method_3_scanning
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
method_3_scanning [2022/11/25 01:16] – [OpenVAS] gman | method_3_scanning [2022/12/28 00:21] (current) – [Ports] gman | ||
---|---|---|---|
Line 84: | Line 84: | ||
===== Bash: Ping Sweep ===== | ===== Bash: Ping Sweep ===== | ||
+ | |||
+ | **One-liner: | ||
+ | |||
+ | < | ||
+ | for ip in 192.168.56.{101..110}; | ||
+ | </ | ||
Simple sweep of a network for a quick look at what machines are out there (and respond): | Simple sweep of a network for a quick look at what machines are out there (and respond): | ||
Line 96: | Line 102: | ||
</ | </ | ||
- | Note the "&" | + | Note the **"&" |
---- | ---- | ||
====== Port Scan Target IPs ====== | ====== Port Scan Target IPs ====== | ||
+ | |||
+ | ===== Ports ===== | ||
+ | |||
+ | Network ports are numbers assigned to specific services running on a computer. | ||
+ | * IP address are assigned to devices and they allow messages on the network to go to and from that specific device. | ||
+ | * Each device (with its unique IP address) will have several will have multiple port numbers assigned to specific services (small programs) running on that device (usually in the background). | ||
+ | * So IP addresses enable messages to go to and from specific devices. Port numbers allow targeting of specific services or applications within those devices. | ||
+ | * Port numbers are broken down into three main sections. | ||
+ | |||
+ | ^ Ports | ||
+ | | 0 - 65, | ||
+ | | 0 - 1023 | 1,024 | Well-Known (System) Ports | | ||
+ | | 1024 - 49, | ||
+ | | 49,152 - 65,535 | 16, | ||
+ | |||
+ | ^ Port | ||
+ | | 20 | ||
+ | | 21 | ||
+ | | 22 | ||
+ | | 23 | ||
+ | | 25 | ||
+ | | 53 | ||
+ | | 67 | ||
+ | | 68 | ||
+ | | 69 | ||
+ | | 80 | ||
+ | | 88 | ||
+ | | 110 | TCP & UDP | POP3 | | ||
+ | | 111 | TCP & UDP | NFS (possibly) | ||
+ | | 123 | TCP & UDP | NTP | | ||
+ | | 135 | TCP & UDP | MS-RPC EPMAP ((**Microsofts' | ||
+ | | 136-139 | ||
+ | | 137 | UDP | NetBios Name Service | ||
+ | | 138 | UDP | NetBios Datagram Service | ||
+ | | 139 | TCP | NetBios Session Service, **SMB** ((SMB orignally ran on top of NetBios using port 139. NetBios is an older Transport Layer that allows Windows computers to talk to each other on the same network. SMB currently runs (mostly) on port 445 (TCP, over the Internet).)) | | ||
+ | | 143 | TCP | IMAP | | ||
+ | | 161 | UDP | SNMP | | ||
+ | | 162 | TCP & UDP | SNMP Traps | | ||
+ | | 389 | TCP & UDP | LDAP ((**Lightweight Directory Access Protocol:** Open, vendor-neutral standard application protocol for accessing and maintaining distributed directory information services over an IP network.)) | | ||
+ | | 443 | TCP & UDP | HTTPS | | ||
+ | | 445 | TCP | Microsoft AD & **SMB** ((SMB used to run on port 139 (NetBios). Later versions of SMB (after Win2K) began to use port 445 on top of a TCP stack. Using TCP allows SMB to work over the Internet.)) | | ||
+ | | 500 | TCP & UDP | ISAKMP & IKE | | ||
+ | | 515 | TCP | LDP | | ||
+ | | 1433 | ||
+ | | 1434 | ||
+ | | 1521 | ||
+ | | 1812 & 1813 | TCP & UDP | RADIUS | ||
+ | | 2049 | ||
+ | | 3389 | ||
+ | | 5355 | ||
+ | |||
+ | ---- | ||
===== Nmap ===== | ===== Nmap ===== | ||
Line 213: | Line 271: | ||
===== OpenVAS ===== | ===== OpenVAS ===== | ||
+ | |||
+ | Once installed, run with: '' | ||
+ | |||
+ | **Note:** gvm stands for [[https:// | ||
To install OpenVAS on a Kali box: | To install OpenVAS on a Kali box: | ||
Line 220: | Line 282: | ||
apt install openvas openvas-scanner gvm gvmd -y | apt install openvas openvas-scanner gvm gvmd -y | ||
</ | </ | ||
- | |||
- | **Note:** gvm stands for Greenbone Vulnerability Management. It's just another name for OpenVAS. | ||
Once you get the above installed, run this and fix what it tells you to fix how it tells you to fix it: | Once you get the above installed, run this and fix what it tells you to fix how it tells you to fix it: | ||
Line 231: | Line 291: | ||
If you fix something, run the '' | If you fix something, run the '' | ||
+ | |||
+ | **Pay Attention to the Admin Password:** | ||
+ | * When you finish fixing all the crap in the '' | ||
+ | * Use this password to login as admin or else GVM will not work. | ||
+ | * It should look something like this: | ||
+ | |||
+ | < | ||
+ | [*] Please note the password for the admin user | ||
+ | [*] User created with password ' | ||
+ | </ | ||
**PostgreSQL Error:** If you get the following error (and the actual version numbers don't matter; you just have two and the script wants the latter but your system is configured to use the former): | **PostgreSQL Error:** If you get the following error (and the actual version numbers don't matter; you just have two and the script wants the latter but your system is configured to use the former): | ||
Line 268: | Line 338: | ||
chmod 666 / | chmod 666 / | ||
- | # The run your check again: | + | # Then run your check again: |
gvm-check-setup | gvm-check-setup | ||
# If that goes well, you may need to stop gvm: | # If that goes well, you may need to stop gvm: | ||
gvm-stop | gvm-stop | ||
- | |||
- | # And then start gvm, and everything should be fine: | ||
- | gvm-start | ||
</ | </ | ||
- | Once it's finished and happy and error free, you run OpenVAS with: | + | Once it' |
< | < |
method_3_scanning.1669339019.txt.gz · Last modified: by gman