The gMan nixWiki

Because the mind is made of Teflon...

User Tools

Site Tools


hack_postconnect_infogathering

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
hack_postconnect_infogathering [2020/05/31 17:30] – [NetDiscover] gmanhack_postconnect_infogathering [2020/05/31 17:50] (current) gman
Line 1: Line 1:
-====== Intro ======+====== Info Gathering ======
  
-**Post-Connection Attacks:** After you connect to a newtork...  +**Post-Connection Attacks:** After you connect to a newtork... the first thing you will likely want to do is know what is out thereInfo gathering. Recon
-  * Download a practice VM: [[https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/|Win10]] +  * Find out what is attached to the network: IP, MAC, OS, Ports, Services..
-  * Make sure to create and use a snapshot of that VM so you can reset by creating a new snapshot from the original VM when the time runs out.+
  
-**Info Gathering:** Find out what is attached to the network: IP, MAC, OS, Ports, Services..+If you need a practice machine, download a free VM[[https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/|Win10]] 
 +  Make sure to create and use a snapshot of that VM so you can reset by creating a new snapshot from the original VM when the time runs out.
  
 **Tools:** Tools: netdiscover (simple) and nmap (more detailed) **Tools:** Tools: netdiscover (simple) and nmap (more detailed)
Line 12: Line 12:
 ---- ----
  
-====== NetDiscover ======+===== NetDiscover =====
  
 **netdiscover:** quickly discover all devices connected to our network... **netdiscover:** quickly discover all devices connected to our network...
Line 24: Line 24:
  
 ---- ----
-====== ZenMap ======+===== ZenMap =====
  
 +ZenMap is a GUI frontend for Nmap. 
  
-====== Nmap ======+**Run:** ``zenmap`` 
 +  * __Target__: 192.168.1.1/24  (to specify the entire subnet as the range) 
 +  * __Command__: shows you the nmap command that will be excuted when you click "Scan" 
 +  * __Profile__: Several differnt nmap scan set-ups to choose from... 
 +    * __Ping scan__: very quick & simple (pings every possible IP in the range, similar to netdiscover but more info) 
 +    * __Quick scan__: Ping + Open Ports on discovered devices 
 +    * __Quick scan plus__: slower but shows more info (o/s, device type, program and program version running on discovered ports) 
 + 
 +**Installation Instructions:** Zenmap is not being maintained upstream any longer therefore Kali dropped the package. Therefore, do the following... 
 + 
 +1. [[https://nmap.org/download.html|Download the rpm]] labeled "Optional Zenmap GUI (all platforms)" 
 + 
 +2. If you haven't already, install Alien: 
 + 
 +<code>apt install alien dpkg-dev debhelper build-essential<\code> 
 + 
 +3. Convert the rpm to debian format: 
 + 
 +<code>alien packagename.rpm</code> 
 + 
 +4. Use dpkg to install the shiny new .deb package: 
 + 
 +<code>dpkg -i packagename.deb</code> 
 + 
 + 
 +---- 
 + 
 +===== Nmap ===== 
 + 
 +This is the mother of all tools... Buy and read [[https://www.amazon.com/Nmap-Network-Scanning-Official-Discovery/dp/0979958717/ref=sr_1_3|The Book]]. 
 + 
 +----
hack_postconnect_infogathering.1590946208.txt.gz · Last modified: by gman