Linux/모의해킹

[Kali] Port Scan 포트 스캔

GGkeeper 2021. 12. 28. 17:31

실습> 포트 스캔

포트 스캔이란 
외부에서 서버의 열린 포트를 확인하는 정보 수집 공격이다.

nmap
대표적인 포트 스캐너

┌──(root💀kali)-[~]
└─# nmap -sT -p1-65535 192.168.108.14
Starting Nmap 7.92 ( https://nmap.org ) at 2021-12-28 02:51 EST
Nmap scan report for 192.168.108.14
Host is up (0.00067s latency).
Not shown: 65527 closed tcp ports (conn-refused)
PORT     STATE SERVICE
21/tcp   open  ftp
22/tcp   open  ssh
25/tcp   open  smtp
53/tcp   open  domain
80/tcp   open  http
443/tcp  open  https
2021/tcp open  servexec
2022/tcp open  down
MAC Address: 00:0C:29:87:C2:1B (VMware)

Nmap done: 1 IP address (1 host up) scanned in 2.55 seconds

 

APM 연동이 되어 있는 서버에 80번 포트로 접속해서 정보를 획득한다.

┌──(root💀kali)-[~]
└─# telnet 192.168.108.14 80
Trying 192.168.108.14...
Connected to 192.168.108.14.
Escape character is '^]'.
GET / HTTP/1.1
Host: 192.168.108.14

HTTP/1.1 200 OK
Date: Tue, 28 Dec 2021 07:58:02 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 56
Content-Type: text/html; charset=UTF-8

Server : 192.168.108.14 <br>
Directory : /var/www/html 
Connection closed by foreign host.