Nmap (identificación del sistema operativo)
Si nosotros queremos explotar alguna vulnerabilidad, escalar privilegios, etc... Una de las cosas mas importantes es saber a que sistema operativo nos estamos enfrentando, de esta forma podemos utilizar una serie de tecnicas u otras, dependiendo del S.O.
sudo nmap -v -O 192.168.16.129Info:
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-11-11 04:41 EST
Initiating ARP Ping Scan at 04:41
Scanning 192.168.16.129 [1 port]
Completed ARP Ping Scan at 04:41, 0.03s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 04:41
Completed Parallel DNS resolution of 1 host. at 04:41, 13.00s elapsed
Initiating SYN Stealth Scan at 04:41
Scanning 192.168.16.129 [1000 ports]
Discovered open port 80/tcp on 192.168.16.129
Discovered open port 445/tcp on 192.168.16.129
Discovered open port 22/tcp on 192.168.16.129
Discovered open port 21/tcp on 192.168.16.129
Discovered open port 3306/tcp on 192.168.16.129
Discovered open port 8080/tcp on 192.168.16.129
Discovered open port 631/tcp on 192.168.16.129
Completed SYN Stealth Scan at 04:41, 4.07s elapsed (1000 total ports)
Initiating OS detection (try #1) against 192.168.16.129
Retrying OS detection (try #2) against 192.168.16.129
Nmap scan report for 192.168.16.129
Host is up (0.00037s latency).
Not shown: 991 filtered tcp ports (no-response)
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
80/tcp open http
445/tcp open microsoft-ds
631/tcp open ipp
3000/tcp closed ppp
3306/tcp open mysql
8080/tcp open http-proxy
8181/tcp closed intermapper
MAC Address: 00:0C:29:29:E7:FF (VMware)
Aggressive OS guesses: Linux 3.2 - 4.9 (98%), Linux 3.10 - 4.11 (94%), Linux 3.13 (94%), Linux 3.13 - 3.16 (94%), OpenWrt Chaos Calmer 15.05 (Linux 3.18) or Designated Driver (Linux 4.1 or 4.4) (94%), Linux 4.10 (94%), Android 5.0 - 6.0.1 (Linux 3.4) (94%), Linux 3.10 (94%), Linux 3.2 - 3.10 (94%), Linux 3.2 - 3.16 (94%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 0.055 days (since Mon Nov 11 03:22:55 2024)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=260 (Good luck!)
IP ID Sequence Generation: All zeros
Read data files from: /usr/bin/../share/nmap
OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 20.81 seconds
Raw packets sent: 2042 (93.156KB) | Rcvd: 36 (2.204KB)Nos esta inidicando que esta maquina, tiene un sistema operativo Linux:
Y con una de windows tambien funciona:
En esta otra maquina nos detecta que es de windows.
Last updated