Monday, August 17, 2020

Namp迴避掉IDS(入侵偵測系統)的篩選

# [Inverse TCP Flag] 利用TCP機制中:當封包為含有SYN, RST, 或 ACK標頭時,會直接回傳

RST # 這個方式一度非常有效的迴避掉IDS(入侵偵測系統)的篩選

# -- 

# Null Scan := TCP 標頭沒有任何值為 1 


kali@kali:~/Desktop/class2$ sudo nmap -sN 192.168.92.129

[sudo] password for kali: 

Starting Nmap 7.80 ( https://nmap.org ) at 2020-08-17 08:26 EDT

Nmap scan report for 192.168.92.129

Host is up (0.0038s latency).

Not shown: 977 closed ports

PORT     STATE         SERVICE

21/tcp   open|filtered ftp

22/tcp   open|filtered ssh

23/tcp   open|filtered telnet

25/tcp   open|filtered smtp

53/tcp   open|filtered domain

80/tcp   open|filtered http

111/tcp  open|filtered rpcbind

139/tcp  open|filtered netbios-ssn

445/tcp  open|filtered microsoft-ds

512/tcp  open|filtered exec

513/tcp  open|filtered login

514/tcp  open|filtered shell

1099/tcp open|filtered rmiregistry

1524/tcp open|filtered ingreslock

2049/tcp open|filtered nfs

2121/tcp open|filtered ccproxy-ftp

3306/tcp open|filtered mysql

5432/tcp open|filtered postgresql

5900/tcp open|filtered vnc

6000/tcp open|filtered X11

6667/tcp open|filtered irc

8009/tcp open|filtered ajp13

8180/tcp open|filtered unknown

MAC Address: 00:0C:29:D9:F1:65 (VMware)


Nmap done: 1 IP address (1 host up) scanned in 1.52 seconds


No comments:

Post a Comment

n8n index

 【n8n免費本地端部署】Windows版|程式安裝x指令大補帖  【一鍵安裝 n8n】圖文教學,獲得無限額度自動化工具&限時免費升級企業版功能