该笔记为安全牛课堂学员笔记,想看此课程或者信息安全类干货可以移步到安全牛课堂


Security+认证为什么是互联网+时代最火爆的认证?


牛妹先给大家介绍一下Security+

Security+ 认证是一种中立第三方认证,其发证机构为美国计算机行业协会CompTIA ;是和CISSP、ITIL 等共同包含在内的国际 IT 业 10 大热门认证之一,和CISSP偏重信息安全管理相比,Security+ 认证更偏重信息安全技术和操作。

通过该认证证明了您具备网络安全,合规性和操作安全,威胁和漏洞,应用程序、数据和主机安全,访问控制和身份管理以及加密技术等方面的能力。因其考试难度不易,含金量较高,目前已被全球企业和安全专业人士所普遍采纳。

Security+认证如此火爆的原因?

原因一:在所有信息安全认证当中,偏重信息安全技术的认证是空白的, Security+认证正好可以弥补信息安全技术领域的空白 。

目前行业内受认可的信息安全认证主要有CISP和CISSP,但是无论CISP还是CISSP都是偏重信息安全管理的,技术知识讲的宽泛且浅显,考试都是一带而过。而且CISSP要求持证人员的信息安全工作经验都要5年以上,CISP也要求大专学历4年以上工作经验,这些要求无疑把有能力且上进的年轻人的持证之路堵住。在现实社会中,无论是找工作还是升职加薪,或是投标时候报人员,认证都是必不可少的,这给年轻人带来了很多不公平。而Security+的出现可以扫清这些年轻人职业发展中的障碍,由于Security+偏重信息安全技术,所以对工作经验没有特别的要求。只要你有IT相关背景,追求进步就可以学习和考试。

原因二: IT运维人员工作与翻身的利器。

在银行、证券、保险、信息通讯等行业,IT运维人员非常多,IT运维涉及的工作面也非常广。是一个集网络、系统、安全、应用架构、存储为一体的综合性技术岗。虽然没有程序猿们“生当做光棍,死亦写代码”的悲壮,但也有着“锄禾日当午,不如运维苦“的感慨。天天对着电脑和机器,时间长了难免有对于职业发展的迷茫和困惑。Security+国际认证的出现可以让有追求的IT运维人员学习网络安全知识,掌握网络安全实践。职业发展朝着网络安全的方向发展,解决国内信息安全人才的匮乏问题。另外,即使不转型,要做好运维工作,学习安全知识取得安全认证也是必不可少的。

原因三:接地气、国际范儿、考试方便、费用适中!

CompTIA作为全球ICT领域最具影响力的全球领先机构,在信息安全人才认证方面是专业、公平、公正的。Security+认证偏重操作且和一线工程师的日常工作息息相关。适合银行、证券、保险、互联网公司等IT相关人员学习。作为国际认证在全球147个国家受到广泛的认可。

        在目前的信息安全大潮之下,人才是信息安全发展的关键。而目前国内的信息安全人才是非常匮乏的,相信Security+认证一定会成为最火爆的信息安全认证。

 近期,安全牛课堂在做此类线上培训,感兴趣可以了解

操作系统识别

╋━━━━━━━━━━━━━━━╋

┃操作系统识别                  ┃

┃操作系统识别技术              ┃

┃  总类繁多                    ┃

┃  好产品采用多种技术组合      ┃

┃TTL起始值                     ┃

┃  Windows: 128 (65-----128)   ┃

┃  Linux/Unix: 60 (1-64)       ┃

┃  某些Unix: 255               ┃

╋━━━━━━━━━━━━━━━╋

╋━━━━━━━━━━━━━━━╋

┃操作系统识别                  ┃

┃python                        ┃

┃  from scapy.all import       ┃

┃  win="1.1.1.1"               ┃

┃  linu="1.1.1.2"              ┃

┃  aw=sr1(IP(dst=win)/ICMP())  ┃

┃  al=sr1(IP(dst=linu)/ICMP()) ┃

┃  if a[IP].ttl<=64            ┃

┃      print "host is Linux"   ┃

┃  else                        ┃

┃      print "host is windows" ┃

┃                              ┃

┃./ttl_os.py                   ┃

╋━━━━━━━━━━━━━━━╋

╭────────────────────────────────────────────╮

[ttl_os.py]

#!/usr/bin/python

from scapy.all import *

import loggging

logging.getLogger("scapy.runtime").setLevel(logging.ERROR)

import sys

if len(sys.argv)!=2:

print "Usage - ./ttl_os.py [IP Address]"

print "Example - ./ttl_os.py 10.0.0.5"

print "Example will perform ttl analysis to attempt to determine whether the system is windows or Linux"

sys.exit()

ip=sys.argv[1]

ans=sr1(IP(dst=str(ip))/ICMP(),timeout=1,verbose=0)

if ans == None:

print "No response was returned"

elif int(ans[IP].ttl)<=64:

print "Host is Linux/Unix"

else:

print "Host is Windows"

╰────────────────────────────────────────────╯

root@kali:~# chmod u+x ttl_os.py

root@kali:~# ./ttl_os.py 192.168.1.133

WARNING: No route found for IPv6 destination :: (no default route?)

Host is Windows

root@kali:~# ./ttl_os.py 192.168.1.134

WARNING: No route found for IPv6 destination :: (no default route?)

Host is Linux/Unix

root@kali:~# ./ttl_os.py 192.168.1.1

WARNING: No route found for IPv6 destination :: (no default route?)

Host is Linux/Unix

╋━━━━━━━━━━━━━━━╋

┃操作系统识别                  ┃

┃nmap使用多种技术识别操作系统  ┃

┃  nmap 1.1.1.1 -O             ┃

┃  系统服务特征                ┃

╋━━━━━━━━━━━━━━━╋

root@kali:~# nmap -O 192.138.1.133

Starting Nmap 6.49BETA5 ( https://nmap.org ) at 2015-10-05 01:24 CST

Nmap scan report for 192.138.1.133

Host is up (0.00073s latency).

PORT      STATE SERVICE

135/tcp   open  msrpc

139/tcp   open  netbios- ssn

445/tcp   open  microsoft-ds

3389/tcp  open  ms-wbt-server

MAC Address: 80:00:27:B0:3A:76(Cadmus Computer Systems)

Device type: general purpose

Running: Microsoft Windows XP

OS CPE: cpe:/o:microsoft:windows_xp::sp2 cpe:/o:microsoft:windows_xp::sp3

OS details: microsoft Windos XP SP2 or SP3

OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 7.47 seconds

root@kali:~# nmap -O 192.138.1.134

tarting Nmap 6.49BETA5 ( https://nmap.org ) at 2015-10-05 01:24 CST

Nmap scan report for 192.138.1.133

Host is up (0.00073s latency).

PORT     STATE SERVICE

21/tcp   open  ftp

22/tcp   open  ssh

23/tcp   open  telnet

25/tcp   open  smtb

53/tcp   open  domain

80/tcp   open  http

111/tcp  open  rpcbind

139/tcp  open  netbios-ssn

445/tcp  open  microsoft-ds

512/tcp  open  exec

513/tcp  open  login

514/tcp  open  shell

1099/tcp open  rmiregistry

1524/tcp open  ingreslock

2049/tcp open  nfs

2121/tcp open  ccproxy-ftp

3306/tcp open  mysql

5432/tcp open  postgresql

5900/tcp open  vnc

6000/tcp open  X11

6667/tcp open  irc

8009/tcp open  ajp13

8180/tcp open  unknown

MAC Address: 80:00:27:B0:3A:76(Cadmus Computer Systems)

Device type: general purpose

Running: Linux 2.6.X

OS CPE: cpe:/o: linux: linux_kernel:2.6

OS details: Linux 2.6.9 - 2.6.33

Network Distance: 1 hop

OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 7.47 seconds

root@kali:~# nmap -O 192.138.1.1

Starting Nmap 6.49BETA5 ( https://nmap.org ) at 2015-10-03 16:31 CST

Nmap scan report for 192.168.1.1

Host is up (0.00082s latency).

PORT     STATE SERVICE

80/tcp   open  http

1900/tcp open  upup

MAC Address: Do:C7:C0:99:ED:3A (Tp-link Technologies Co.)

Warning: OSScan results may be unrelibale because we coule not find at least 1 open and 1 closed port

Aggressive OS guesses: Canon p_w_picpathRUNNER C5185 printer (98%), VxWorks(94%), Can on p_w_picpathRUNNER C2380i pinter(93%), Fujitsu Externus DX80 or IBM DCS9900 NAS divie(93%), Avaya 4526GTX switch (92%), HP ProCurve 3500yl,5406zl, or 6200yl switch or UTStarcom F100 VoIP phone(89%), Nortel CS1000M VoIP PBX or Xerox Phaser 8560DT printer(88%)

No exact OS matches for host (test conditions non-ideal).

Network distance: 1 hop

OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 7.47 seconds

root@kali:~# xpro

xprobe2  xpro

root@kali:~# xprobe2 192.168.1.133              //专门识别操作系统的一个工具

Xprobe2:主动操作系统指纹工具

XProbe是一款远程主机操作系统探查工具。开发者基于和Nmap相同的一些技术(same techniques),并加入了自己的创新。Xprobe通过ICMP协议来获得指纹。最新版本是Xprobe2.0.3版本,Xprobe2通过模糊矩阵统计分析主动探测数据报对应的ICMP数据报特征,进而探测得到远端操作系统的类型。注:经过本人测试,对比较老的操作系统,识别效果非常高,对新内核系统则识别效果不太准确。

下载链接:html">http://www.2cto.com/Soft/201012/25526.html

安装步骤:

#tar -zxvf  xprobe2-0.3.tar.gz

#./configure --prefix=/usr/loca/

# make

#make install

用法:

#/usr/local/xprobe/bin/xprobe2 -h

Options:

-v                       Be verbose

-r                       Show route to target(traceroute)

-p Specify portnumber, protocol and state.

Example: tcp:23:open, UDP:53:CLOSED

-c           Specify config file to use.

-h                       Print this help.

-o                Use logfile to log everything.

-t             Set initial receive timeout or roundtrip time.

-s           Set packsending delay (milseconds).

-d              Specify debugging level.

-D               Disable module number .

-M               Enable module number .

-L                       Display modules.

-m         Specify number of matches to print.

-T             Enable TCP portscan for specified port(s).

Example: -T21-23,53,110

-U             Enable UDP portscan for specified port(s).

-f              force fixed round-trip time (-t opt).

-F          Generate signature (use -o to save to a file).

-X    Generate XML output and save it to logfile specified with -o.

-B   Options forces TCP handshake module to try to guess open TCP port

-A   Perform analysis of sample packets gathered during portscan in

order to detect suspicious traffic (i.e. transparent proxies,

firewalls/NIDSs resetting connections). Use with -T.

以上个选项,读者可自己去测试。本人给出一个简单的测试,假设当前目录在/usr/local/xprobe/bin/下

#./xprobe2 www.163.com

Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com,

meder@o0o.nu

[+] Target is www.163.com

[+] Loading modules.

[+] Following modules are loaded:

[x] [1] ping:icmp_ping  -  ICMP echo discovery module

[x] [2] ping:tcp_ping  -  TCP-based ping discovery module

[x] [3] ping:udp_ping  -  UDP-based ping discovery module

[x] [4] infogather:ttl_calc  -  TCP and UDP based TTL distance calculation

[x] [5] infogather:portscan  -  TCP and UDP PortScanner

[x] [6] fingerprint:icmp_echo  -  ICMP Echo request fingerprinting module

[x] [7] fingerprint:icmp_tstamp  -  ICMP Timestamp request fingerprinting module

[x] [8] fingerprint:icmp_amask  -  ICMP Address mask request fingerprinting module

[x] [9] fingerprint:icmp_port_unreach  -  ICMP port unreachable fingerprinting module

[x] [10] fingerprint:tcp_hshake  -  TCP Handshake fingerprinting module

[x] [11] fingerprint:tcp_rst  -  TCP RST fingerprinting module

[x] [12] fingerprint:smb  -  SMB fingerprinting module

[x] [13] fingerprint:snmp  -  SNMPv2c fingerprinting module

[+] 13 modules registered

[+] Initializing scan engine

[+] Running scan engine

[-] ping:tcp_ping module: no closed/open TCP ports known on 220.181.28.51.

Module test failed

[-] ping:udp_ping module: no closed/open UDP ports known on 220.181.28.51.

Module test failed

[-] No distance calculation. 220.181.28.51 appears to be dead or no ports known

[+] Host: 220.181.28.51 is up (Guess probability: 50%)

[+] Target: 220.181.28.51 is alive. Round-Trip Time: 0.02320 sec

[+] Selected safe Round-Trip Time value is: 0.04640 sec

[-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)

[-] fingerprint:smb need either TCP port 139 or 445 to run

[-] fingerprint:snmp: need UDP port 161 open

[+] Primary guess:

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.6" (Guess probability: 100%)

[+] Other guesses:

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.7" (Guess probability: 100%)

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.8" (Guess probability: 100%)

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.9" (Guess probability: 100%)

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.10" (Guess probability: 100%)

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.11" (Guess probability: 100%)

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.5" (Guess probability: 100%)

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.4" (Guess probability: 100%)

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.0" (Guess probability: 100%)

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.1" (Guess probability: 100%)

[+] Cleaning up scan engine

[+] Modules deinitialized

[+] Execution completed

╋━━━━━━━━━━━━━━━╋

┃操作系统识别                  ┃

┃被动操作系统识别              ┃

┃  IDS                         ┃

┃  抓包分析                    ┃

┃被动扫描                      ┃

┃p0f                           ┃

┃  结合ARP地址欺骗识别全网OS   ┃

╋━━━━━━━━━━━━━━━╋

root@kali:~# p0f

--- p0f 3.07b by Michal Zalewski <lcamtuf@coredump.cx> ---

[+] Closed 1 file descriptor.

[+] Loaded 320 signatures from 'p0f.fp'.

[+] Intercepting traffic on default interface 'eth0'.

[+] Default packet filtering configured [+VLAN].

[+] Entered main event loop.

.-[ 192.168.1.107/50093 -> 64.233.187.136/443 (syn) ]-

|

| client   = 192.168.1.107/50093

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/50093 -> 64.233.187.136/443 (mtu) ]-

|

| client   = 192.168.1.107/50093

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/50094 -> 64.233.187.136/443 (syn) ]-

|

| client   = 192.168.1.107/50094

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/50094 -> 64.233.187.136/443 (mtu) ]-

|

| client   = 192.168.1.107/50094

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/50094 -> 64.233.187.136/443 (uptime) ]-

|

| client   = 192.168.1.107/50094

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 250.00 Hz

|

`----

^C[!] WARNING: User-initiated shutdown.

All done. Processed 10 packets.

root@kali:~# p0f

--- p0f 3.07b by Michal Zalewski <lcamtuf@coredump.cx> ---

[+] Closed 1 file descriptor.

[+] Loaded 320 signatures from 'p0f.fp'.

[+] Intercepting traffic on default interface 'eth0'.

[+] Default packet filtering configured [+VLAN].

[+] Entered main event loop.

.-[ 192.168.1.107/54895 -> 180.97.33.107/80 (syn) ]-

|

| client   = 192.168.1.107/54895

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/54895 -> 180.97.33.107/80 (mtu) ]-

|

| client   = 192.168.1.107/54895

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/54895 -> 180.97.33.107/80 (syn+ack) ]-

|

| server   = 180.97.33.107/80

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/54895 -> 180.97.33.107/80 (mtu) ]-

|

| server   = 180.97.33.107/80

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/54895 -> 180.97.33.107/80 (http request) ]-

|

| client   = 192.168.1.107/54895

| app      = Firefox 10.x or newer

| lang     = English

| params   = none

| raw_sig  = 1:Host,User-Agent,Accept=[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8],Accept-Language=[en-US,en;q=0.5],Accept-Encoding=[gzip, deflate],?Cookie,Connection=[keep-alive]:Accept-Charset,Keep-Alive:Mozilla/5.0 (X11; Linux i686; rv:38.0) Gecko/20100101 Firefox/38.0 Iceweasel/38.3.0

|

`----

-[ 192.168.1.107/54895 -> 180.97.33.107/80 (http response) ]-

|

| server   = 180.97.33.107/80

| app      = ???

| lang     = none

| params   = none

| raw_sig  = 1:Date,Content-Type,?Content-Length,Connection=[Keep-Alive],?Location,Server,X-UA-Compatible=[IE=Edge,chrome=1],?Set-Cookie:Keep-Alive,Accept-Ranges:BWS/1.1

|

`----

.-[ 192.168.1.107/57542 -> 180.97.33.107/443 (syn) ]-

|

| client   = 192.168.1.107/57542

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57542 -> 180.97.33.107/443 (mtu) ]-

|

| client   = 192.168.1.107/57542

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/57542 -> 180.97.33.107/443 (uptime) ]-

|

| client   = 192.168.1.107/57542

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 258.62 Hz

|

`----

.-[ 192.168.1.107/57542 -> 180.97.33.107/443 (syn+ack) ]-

|

| server   = 180.97.33.107/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57542 -> 180.97.33.107/443 (mtu) ]-

|

| server   = 180.97.33.107/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/33274 -> 58.215.118.32/443 (syn) ]-

|

| client   = 192.168.1.107/33274

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/33274 -> 58.215.118.32/443 (mtu) ]-

|

| client   = 192.168.1.107/33274

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/33274 -> 58.215.118.32/443 (uptime) ]-

|

| client   = 192.168.1.107/33274

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 249.49 Hz

|

`----

.-[ 192.168.1.107/33274 -> 58.215.118.32/443 (syn+ack) ]-

|

| server   = 58.215.118.32/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/33274 -> 58.215.118.32/443 (mtu) ]-

|

| server   = 58.215.118.32/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/57544 -> 180.97.33.107/443 (syn) ]-

|

| client   = 192.168.1.107/57544

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57544 -> 180.97.33.107/443 (mtu) ]-

|

| client   = 192.168.1.107/57544

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/57544 -> 180.97.33.107/443 (uptime) ]-

|

| client   = 192.168.1.107/57544

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 252.34 Hz

|

`----

.-[ 192.168.1.107/57544 -> 180.97.33.107/443 (syn+ack) ]-

|

| server   = 180.97.33.107/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57544 -> 180.97.33.107/443 (mtu) ]-

|

| server   = 180.97.33.107/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/42700 -> 58.215.118.33/443 (syn) ]-

|

| client   = 192.168.1.107/42700

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42700 -> 58.215.118.33/443 (mtu) ]-

|

| client   = 192.168.1.107/42700

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/42700 -> 58.215.118.33/443 (uptime) ]-

|

| client   = 192.168.1.107/42700

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 233.33 Hz

|

`----

.-[ 192.168.1.107/42701 -> 58.215.118.33/443 (syn) ]-

|

| client   = 192.168.1.107/42701

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42701 -> 58.215.118.33/443 (mtu) ]-

|

| client   = 192.168.1.107/42701

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/42702 -> 58.215.118.33/443 (syn) ]-

|

| client   = 192.168.1.107/42702

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42702 -> 58.215.118.33/443 (mtu) ]-

|

| client   = 192.168.1.107/42702

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/42700 -> 58.215.118.33/443 (syn+ack) ]-

|

| server   = 58.215.118.33/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42700 -> 58.215.118.33/443 (mtu) ]-

|

| server   = 58.215.118.33/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/42702 -> 58.215.118.33/443 (syn+ack) ]-

|

| server   = 58.215.118.33/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42702 -> 58.215.118.33/443 (mtu) ]-

|

| server   = 58.215.118.33/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/42701 -> 58.215.118.33/443 (syn+ack) ]-

|

| server   = 58.215.118.33/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42701 -> 58.215.118.33/443 (mtu) ]-

|

| server   = 58.215.118.33/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/42703 -> 58.215.118.33/443 (syn) ]-

|

| client   = 192.168.1.107/42703

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42703 -> 58.215.118.33/443 (mtu) ]-

|

| client   = 192.168.1.107/42703

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/42703 -> 58.215.118.33/443 (syn+ack) ]-

|

| server   = 58.215.118.33/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42703 -> 58.215.118.33/443 (mtu) ]-

|

| server   = 58.215.118.33/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/42703 -> 58.215.118.33/443 (uptime) ]-

|

| client   = 192.168.1.107/42703

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 261.90 Hz

|

`----

.-[ 192.168.1.107/33280 -> 58.215.118.32/443 (syn) ]-

|

| client   = 192.168.1.107/33280

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/33280 -> 58.215.118.32/443 (mtu) ]-

|

| client   = 192.168.1.107/33280

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/33280 -> 58.215.118.32/443 (uptime) ]-

|

| client   = 192.168.1.107/33280

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 250.87 Hz

|

`----

.-[ 192.168.1.107/33281 -> 58.215.118.32/443 (syn) ]-

|

| client   = 192.168.1.107/33281

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/33281 -> 58.215.118.32/443 (mtu) ]-

|

| client   = 192.168.1.107/33281

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/33280 -> 58.215.118.32/443 (syn+ack) ]-

|

| server   = 58.215.118.32/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/33280 -> 58.215.118.32/443 (mtu) ]-

|

| server   = 58.215.118.32/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/33281 -> 58.215.118.32/443 (syn+ack) ]-

|

| server   = 58.215.118.32/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/33281 -> 58.215.118.32/443 (mtu) ]-

|

| server   = 58.215.118.32/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/57551 -> 180.97.33.107/443 (syn) ]-

|

| client   = 192.168.1.107/57551

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57551 -> 180.97.33.107/443 (mtu) ]-

|

| client   = 192.168.1.107/57551

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/57551 -> 180.97.33.107/443 (uptime) ]-

|

| client   = 192.168.1.107/57551

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 248.83 Hz

|

`----

.-[ 192.168.1.107/57551 -> 180.97.33.107/443 (syn+ack) ]-

|

| server   = 180.97.33.107/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57551 -> 180.97.33.107/443 (mtu) ]-

|

| server   = 180.97.33.107/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/38572 -> 180.97.33.108/443 (syn) ]-

|

| client   = 192.168.1.107/38572

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/38572 -> 180.97.33.108/443 (mtu) ]-

|

| client   = 192.168.1.107/38572

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/38572 -> 180.97.33.108/443 (uptime) ]-

|

| client   = 192.168.1.107/38572

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 247.93 Hz

|

`----

.-[ 192.168.1.107/38572 -> 180.97.33.108/443 (syn+ack) ]-

|

| server   = 180.97.33.108/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/38572 -> 180.97.33.108/443 (mtu) ]-

|

| server   = 180.97.33.108/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/50093 -> 64.233.187.136/443 (syn) ]-

|

| client   = 192.168.1.107/50093

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

----

.-[ 192.168.1.107/50093 -> 64.233.187.136/443 (mtu) ]-

|

| client   = 192.168.1.107/50093

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/50093 -> 64.233.187.136/443 (uptime) ]-

|

| client   = 192.168.1.107/50093

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 253.38 Hz

|

`----

.-[ 192.168.1.107/38573 -> 180.97.33.108/443 (syn) ]-

|

| client   = 192.168.1.107/38573

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/38573 -> 180.97.33.108/443 (mtu) ]-

|

| client   = 192.168.1.107/38573

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/38573 -> 180.97.33.108/443 (uptime) ]-

|

| client   = 192.168.1.107/38573

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 248.91 Hz

|

`----

.-[ 192.168.1.107/38573 -> 180.97.33.108/443 (syn+ack) ]-

|

| server   = 180.97.33.108/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/38573 -> 180.97.33.108/443 (mtu) ]-

|

| server   = 180.97.33.108/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/50094 -> 64.233.187.136/443 (syn) ]-

|

| client   = 192.168.1.107/50094

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/50094 -> 64.233.187.136/443 (mtu) ]-

|

| client   = 192.168.1.107/50094

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/50094 -> 64.233.187.136/443 (uptime) ]-

|

| client   = 192.168.1.107/50094

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 259.26 Hz

|

`----

.-[ 192.168.1.107/57554 -> 180.97.33.107/443 (syn) ]-

|

| client   = 192.168.1.107/57554

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57554 -> 180.97.33.107/443 (mtu) ]-

|

| client   = 192.168.1.107/57554

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/57554 -> 180.97.33.107/443 (uptime) ]-

|

| client   = 192.168.1.107/57554

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 245.76 Hz

|

`----

.-[ 192.168.1.107/57554 -> 180.97.33.107/443 (syn+ack) ]-

|

| server   = 180.97.33.107/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57554 -> 180.97.33.107/443 (mtu) ]-

|

| server   = 180.97.33.107/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

╋━━━━━━━━━━━━━━━━━━━━━━━━╋

┃SNMP                                            ┃

┃snmp                                            ┃

┃  信息的金矿                                    ┃

┃  经常被错误配置                                ┃

┃  public / prtvate / manager                    ┃

┃MIB Tree                                        ┃

┃  SNMP Management Informattion Base (MID)       ┃

┃  树形的网络设备管理功能数据库                  ┃

┃  1.3.6.1.4.1.77.1.2.25                         ┃

┃onesixtyone 1.1.1.1 public                      ┃

┃onesixtyone -c dict.txt -i hosts -o my.log -w 100┃

╋━━━━━━━━━━━━━━━━━━━━━━━━╋

简单网络管理协议(SNMP),由一组网络管理的标准组成,包含一个应用层协议(application layer protocol)、数据库模型(database schema)和一组资源对象。该协议能够支持网络管理系统,用以监测连接到网络上的设备是否有任何引起管理上关注的情况。该协议是互联网工程工作小组(IETF,Internet Engineering Task Force)定义的internet协议簇的一部分。SNMP的目标是管理互联网Internet上众多厂家生产的软硬件平台,因此SNMP受Internet标准网络管理框架的影响也很大。SNMP已经出到第三个版本的协议,其功能较以前已经大大地加强和改进了。

root@kali:~# onesixtyone

onesixtyone 0.3.2 [options] <host> <community>

-c <communityfile> file with community names to try

-i <inputfile>     file with target hosts

-o <outputfile>    output log

-d                 debug mode, use twice for more information

-w n               wait n milliseconds (1/1000 of a second) between sending packets (default 10)

-q                 quiet mode, do not print log to stdout, use with -l

examples: ./s -c dict.txt 192.168.4.1 public

./s -c dict.txt -i hosts -o my.log -w 100

root@kali:~# onesixtyone 192.168.1.133 pulic

Scanning 1 hosts, 1 communities

192.168.1.133 [public] Hardware: x86 Family 6 Model 42 Steping 7 AT/AT COMPATIBLE - Software: Windows 2000 Version 5.1(Bulid 2600 Uniprocessor Free)

root@kali:~# dpkg -L onesixtyone

/.

/usr

/usr/bin

/usr/bin/onesixtyone

/usr/share

/usr/share/man

/usr/share/man/man1

/usr/share/man/man1/onesixtyone.1.gz

/usr/share/doc

/usr/share/doc/onesixtyone

/usr/share/doc/onesixtyone/copyright

/usr/share/doc/onesixtyone/changelog.gz

/usr/share/doc/onesixtyone/dict.txt

/usr/share/doc/onesixtyone/README

/usr/share/doc/onesixtyone/changelog.Debian.gz

root@kali:~# onesixtyone -c /usr/share/doc/onesixtyone/dict.txt 192.168.1.133 -o my.log -w 100

Logging to file my.log

Scanning 1 hosts, 49 communities

root@kali:~# nmap -sU -p161 192.168.1.134

Starting Nmap 6.49BETA5 ( https://nmap.org ) at 2015-10-06 00:32 CST

Note is up(0.00105 latency).

PORT    STATE  SERVICE

161/udp closed snmp

MAC Address: 08:00:27:Bo:3A:76 (Cadmus Computer Systems)

Nmap done: 1 IP address (0 hosts up) scanned in 0.55 seconds

╋━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╋

┃SNMP扫描                                                  ┃

┃snmpwalk 192.168.20.199 -c public -v 2c                   ┃

┃用户                                                      ┃

┃    snmpwalk -c public -v 2c 1.1.1.1 1.3.6.1.4.1.77.1.2.25┃

┃snmpcheck -t 192.168.20.199                               ┃

┃snmpcheck  -t 192.168.20.199 -c private -v 2              ┃

┃snmpcheck  -t 192.168.20.199 -w                           ┃

╋━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╋

root@kali:~# snmpwalk 192.168.1.133 -c public -v 2c

root@kali:~# snmpwalk -c public -v 2c 192.168.1.133 1.3.6.1.4.1.77.1.2.25

root@kali:~# snmpwalk -c public -v 2c 192.168.1.133 1.3.6.1.2.1.25.6.3.1.2

root@kali:~# snmpcheck -h

Usage:  snmpcheck [-x] [-n|y] [-h] [-H] [-V NUM] [-L] [-f] [[-a] HOSTS]

-h Display this message.

-a check error log file AND hosts specified on command line.

-p Don't try and ping-echo the host first

-f Only check for things I can fix

HOSTS check these hosts for problems.

X Options:

-x forces ascii base if $DISPLAY set (instead of tk).

-H start in hidden mode.  (hides user interface)

-V NUM sets the initial verbosity level of the command log (def: 1)

-L Show the log window at startup

-d Don't start by checking anything.  Just bring up the interface.

Ascii Options:

-n Don't ever try and fix the problems found.  Just list.

-y Always fix problems found.

root@kali:~# snmpcheck -t 192.168.1.133

转载于:https://blog.51cto.com/11672938/1965387

​【安全牛学习笔记】操作系统识别相关推荐

  1. OpenGL超级宝典学习笔记——操作矩阵

    为了更强大的功能和灵活性,我们有时需要直接操作矩阵.在OpenGL中4x4的矩阵用包含16个浮点数值的一维数组来表示,而不是用二维的4x4的数组来表示.OpenGL之所以这么做,因为使用一维数组更高效 ...

  2. 【安全牛学习笔记】字典、在线密码破解-hydra

    字典 按个人信息生成其专属的密码字典 CUPP: Common User Password Profiler - git clone https://github.com/Mebus/cupp.git ...

  3. ​【安全牛学习笔记】WPS及其他工具WPS

    WPS及其他工具 root@kali:~# service network-manager stop root@kali:~# airmon-ng check kill Killing these p ...

  4. 【安全牛学习笔记】手动漏洞挖掘(三)

    手动漏洞挖掘 Directory travarsal / File include(有区别/没区别) 目录权限限制不严 / 文件包含 /etc/php5/cgi/php.ini allow_url_i ...

  5. 【安全牛学习笔记】其他途径

    其他途径 其他途径 社交网络 工商注册 新闻组/论坛 招聘网站 http://www.archive.org/web/web.php 个人专属的密码字典 按个人信息生成其专属的密码字典 CUPP--- ...

  6. 【安全牛学习笔记】SQLMAP自动注入-REQUEST

    SQLMAP自动注入-----REQUEST 数据段:   --data get/post都适用 sqlmap -u "http://1.1.1.1/a.php" --data=& ...

  7. 【安全牛学习笔记】SQLMAP- 自动注入

    课时92 SQLMAP- 自动注入 SQLMAP自动注入 开源sql注入漏洞检测.利用工具 检测动态页面中get/post参数.cookie.http头 数据榨取 文件系统访问 操作系统命令执行 引擎 ...

  8. 【安全牛学习笔记】拒绝服务***工具

    拒绝服务***工具 Nmap - grep dos /usr/share/nmap/scripts/script.db | cut -d "\"" -f 2 root@K ...

  9. 【安全牛学习笔记】kali TOP10 安全工具:

    kali TOP10 安全工具: burpsuite截断信息 maltego收集信息 metasploit framework***测试框架,有许多安全工具 nmap网络发现扫描器 owasp-zap ...

最新文章

  1. 【官网搭建】在网站首页底部添加备案号链接至工信部首页及版权所有。
  2. 学自动化必知:20个传感器原理及应用动图
  3. 【每日算法】桶排序算法
  4. 我这些年的项目管理心得...
  5. linux last 命令年份,【帝联运维课堂】(第七十二期)Linux下last命令如何显示年份...
  6. websecurity连接mysql_将MySQL连接器JAR放在我的WAR的WEB-INF / lib而不是tomcat lib中,使j_security_check失败...
  7. java date dateformat_java中Date与DateFormat的格式输出
  8. Java中的binarySearch方法
  9. CSS3最颠覆性的动画效果,基本属性[3D]
  10. 08-07 性能测试--性能监听平台
  11. php数组书写形式,php数组(array)输出的三种形式讲解
  12. 基于Zedboard和ov5642实现视频采集及VGA输出
  13. 高压输电线路线夹温度监测系统装置
  14. WES分析1-外显子测序
  15. java人机猜拳模块流程图_基于java实现人机猜拳游戏
  16. Calendar加減月份、年份-月底的处理逻辑
  17. 磕磕碰碰搭建Nginx实现接口映射
  18. 引流三十六招第十四招:蹭热门工具流量,日引上千精准粉
  19. 微信小程序播放音乐并同步一次显示一行歌词
  20. uniapp微信客服

热门文章

  1. 跨进程访问(AIDL服务)
  2. 简单分析几个常见的排序算法(C语言)
  3. python列表每行查找字符串,python - 用python查找子字符串列表成字符串列表 - SO中文参考 - www.soinside.com...
  4. android 从底部网上的平移动画_Android属性动画,看完这篇够用了吧
  5. python学习笔记(三)—— 序列类型及方法(列表、元组、字符串)
  6. php上传图片限制类型,php,_使用php的图片上传类进行图片上传,总是提示:上传文件时出错 : 未允许类型 。都是默认的配置,php - phpStudy...
  7. 如何解决线程安全的问题
  8. sparkstreaming监听hdfs目录如何终止_Spark笔试题:Spark Streaming 反压机制
  9. 【Python 小知识】[:-1] 和 [::-1]
  10. Puppeteer + TypeScript 模拟 Ctrl + A 操作