Jumat, 30 September 2011

Using NMAP scan on Backtrack 5

Here are some really cool scanning techniques using Nmap

1) Get info about remote host ports and OS detection


nmap -sS -P0 -sV -O <target>



Where < target > may be a single IP, a hostname or a subnet

-sS TCP SYN scanning (also known as half-open, or stealth scanning)
-P0 option allows you to switch off ICMP pings.
-sV option enables version detection
-O flag attempt to identify the remote operating system Other option:
-A option enables both OS fingerprinting and version detection
-v use -v twice for more verbosity.


nmap -sS -P0 -A -v < target >

2) Get list of servers with a specific port open


nmap -sT -p 80 -oG – 192.168.1.* | grep open

Change the -p argument for the port number. See “man nmap” for different ways to specify address ranges.

Kamis, 07 Juli 2011

Playing TELNET on the Network

Yup, telnet is one of the facilities often use to meromote computers in a network through underdos (CMD),  But sometimes the telnet command fails to connect Bete often can you?,

Sure could aja dong, why does telnetnya configuration is activated or not, if not fair wrote baseball telnat command can be used.
Actually the command telnet command almost similar to Remote Desktop, only more exciting if telnet aka baseball caught when we did the takeover to a computer, if telnet can already do so automatically we used to control the computer in accordance with our wishes, for example:
Turning off computers that we do not want, or just for fun thieves telnet function data already active.
Instead of mild dizzy dizzy we practice yuk ... ... ... ... ... ..
The initial step we try to check the telnet configuration on our computers, how:
 Press the windows key + R (click Run - type CMD then click OK) until the appearance of Dos :




To check whether telnet function can be done or not we should first check what the computer wrote that road again, now typing the command:










In the above I try with several commands