​【安全牛学习笔记】操作系统识别

该笔记为安全牛课堂学员笔记,想看此课程或者信息安全类干货可以移步到安全牛课堂


Security+认证为什么是互联网+时代最火爆的认证?


牛妹先给大家介绍一下Security+

Security+ 认证是一种中立第三方认证,其发证机构为美国计算机行业协会CompTIA ;是和CISSP、ITIL 等共同包含在内的国际 IT 业 10 大热门认证之一,和CISSP偏重信息安全管理相比,Security+ 认证更偏重信息安全技术和操作。

通过该认证证明了您具备网络安全,合规性和操作安全,威胁和漏洞,应用程序、数据和主机安全,访问控制和身份管理以及加密技术等方面的能力。因其考试难度不易,含金量较高,目前已被全球企业和安全专业人士所普遍采纳。

Security+认证如此火爆的原因?

原因一:在所有信息安全认证当中,偏重信息安全技术的认证是空白的, Security+认证正好可以弥补信息安全技术领域的空白 。

目前行业内受认可的信息安全认证主要有CISP和CISSP,但是无论CISP还是CISSP都是偏重信息安全管理的,技术知识讲的宽泛且浅显,考试都是一带而过。而且CISSP要求持证人员的信息安全工作经验都要5年以上,CISP也要求大专学历4年以上工作经验,这些要求无疑把有能力且上进的年轻人的持证之路堵住。在现实社会中,无论是找工作还是升职加薪,或是投标时候报人员,认证都是必不可少的,这给年轻人带来了很多不公平。而Security+的出现可以扫清这些年轻人职业发展中的障碍,由于Security+偏重信息安全技术,所以对工作经验没有特别的要求。只要你有IT相关背景,追求进步就可以学习和考试。

原因二: IT运维人员工作与翻身的利器。

在银行、证券、保险、信息通讯等行业,IT运维人员非常多,IT运维涉及的工作面也非常广。是一个集网络、系统、安全、应用架构、存储为一体的综合性技术岗。虽然没有程序猿们“生当做光棍,死亦写代码”的悲壮,但也有着“锄禾日当午,不如运维苦“的感慨。天天对着电脑和机器,时间长了难免有对于职业发展的迷茫和困惑。Security+国际认证的出现可以让有追求的IT运维人员学习网络安全知识,掌握网络安全实践。职业发展朝着网络安全的方向发展,解决国内信息安全人才的匮乏问题。另外,即使不转型,要做好运维工作,学习安全知识取得安全认证也是必不可少的。

原因三:接地气、国际范儿、考试方便、费用适中!

CompTIA作为全球ICT领域最具影响力的全球领先机构,在信息安全人才认证方面是专业、公平、公正的。Security+认证偏重操作且和一线工程师的日常工作息息相关。适合银行、证券、保险、互联网公司等IT相关人员学习。作为国际认证在全球147个国家受到广泛的认可。

        在目前的信息安全大潮之下,人才是信息安全发展的关键。而目前国内的信息安全人才是非常匮乏的,相信Security+认证一定会成为最火爆的信息安全认证。

 近期,安全牛课堂在做此类线上培训,感兴趣可以了解

操作系统识别

╋━━━━━━━━━━━━━━━╋

┃操作系统识别                  ┃

┃操作系统识别技术              ┃

┃  总类繁多                    ┃

┃  好产品采用多种技术组合      ┃

┃TTL起始值                     ┃

┃  Windows: 128 (65-----128)   ┃

┃  Linux/Unix: 60 (1-64)       ┃

┃  某些Unix: 255               ┃

╋━━━━━━━━━━━━━━━╋

╋━━━━━━━━━━━━━━━╋

┃操作系统识别                  ┃

┃python                        ┃

┃  from scapy.all import       ┃

┃  win="1.1.1.1"               ┃

┃  linu="1.1.1.2"              ┃

┃  aw=sr1(IP(dst=win)/ICMP())  ┃

┃  al=sr1(IP(dst=linu)/ICMP()) ┃

┃  if a[IP].ttl<=64            ┃

┃      print "host is Linux"   ┃

┃  else                        ┃

┃      print "host is windows" ┃

┃                              ┃

┃./ttl_os.py                   ┃

╋━━━━━━━━━━━━━━━╋

╭────────────────────────────────────────────╮

[ttl_os.py]

#!/usr/bin/python

from scapy.all import *

import loggging

logging.getLogger("scapy.runtime").setLevel(logging.ERROR)

import sys

if len(sys.argv)!=2:

print "Usage - ./ttl_os.py [IP Address]"

print "Example - ./ttl_os.py 10.0.0.5"

print "Example will perform ttl analysis to attempt to determine whether the system is windows or Linux"

sys.exit()

ip=sys.argv[1]

ans=sr1(IP(dst=str(ip))/ICMP(),timeout=1,verbose=0)

if ans == None:

print "No response was returned"

elif int(ans[IP].ttl)<=64:

print "Host is Linux/Unix"

else:

print "Host is Windows"

╰────────────────────────────────────────────╯

[email protected]:~# chmod u+x ttl_os.py

[email protected]:~# ./ttl_os.py 192.168.1.133

WARNING: No route found for IPv6 destination :: (no default route?)

Host is Windows

[email protected]:~# ./ttl_os.py 192.168.1.134

WARNING: No route found for IPv6 destination :: (no default route?)

Host is Linux/Unix

[email protected]:~# ./ttl_os.py 192.168.1.1

WARNING: No route found for IPv6 destination :: (no default route?)

Host is Linux/Unix

╋━━━━━━━━━━━━━━━╋

┃操作系统识别                  ┃

┃nmap使用多种技术识别操作系统  ┃

┃  nmap 1.1.1.1 -O             ┃

┃  系统服务特征                ┃

╋━━━━━━━━━━━━━━━╋

[email protected]:~# nmap -O 192.138.1.133

Starting Nmap 6.49BETA5 ( https://nmap.org ) at 2015-10-05 01:24 CST

Nmap scan report for 192.138.1.133

Host is up (0.00073s latency).

PORT      STATE SERVICE

135/tcp   open  msrpc

139/tcp   open  netbios- ssn

445/tcp   open  microsoft-ds

3389/tcp  open  ms-wbt-server

MAC Address: 80:00:27:B0:3A:76(Cadmus Computer Systems)

Device type: general purpose

Running: Microsoft Windows XP

OS CPE: cpe:/o:microsoft:windows_xp::sp2 cpe:/o:microsoft:windows_xp::sp3

OS details: microsoft Windos XP SP2 or SP3

OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 7.47 seconds

[email protected]:~# nmap -O 192.138.1.134

tarting Nmap 6.49BETA5 ( https://nmap.org ) at 2015-10-05 01:24 CST

Nmap scan report for 192.138.1.133

Host is up (0.00073s latency).

PORT     STATE SERVICE

21/tcp   open  ftp

22/tcp   open  ssh

23/tcp   open  telnet

25/tcp   open  smtb

53/tcp   open  domain

80/tcp   open  http

111/tcp  open  rpcbind

139/tcp  open  netbios-ssn

445/tcp  open  microsoft-ds

512/tcp  open  exec

513/tcp  open  login

514/tcp  open  shell

1099/tcp open  rmiregistry

1524/tcp open  ingreslock

2049/tcp open  nfs

2121/tcp open  ccproxy-ftp

3306/tcp open  mysql

5432/tcp open  postgresql

5900/tcp open  vnc

6000/tcp open  X11

6667/tcp open  irc

8009/tcp open  ajp13

8180/tcp open  unknown

MAC Address: 80:00:27:B0:3A:76(Cadmus Computer Systems)

Device type: general purpose

Running: Linux 2.6.X

OS CPE: cpe:/o: linux: linux_kernel:2.6

OS details: Linux 2.6.9 - 2.6.33

Network Distance: 1 hop

OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 7.47 seconds

[email protected]:~# nmap -O 192.138.1.1

Starting Nmap 6.49BETA5 ( https://nmap.org ) at 2015-10-03 16:31 CST

Nmap scan report for 192.168.1.1

Host is up (0.00082s latency).

PORT     STATE SERVICE

80/tcp   open  http

1900/tcp open  upup

MAC Address: Do:C7:C0:99:ED:3A (Tp-link Technologies Co.)

Warning: OSScan results may be unrelibale because we coule not find at least 1 open and 1 closed port

Aggressive OS guesses: Canon imageRUNNER C5185 printer (98%), VxWorks(94%), Can on imageRUNNER C2380i pinter(93%), Fujitsu Externus DX80 or IBM DCS9900 NAS divie(93%), Avaya 4526GTX switch (92%), HP ProCurve 3500yl,5406zl, or 6200yl switch or UTStarcom F100 VoIP phone(89%), Nortel CS1000M VoIP PBX or Xerox Phaser 8560DT printer(88%)

No exact OS matches for host (test conditions non-ideal).

Network distance: 1 hop

OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 7.47 seconds

[email protected]:~# xpro

xprobe2  xpro

[email protected]:~# xprobe2 192.168.1.133              //专门识别操作系统的一个工具

Xprobe2:主动操作系统指纹工具

XProbe是一款远程主机操作系统探查工具。开发者基于和Nmap相同的一些技术(same techniques),并加入了自己的创新。Xprobe通过ICMP协议来获得指纹。最新版本是Xprobe2.0.3版本,Xprobe2通过模糊矩阵统计分析主动探测数据报对应的ICMP数据报特征,进而探测得到远端操作系统的类型。注:经过本人测试,对比较老的操作系统,识别效果非常高,对新内核系统则识别效果不太准确。

下载链接:html">http://www.2cto.com/Soft/201012/25526.html

安装步骤:

#tar -zxvf  xprobe2-0.3.tar.gz

#./configure --prefix=/usr/loca/

# make

#make install

用法:

#/usr/local/xprobe/bin/xprobe2 -h

Options:

-v                       Be verbose

-r                       Show route to target(traceroute)

-p Specify portnumber, protocol and state.

Example: tcp:23:open, UDP:53:CLOSED

-c           Specify config file to use.

-h                       Print this help.

-o                Use logfile to log everything.

-t             Set initial receive timeout or roundtrip time.

-s           Set packsending delay (milseconds).

-d              Specify debugging level.

-D               Disable module number .

-M               Enable module number .

-L                       Display modules.

-m         Specify number of matches to print.

-T             Enable TCP portscan for specified port(s).

Example: -T21-23,53,110

-U             Enable UDP portscan for specified port(s).

-f              force fixed round-trip time (-t opt).

-F          Generate signature (use -o to save to a file).

-X    Generate XML output and save it to logfile specified with -o.

-B   Options forces TCP handshake module to try to guess open TCP port

-A   Perform analysis of sample packets gathered during portscan in

order to detect suspicious traffic (i.e. transparent proxies,

firewalls/NIDSs resetting connections). Use with -T.

以上个选项,读者可自己去测试。本人给出一个简单的测试,假设当前目录在/usr/local/xprobe/bin/下

#./xprobe2 www.163.com

Xprobe2 v.0.3 Copyright (c) 2002-2005 [email protected], [email protected],

[email protected]

[+] Target is www.163.com

[+] Loading modules.

[+] Following modules are loaded:

[x] [1] ping:icmp_ping  -  ICMP echo discovery module

[x] [2] ping:tcp_ping  -  TCP-based ping discovery module

[x] [3] ping:udp_ping  -  UDP-based ping discovery module

[x] [4] infogather:ttl_calc  -  TCP and UDP based TTL distance calculation

[x] [5] infogather:portscan  -  TCP and UDP PortScanner

[x] [6] fingerprint:icmp_echo  -  ICMP Echo request fingerprinting module

[x] [7] fingerprint:icmp_tstamp  -  ICMP Timestamp request fingerprinting module

[x] [8] fingerprint:icmp_amask  -  ICMP Address mask request fingerprinting module

[x] [9] fingerprint:icmp_port_unreach  -  ICMP port unreachable fingerprinting module

[x] [10] fingerprint:tcp_hshake  -  TCP Handshake fingerprinting module

[x] [11] fingerprint:tcp_rst  -  TCP RST fingerprinting module

[x] [12] fingerprint:smb  -  SMB fingerprinting module

[x] [13] fingerprint:snmp  -  SNMPv2c fingerprinting module

[+] 13 modules registered

[+] Initializing scan engine

[+] Running scan engine

[-] ping:tcp_ping module: no closed/open TCP ports known on 220.181.28.51.

Module test failed

[-] ping:udp_ping module: no closed/open UDP ports known on 220.181.28.51.

Module test failed

[-] No distance calculation. 220.181.28.51 appears to be dead or no ports known

[+] Host: 220.181.28.51 is up (Guess probability: 50%)

[+] Target: 220.181.28.51 is alive. Round-Trip Time: 0.02320 sec

[+] Selected safe Round-Trip Time value is: 0.04640 sec

[-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)

[-] fingerprint:smb need either TCP port 139 or 445 to run

[-] fingerprint:snmp: need UDP port 161 open

[+] Primary guess:

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.6" (Guess probability: 100%)

[+] Other guesses:

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.7" (Guess probability: 100%)

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.8" (Guess probability: 100%)

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.9" (Guess probability: 100%)

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.10" (Guess probability: 100%)

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.11" (Guess probability: 100%)

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.5" (Guess probability: 100%)

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.4" (Guess probability: 100%)

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.0" (Guess probability: 100%)

[+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.1" (Guess probability: 100%)

[+] Cleaning up scan engine

[+] Modules deinitialized

[+] Execution completed

╋━━━━━━━━━━━━━━━╋

┃操作系统识别                  ┃

┃被动操作系统识别              ┃

┃  IDS                         ┃

┃  抓包分析                    ┃

┃被动扫描                      ┃

┃p0f                           ┃

┃  结合ARP地址欺骗识别全网OS   ┃

╋━━━━━━━━━━━━━━━╋

[email protected]:~# p0f

--- p0f 3.07b by Michal Zalewski <[email protected]> ---

[+] Closed 1 file descriptor.

[+] Loaded 320 signatures from ‘p0f.fp‘.

[+] Intercepting traffic on default interface ‘eth0‘.

[+] Default packet filtering configured [+VLAN].

[+] Entered main event loop.

.-[ 192.168.1.107/50093 -> 64.233.187.136/443 (syn) ]-

|

| client   = 192.168.1.107/50093

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/50093 -> 64.233.187.136/443 (mtu) ]-

|

| client   = 192.168.1.107/50093

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/50094 -> 64.233.187.136/443 (syn) ]-

|

| client   = 192.168.1.107/50094

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/50094 -> 64.233.187.136/443 (mtu) ]-

|

| client   = 192.168.1.107/50094

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/50094 -> 64.233.187.136/443 (uptime) ]-

|

| client   = 192.168.1.107/50094

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 250.00 Hz

|

`----

^C[!] WARNING: User-initiated shutdown.

All done. Processed 10 packets.

[email protected]:~# p0f

--- p0f 3.07b by Michal Zalewski <[email protected]> ---

[+] Closed 1 file descriptor.

[+] Loaded 320 signatures from ‘p0f.fp‘.

[+] Intercepting traffic on default interface ‘eth0‘.

[+] Default packet filtering configured [+VLAN].

[+] Entered main event loop.

.-[ 192.168.1.107/54895 -> 180.97.33.107/80 (syn) ]-

|

| client   = 192.168.1.107/54895

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/54895 -> 180.97.33.107/80 (mtu) ]-

|

| client   = 192.168.1.107/54895

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/54895 -> 180.97.33.107/80 (syn+ack) ]-

|

| server   = 180.97.33.107/80

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/54895 -> 180.97.33.107/80 (mtu) ]-

|

| server   = 180.97.33.107/80

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/54895 -> 180.97.33.107/80 (http request) ]-

|

| client   = 192.168.1.107/54895

| app      = Firefox 10.x or newer

| lang     = English

| params   = none

| raw_sig  = 1:Host,User-Agent,Accept=[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8],Accept-Language=[en-US,en;q=0.5],Accept-Encoding=[gzip, deflate],?Cookie,Connection=[keep-alive]:Accept-Charset,Keep-Alive:Mozilla/5.0 (X11; Linux i686; rv:38.0) Gecko/20100101 Firefox/38.0 Iceweasel/38.3.0

|

`----

-[ 192.168.1.107/54895 -> 180.97.33.107/80 (http response) ]-

|

| server   = 180.97.33.107/80

| app      = ???

| lang     = none

| params   = none

| raw_sig  = 1:Date,Content-Type,?Content-Length,Connection=[Keep-Alive],?Location,Server,X-UA-Compatible=[IE=Edge,chrome=1],?Set-Cookie:Keep-Alive,Accept-Ranges:BWS/1.1

|

`----

.-[ 192.168.1.107/57542 -> 180.97.33.107/443 (syn) ]-

|

| client   = 192.168.1.107/57542

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57542 -> 180.97.33.107/443 (mtu) ]-

|

| client   = 192.168.1.107/57542

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/57542 -> 180.97.33.107/443 (uptime) ]-

|

| client   = 192.168.1.107/57542

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 258.62 Hz

|

`----

.-[ 192.168.1.107/57542 -> 180.97.33.107/443 (syn+ack) ]-

|

| server   = 180.97.33.107/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57542 -> 180.97.33.107/443 (mtu) ]-

|

| server   = 180.97.33.107/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/33274 -> 58.215.118.32/443 (syn) ]-

|

| client   = 192.168.1.107/33274

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/33274 -> 58.215.118.32/443 (mtu) ]-

|

| client   = 192.168.1.107/33274

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/33274 -> 58.215.118.32/443 (uptime) ]-

|

| client   = 192.168.1.107/33274

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 249.49 Hz

|

`----

.-[ 192.168.1.107/33274 -> 58.215.118.32/443 (syn+ack) ]-

|

| server   = 58.215.118.32/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/33274 -> 58.215.118.32/443 (mtu) ]-

|

| server   = 58.215.118.32/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/57544 -> 180.97.33.107/443 (syn) ]-

|

| client   = 192.168.1.107/57544

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57544 -> 180.97.33.107/443 (mtu) ]-

|

| client   = 192.168.1.107/57544

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/57544 -> 180.97.33.107/443 (uptime) ]-

|

| client   = 192.168.1.107/57544

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 252.34 Hz

|

`----

.-[ 192.168.1.107/57544 -> 180.97.33.107/443 (syn+ack) ]-

|

| server   = 180.97.33.107/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57544 -> 180.97.33.107/443 (mtu) ]-

|

| server   = 180.97.33.107/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/42700 -> 58.215.118.33/443 (syn) ]-

|

| client   = 192.168.1.107/42700

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42700 -> 58.215.118.33/443 (mtu) ]-

|

| client   = 192.168.1.107/42700

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/42700 -> 58.215.118.33/443 (uptime) ]-

|

| client   = 192.168.1.107/42700

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 233.33 Hz

|

`----

.-[ 192.168.1.107/42701 -> 58.215.118.33/443 (syn) ]-

|

| client   = 192.168.1.107/42701

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42701 -> 58.215.118.33/443 (mtu) ]-

|

| client   = 192.168.1.107/42701

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/42702 -> 58.215.118.33/443 (syn) ]-

|

| client   = 192.168.1.107/42702

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42702 -> 58.215.118.33/443 (mtu) ]-

|

| client   = 192.168.1.107/42702

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/42700 -> 58.215.118.33/443 (syn+ack) ]-

|

| server   = 58.215.118.33/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42700 -> 58.215.118.33/443 (mtu) ]-

|

| server   = 58.215.118.33/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/42702 -> 58.215.118.33/443 (syn+ack) ]-

|

| server   = 58.215.118.33/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42702 -> 58.215.118.33/443 (mtu) ]-

|

| server   = 58.215.118.33/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/42701 -> 58.215.118.33/443 (syn+ack) ]-

|

| server   = 58.215.118.33/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42701 -> 58.215.118.33/443 (mtu) ]-

|

| server   = 58.215.118.33/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/42703 -> 58.215.118.33/443 (syn) ]-

|

| client   = 192.168.1.107/42703

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42703 -> 58.215.118.33/443 (mtu) ]-

|

| client   = 192.168.1.107/42703

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/42703 -> 58.215.118.33/443 (syn+ack) ]-

|

| server   = 58.215.118.33/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42703 -> 58.215.118.33/443 (mtu) ]-

|

| server   = 58.215.118.33/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/42703 -> 58.215.118.33/443 (uptime) ]-

|

| client   = 192.168.1.107/42703

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 261.90 Hz

|

`----

.-[ 192.168.1.107/33280 -> 58.215.118.32/443 (syn) ]-

|

| client   = 192.168.1.107/33280

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/33280 -> 58.215.118.32/443 (mtu) ]-

|

| client   = 192.168.1.107/33280

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/33280 -> 58.215.118.32/443 (uptime) ]-

|

| client   = 192.168.1.107/33280

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 250.87 Hz

|

`----

.-[ 192.168.1.107/33281 -> 58.215.118.32/443 (syn) ]-

|

| client   = 192.168.1.107/33281

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/33281 -> 58.215.118.32/443 (mtu) ]-

|

| client   = 192.168.1.107/33281

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/33280 -> 58.215.118.32/443 (syn+ack) ]-

|

| server   = 58.215.118.32/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/33280 -> 58.215.118.32/443 (mtu) ]-

|

| server   = 58.215.118.32/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/33281 -> 58.215.118.32/443 (syn+ack) ]-

|

| server   = 58.215.118.32/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/33281 -> 58.215.118.32/443 (mtu) ]-

|

| server   = 58.215.118.32/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/57551 -> 180.97.33.107/443 (syn) ]-

|

| client   = 192.168.1.107/57551

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57551 -> 180.97.33.107/443 (mtu) ]-

|

| client   = 192.168.1.107/57551

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/57551 -> 180.97.33.107/443 (uptime) ]-

|

| client   = 192.168.1.107/57551

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 248.83 Hz

|

`----

.-[ 192.168.1.107/57551 -> 180.97.33.107/443 (syn+ack) ]-

|

| server   = 180.97.33.107/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57551 -> 180.97.33.107/443 (mtu) ]-

|

| server   = 180.97.33.107/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/38572 -> 180.97.33.108/443 (syn) ]-

|

| client   = 192.168.1.107/38572

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/38572 -> 180.97.33.108/443 (mtu) ]-

|

| client   = 192.168.1.107/38572

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/38572 -> 180.97.33.108/443 (uptime) ]-

|

| client   = 192.168.1.107/38572

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 247.93 Hz

|

`----

.-[ 192.168.1.107/38572 -> 180.97.33.108/443 (syn+ack) ]-

|

| server   = 180.97.33.108/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/38572 -> 180.97.33.108/443 (mtu) ]-

|

| server   = 180.97.33.108/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/50093 -> 64.233.187.136/443 (syn) ]-

|

| client   = 192.168.1.107/50093

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

----

.-[ 192.168.1.107/50093 -> 64.233.187.136/443 (mtu) ]-

|

| client   = 192.168.1.107/50093

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/50093 -> 64.233.187.136/443 (uptime) ]-

|

| client   = 192.168.1.107/50093

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 253.38 Hz

|

`----

.-[ 192.168.1.107/38573 -> 180.97.33.108/443 (syn) ]-

|

| client   = 192.168.1.107/38573

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/38573 -> 180.97.33.108/443 (mtu) ]-

|

| client   = 192.168.1.107/38573

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/38573 -> 180.97.33.108/443 (uptime) ]-

|

| client   = 192.168.1.107/38573

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 248.91 Hz

|

`----

.-[ 192.168.1.107/38573 -> 180.97.33.108/443 (syn+ack) ]-

|

| server   = 180.97.33.108/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/38573 -> 180.97.33.108/443 (mtu) ]-

|

| server   = 180.97.33.108/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/50094 -> 64.233.187.136/443 (syn) ]-

|

| client   = 192.168.1.107/50094

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/50094 -> 64.233.187.136/443 (mtu) ]-

|

| client   = 192.168.1.107/50094

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/50094 -> 64.233.187.136/443 (uptime) ]-

|

| client   = 192.168.1.107/50094

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 259.26 Hz

|

`----

.-[ 192.168.1.107/57554 -> 180.97.33.107/443 (syn) ]-

|

| client   = 192.168.1.107/57554

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57554 -> 180.97.33.107/443 (mtu) ]-

|

| client   = 192.168.1.107/57554

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/57554 -> 180.97.33.107/443 (uptime) ]-

|

| client   = 192.168.1.107/57554

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 245.76 Hz

|

`----

.-[ 192.168.1.107/57554 -> 180.97.33.107/443 (syn+ack) ]-

|

| server   = 180.97.33.107/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57554 -> 180.97.33.107/443 (mtu) ]-

|

| server   = 180.97.33.107/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

╋━━━━━━━━━━━━━━━━━━━━━━━━╋

┃SNMP                                            ┃

┃snmp                                            ┃

┃  信息的金矿                                    ┃

┃  经常被错误配置                                ┃

┃  public / prtvate / manager                    ┃

┃MIB Tree                                        ┃

┃  SNMP Management Informattion Base (MID)       ┃

┃  树形的网络设备管理功能数据库                  ┃

┃  1.3.6.1.4.1.77.1.2.25                         ┃

┃onesixtyone 1.1.1.1 public                      ┃

┃onesixtyone -c dict.txt -i hosts -o my.log -w 100┃

╋━━━━━━━━━━━━━━━━━━━━━━━━╋

简单网络管理协议(SNMP),由一组网络管理的标准组成,包含一个应用层协议(application layer protocol)、数据库模型(database schema)和一组资源对象。该协议能够支持网络管理系统,用以监测连接到网络上的设备是否有任何引起管理上关注的情况。该协议是互联网工程工作小组(IETF,Internet Engineering Task Force)定义的internet协议簇的一部分。SNMP的目标是管理互联网Internet上众多厂家生产的软硬件平台,因此SNMP受Internet标准网络管理框架的影响也很大。SNMP已经出到第三个版本的协议,其功能较以前已经大大地加强和改进了。

[email protected]:~# onesixtyone

onesixtyone 0.3.2 [options] <host> <community>

-c <communityfile> file with community names to try

-i <inputfile>     file with target hosts

-o <outputfile>    output log

-d                 debug mode, use twice for more information

-w n               wait n milliseconds (1/1000 of a second) between sending packets (default 10)

-q                 quiet mode, do not print log to stdout, use with -l

examples: ./s -c dict.txt 192.168.4.1 public

./s -c dict.txt -i hosts -o my.log -w 100

[email protected]:~# onesixtyone 192.168.1.133 pulic

Scanning 1 hosts, 1 communities

192.168.1.133 [public] Hardware: x86 Family 6 Model 42 Steping 7 AT/AT COMPATIBLE - Software: Windows 2000 Version 5.1(Bulid 2600 Uniprocessor Free)

[email protected]:~# dpkg -L onesixtyone

/.

/usr

/usr/bin

/usr/bin/onesixtyone

/usr/share

/usr/share/man

/usr/share/man/man1

/usr/share/man/man1/onesixtyone.1.gz

/usr/share/doc

/usr/share/doc/onesixtyone

/usr/share/doc/onesixtyone/copyright

/usr/share/doc/onesixtyone/changelog.gz

/usr/share/doc/onesixtyone/dict.txt

/usr/share/doc/onesixtyone/README

/usr/share/doc/onesixtyone/changelog.Debian.gz

[email protected]:~# onesixtyone -c /usr/share/doc/onesixtyone/dict.txt 192.168.1.133 -o my.log -w 100

Logging to file my.log

Scanning 1 hosts, 49 communities

[email protected]:~# nmap -sU -p161 192.168.1.134

Starting Nmap 6.49BETA5 ( https://nmap.org ) at 2015-10-06 00:32 CST

Note is up(0.00105 latency).

PORT    STATE  SERVICE

161/udp closed snmp

MAC Address: 08:00:27:Bo:3A:76 (Cadmus Computer Systems)

Nmap done: 1 IP address (0 hosts up) scanned in 0.55 seconds

╋━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╋

┃SNMP扫描                                                  ┃

┃snmpwalk 192.168.20.199 -c public -v 2c                   ┃

┃用户                                                      ┃

┃    snmpwalk -c public -v 2c 1.1.1.1 1.3.6.1.4.1.77.1.2.25┃

┃snmpcheck -t 192.168.20.199                               ┃

┃snmpcheck  -t 192.168.20.199 -c private -v 2              ┃

┃snmpcheck  -t 192.168.20.199 -w                           ┃

╋━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╋

[email protected]:~# snmpwalk 192.168.1.133 -c public -v 2c

[email protected]:~# snmpwalk -c public -v 2c 192.168.1.133 1.3.6.1.4.1.77.1.2.25

[email protected]:~# snmpwalk -c public -v 2c 192.168.1.133 1.3.6.1.2.1.25.6.3.1.2

[email protected]:~# snmpcheck -h

Usage:  snmpcheck [-x] [-n|y] [-h] [-H] [-V NUM] [-L] [-f] [[-a] HOSTS]

-h Display this message.

-a check error log file AND hosts specified on command line.

-p Don‘t try and ping-echo the host first

-f Only check for things I can fix

HOSTS check these hosts for problems.

X Options:

-x forces ascii base if $DISPLAY set (instead of tk).

-H start in hidden mode.  (hides user interface)

-V NUM sets the initial verbosity level of the command log (def: 1)

-L Show the log window at startup

-d Don‘t start by checking anything.  Just bring up the interface.

Ascii Options:

-n Don‘t ever try and fix the problems found.  Just list.

-y Always fix problems found.

[email protected]:~# snmpcheck -t 192.168.1.133

时间: 2024-10-05 05:00:13

​【安全牛学习笔记】操作系统识别的相关文章

linux基础学习笔记——操作大全

作者:liaoyi 更新时间:2014-6-2 ****************基本操作***************** 关机 shutdown -h now    root用户               init 0              root用户halt      root+一般用户poweroff 重启shutdown -r now    root用户init6     root用户reboot            root+一般用户 注意:1.shutdown 比较灵活,可

linux系统构建基础学习笔记——操作

linux系统构建 ********************************************************                  ---交叉编译环境构建--- 安装arm-linux-gcc-4.3.2 (交叉编译器) tar xzvf arm-linux-gcc-4.3.2.tgz -C /cd /usr/local/arm/4.3.2/bin./arm-linux-gcc -v在/etc/bashrc文件的最后添加如下一行:   export PATH=

计算机网络学习笔记——操作

**********************网络基本命令************************** IP相关参数:/etc/sysconfig/network-scripts/ifcfg-ethX ---ifconfig--- ifconfig  查看网络接口信息 ifconfig eth0 10.1.20.186 netmask 255.255.255.0 mtu 8000 修改网路接口参数 ifconfig eth0:0 192.168.1.10 在网络接口上增加一个IPifcon

【安全牛学习笔记】服务扫描

1.简述   识别开放端口上的应用   识别目标操作系统   提高攻击效率 2.分类 Banner信息获取 服务识别 操作系统识别snmp分析 防火墙识别 3.Banner (1).含义 在等定的时间或场景中显示提示语包含 软件开发商,软件名称,服务类型,版本号 可从版本号中获取已知的漏洞和弱点 (2).获取建立连接后直接接受banner信息 (3).python套接字编程利用 importsocket conn=socket.socket(socket.AF_INET,socket.SOCK_

【安全牛学习笔记】

弱点扫描 ╋━━━━━━━━━━━━━━━━━━━━╋ ┃发现弱点                                ┃ ┃发现漏洞                                ┃ ┃  基于端口五福扫描结果版本信息(速度慢)┃ ┃  搜索已公开的漏洞数据库(数量大)      ┃ ┃  使用弱点扫描器实现漏洞管理            ┃ ╋━━━━━━━━━━━━━━━━━━━━╋ [email protected]:~# searchsploit Usage:

【安全牛学习笔记】SMB扫描

SMB扫描 ╋━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╋┃SMB扫描                                                                     ┃┃nmap -v -p 139,134 192.168.60.1-20                                          ┃┃nmap 192.168.1.132 -p139,445 --script=smb-os-disc

【安全牛学习笔记】&#8203;NMAP

NMAP ╋━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╋ ┃NMAP                                                                                              ┃ ┃nmap扫描脚本                                                                                   

【安全牛学习笔记】搜索引擎、SHODAN

搜索引擎.SHODAN ╋━━━━━━━━━━━━━━━━━━━━━━━━━━╋ ┃搜索引擎                                       ┃ ┃公司新闻动态                                ┃ ┃重要雇员信息                                ┃ ┃机密文件/网络拓扑                        ┃ ┃用户名密码                                    ┃ ┃

【安全牛学习笔记】&#8203; NESSUS

NESSUS ╋━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╋ ┃NESSUS                                                                    ┃ ┃家庭版                                                                    ┃ ┃    免费