Hacking Playbook
Version vom 28. September 2022, 15:53 Uhr von Thomas.will (Diskussion | Beiträge) (→Wir finden eine Command Injection)
Scan des Netzes
- nmap -sP 10.0.5.0/24
Starting Nmap 7.91 ( https://nmap.org ) at 2022-09-28 17:40 CEST Nmap scan report for 10.0.5.1 Host is up (0.00047s latency). Nmap scan report for 10.0.5.12 Host is up (0.0010s latency). Nmap scan report for 10.0.5.21 Host is up (0.00085s latency). Nmap scan report for 10.0.5.22 Host is up (0.00098s latency). Nmap scan report for 10.0.5.104 Host is up (0.0014s latency). Nmap done: 256 IP addresses (5 hosts up) scanned in 3.78 seconds
Port Scan eines Rechners
nmap -sS 10.0.5.104 Starting Nmap 7.91 ( https://nmap.org ) at 2022-09-28 17:44 CEST Nmap scan report for 10.0.5.104 Host is up (0.0016s latency). Not shown: 991 filtered ports PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 53/tcp open domain 80/tcp open http 143/tcp open imap 443/tcp open https 465/tcp closed smtps 993/tcp open imaps 3128/tcp open squid-http Nmap done: 1 IP address (1 host up) scanned in 5.20 seconds



