Nmap-scripts-ssh
Version vom 26. Februar 2023, 13:14 Uhr von Thomas.will (Diskussion | Beiträge) (→Welche Cipher-Suits werden unterstützt)
Fingerprint der Hostkeys
- nmap --script ssh-hostkey 192.168.34.1
Starting Nmap 7.93 ( https://nmap.org ) at 2023-02-26 14:03 CET Nmap scan report for 192.168.34.1 Host is up (0.00016s latency). Not shown: 994 closed tcp ports (conn-refused) PORT STATE SERVICE 22/tcp open ssh | ssh-hostkey: | 3072 2dc39f82ece37728cbc7b16c4acc6e2e (RSA) | 256 7bbe487966c2e675dba74b535bbf34a1 (ECDSA) |_ 256 20efafc3c2991472086ba11c0c8f6cda (ED25519) 25/tcp open smtp 53/tcp open domain 80/tcp open http 143/tcp open imap 993/tcp open imaps Nmap done: 1 IP address (1 host up) scanned in 0.35 seconds
Welche Authentifizierungsmethoden werden unterstützt
- nmap --script ssh-auth-methods 192.168.34.1
Starting Nmap 7.93 ( https://nmap.org ) at 2023-02-26 14:08 CET Nmap scan report for 192.168.34.1 Host is up (0.0010s latency). Not shown: 994 closed tcp ports (conn-refused) PORT STATE SERVICE 22/tcp open ssh | ssh-auth-methods: | Supported authentication methods: | publickey |_ password 25/tcp open smtp 53/tcp open domain 80/tcp open http 143/tcp open imap 993/tcp open imaps Nmap done: 1 IP address (1 host up) scanned in 0.49 seconds
Welche Cipher-Suits werden unterstützt
- nmap --script ssh2-enum-algos 192.168.34.1
Starting Nmap 7.93 ( https://nmap.org ) at 2023-02-26 14:09 CET Nmap scan report for 192.168.34.1 Host is up (0.00015s latency). Not shown: 994 closed tcp ports (conn-refused) PORT STATE SERVICE 22/tcp open ssh | ssh2-enum-algos: | kex_algorithms: (9) | curve25519-sha256 | curve25519-sha256@libssh.org | ecdh-sha2-nistp256 | ecdh-sha2-nistp384 | ecdh-sha2-nistp521 | diffie-hellman-group-exchange-sha256 | diffie-hellman-group16-sha512 | diffie-hellman-group18-sha512 | diffie-hellman-group14-sha256 | server_host_key_algorithms: (5) | rsa-sha2-512 | rsa-sha2-256 | ssh-rsa | ecdsa-sha2-nistp256 | ssh-ed25519 | encryption_algorithms: (6) | chacha20-poly1305@openssh.com | aes128-ctr | aes192-ctr | aes256-ctr | aes128-gcm@openssh.com | aes256-gcm@openssh.com | mac_algorithms: (10) | umac-64-etm@openssh.com | umac-128-etm@openssh.com | hmac-sha2-256-etm@openssh.com | hmac-sha2-512-etm@openssh.com | hmac-sha1-etm@openssh.com | umac-64@openssh.com | umac-128@openssh.com | hmac-sha2-256 | hmac-sha2-512 | hmac-sha1 | compression_algorithms: (2) | none |_ zlib@openssh.com 25/tcp open smtp 53/tcp open domain 80/tcp open http 143/tcp open imap 993/tcp open imaps Nmap done: 1 IP address (1 host up) scanned in 0.42 seconds
ssh Bruteforce
- nmap --script ssh-brute 192.168.34.1
Starting Nmap 7.93 ( https://nmap.org ) at 2023-02-26 14:13 CET NSE: [ssh-brute] Trying username/password pair: root:root NSE: [ssh-brute] Trying username/password pair: admin:admin NSE: [ssh-brute] Trying username/password pair: administrator:administrator NSE: [ssh-brute] Trying username/password pair: webadmin:webadmin NSE: [ssh-brute] Trying username/password pair: sysadmin:sysadmin NSE: [ssh-brute] Trying username/password pair: netadmin:netadmin ...