates searching from the United States.

Q city: Memphis indicates searching from the city of Memphis.

City and Country commands can also be used in combination. For example:

Q country: US city: Memphis

2. HOSTNAME command

The HOSTNAME command scans the entire domain name by specifying the host name.

Q hostname: google indicates searching for google hosts.

3. NET command

Use the NET command to scan a single IP address or a network range. As follows:

Q net: 192.168.1.10: Scan host 192.168.1.10.

Q net: 192.168.1.0/24: scan all hosts in the network of 192.168.1.0/24.

4. TITLE command

You can use the Title command to search for projects. As follows:

Q title: "Server Room" indicates searching Server Room information.

5. Keyword Search

Shodan is the most popular way to search with a keyword. If you know the server type or Embedded Server name used by the target system, it is easy to search for a Web page. As follows:

Q apache/2.2.8 200 OK: searches for all versions of 2.2.8 that are running the Apache service and only searches for open sites.

Q apache/2.2.8-401-302: indicates that the 401 illegal page or 302 Delete page is skipped.

6. Combined search

Q IIS/7.0 hostname: YourCompany.com city: Boston indicates searching all Microsoft servers running IIS/7.0 in Boston.

Q IIS/5.0 hostname: YourCompany.com country: FR indicates searching all systems running IIS/5.0 in France.

Q Title: camera hostname: YourCompany.com indicates that a host is named with information about camera.

Q geo: 33.5, 36.3 OS: Linux indicates that the Linux operating system is searched using the coordinate axis (longitude 33.5, latitude 36.3.

7. other search terms

Q Port: search by Port number.

Q OS: search by operating system.

Q After or Before: use the time search service.

[Instance 3-5] Use Metasploit to implement Shodan search. The procedure is as follows:

(1) register a free account on Shodanhq.com.

(2) obtain the API key from http://www.shodanhq.com/api_doc, as shown in page 3.9. Obtain the API key for later use.

Figure 3.9API key

(3) Start the PostgreSQL service. Run the following command:

Root @ kali :~ # Service postgresql start

(4) Start the Metasploit service. Run the following command:

Root @ kali :~ # Service metasploit start

(5) Start the MSF terminal and run the following command:

Root @ kali :~ # Msfconsole

Msf>

(6) Select the auxiliary/gather/shodan_search module and view the option parameters that can be configured in this module. Run the following command:

Msf> use auxiliary/gather/shodan_search

Msf auxiliary (shodan_search)> show options

Module options (auxiliary/gather/shodan_search ):

Name Current Setting Required Description

----------------------------------------------------------------------------------------------------------------------

DATABASE false no Add search results to the database

FILTER no Search for a specific IP/City/Country/Hostname

MAXPAGE 1 yes Max amount of pages to collect

OUTFILE no A filename to store the list of IPs

Proxies no Use a proxy chain

QUERY yes Keywords you want to search

SHODAN_APIKEY yes The shodan api key

VHOST www.shodanhq.com yes The virtual host name to use in requests

From the above output information, we can see that there are four required option parameters. Two options are configured, and QUERY and SHODAN_APIKEY are not configured.

(7) configure the QUERY and SHODAN_APIKEY option parameters. Run the following command:

Msf auxiliary (shodan_search)> set SHODAN_APIKEY duv9vwgcmo0odfw?wafax8sj0zua5bu

SHODAN_APIKEY => duv9vwgcmo0odfw?wafax8sj0zua5bu

Msf auxiliary (shodan_search)> set QUERY iomega

QUERY => iomega

From the output information, we can see that the QUERY and SHODAN_APIKEY options are successfully configured.

(8) start the search engine. Run the following command:

Msf auxiliary (shodan_search)> run

[*] Total: 160943 on 3219 pages. Showing: 1

[*] Country Statistics:

[*] United Kingdom (GB): 27408

[*] United States (US): 25648

[*] France (FR): 18397

[*] Germany (DE): 12918

[*] Netherlands (NL): 6189

[*] Collecting data, please wait...

IP Results

============

IP City Country Hostname

---------------------------------------------------------------------------

104.33.212.215: 80 N/A cpe-104-33-212-215.socal.res.rr.com

107.3.154.29: 80 Cupertino United States c-107-3-154-29.hsd1.ca.comcast.net

108.0.152134: 443 Thousand Oaks United States pool-108-0-152-164.lsanca.fios.verizon.net

108.20.167.210: 80 Maynard United States pool-108-20-167-210.bstnma.fios.verizon.net

108.20.213.253: 443 Franklin United States pool-108-20-213-253.bstnma.fios.verizon.net

109.156.24.235: 443 Sheffield United Kingdom host109-156-24-235.range109-156.btcentralplus.com

129.130.72.209: 443 Manhattan United States

130.39.112.9: 80 Baton Rouge United States lsf-museum.lsu.edu

146.52.252.157: 80 Leipzig Germany ip9234fc9d.dynamic.kabel-deutschland.de.

147.156.26.160: 80 Valencia Spain gpoeibak. optica. uv. es

......

94.224.87.80: 8080 Peutie Belgium 94-224-87-80.access.telenet.be

95.93.3.155: 80 Faro Portugal a95-93-3-155.cpe.netcaboNaN

96.232.103.131: 80 Brooklyn United States pool-96-232-103-131.nycmny.fios.verizon.net

96.233.79.small: 80 Woburn United States pool-96-233-79-133.bstnma.fios.verizon.net

96.240.130.179: 443 arington United States pool-96-240-130-179.washdc.fios.verizon.net

97.116.40.223: 443 minneapois United States 97-116-40-223.mpls.qwest.net

97.76.110.250: 80 Clearwater United States rrcs-97-76-110-250.se.biz.rr.com

98.225.213.167: 443 Warminster United States c-98-225-213-167.hsd1.pa.comcast.net

[*] Auxiliary module execution completed

The output information above shows all information that matches the iomega keyword. The search results show the IP address, city, country, and host name. If you want to use a filter keyword or get more response pages, you must purchase a paid APIkey.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.