telnet入侵linux,教你入侵RedHatLinux
此文的目的不在于教人入侵,而是為了提高自身的技術(shù)和加強網(wǎng)絡(luò)管理員的安全防范意識。僅此而已!粗心大意的網(wǎng)絡(luò)管理員應(yīng)該明白:由于你們一個小小的操作失誤可能會導(dǎo)致整個網(wǎng)絡(luò)全面淪陷!本文主要是圍繞LPD:網(wǎng)絡(luò)打印服務(wù)的攻擊而進行的。
首先確定目標(biāo),假設(shè)是:www.XXX.com
先讓俺看看是不是連得上:
C:\pingwww.XXX.com
Pingingwww.XXX.com[202.106.184.200]with32bytesofdata:
Replyfrom202.106.184.200:bytes=32time=541msTTL=244
Replyfrom202.106.184.200:bytes=32time=620msTTL=244
Replyfrom202.106.184.200:bytes=32time=651msTTL=244
Replyfrom202.106.184.200:bytes=32time=511msTTL=244
Pingstatisticsfor202.106.184.200:
Packets:Sent=4,Received=4,Lost=0(0%loss),
Approximateroundtriptimesinmilli-seconds:
Minimum=511ms,Maximum=651ms,Average=580ms
嘻嘻—不但連得上,速度還不錯……
先telnet看看banner:
C:\telnet www.XXX.com
遺失對主機的連接。
再試試ftp,
C:\ftp www.XXX.com
Connected to www.fbi.gov.tw.
220 XXX-www FTP server (Version wu-2.6.1(1) Wed Aug 9 05:54:50 EDT 2000) ready.
User (www.XXX.com:(none)):
wu-2.6.1看來有點眉目了。這臺機器像是RedHat7.0!首先必須確認(rèn)一下,連上俺的跳板:
C:\telnetxxx.xxx.xxx.xxx
RedHatLinuxrelease7.0(Guinness)
Kernel2.2.16-22smponani686
login:fetdog
Password:
bash-2.04$
拿nmap掃描器,看看其中的奧妙~~~
bash-2.04$nmap-sT-Owww.XXX.com
StartingnmapV.2.54BETA7(www.insecure.org/nmap/ )
WARNING!Thefollowingfilesexistandarereadable:/usr/local/sha
-servicesand./nmap-services.Iamchoosing/usr/local/share/nmap/
sforsecurityreasons.setNMAPDIR=.togiveprioritytofilesin
irectory
Interestingportson(www.XXX.com):
(The1520portsscannedbutnotshownbelowareinstate:closed)
PortStateService
25/tcpopensmtp
79/tcpopenfinger
80/tcpopenhttp
111/tcpopensunrpc
113/tcpopenauth
443/tcpopenhttps
513/tcpopenlogin
514/tcpopenshell
515/tcpopenprinter
587/tcpopensubmission
1024/tcpopenkdm
TCPSequencePrediction:Class=randompositiveincrements
Difficulty=3247917(Goodluck!)
Remoteoperatingsystemguess:Linux2.1.122-2.2.16
Nmapruncompleted--1IPaddress(1hostup)scannedin9seconds
打開的端口還挺多,這意味著入侵的可能性增加。79/tcpopenfinger ,先看看這個,不過linux沒有finger用戶列表這個漏洞。
bash-2.04$finger @www.XXX.com
[www.XXX.com]
No one logged on.
再看看111/tcpopensunrpc 。近來rpc漏洞風(fēng)行,不知道RH7這個東東會不會有?先看看再說!
bash-2.04$rpcinfo-pwww.XXX.com
programversprotoportservice
1000002tcp111rpcbind
1000002udp111rpcbind
1000211udp1024nlockmgr
1000213udp1024nlockmgr
1000241udp1025status
1000241tcp1024status
創(chuàng)作挑戰(zhàn)賽新人創(chuàng)作獎勵來咯,堅持創(chuàng)作打卡瓜分現(xiàn)金大獎總結(jié)
以上是生活随笔為你收集整理的telnet入侵linux,教你入侵RedHatLinux的全部內(nèi)容,希望文章能夠幫你解決所遇到的問題。
- 上一篇: centos7 关闭selinux_De
- 下一篇: linux 其他常用命令