sniffer LAN 裡頭 CDP, HSRP, Spotify, DropBox, DHCP, ARP 等...IPV4 封包... 網址: https://nmap.org/nsedoc/scripts/broadcast-listener.html 內文: local _G = require "_G" local bin = require "bin" local coroutine = require "coroutine" local nmap = require "nmap" local packet = require "packet" local stdnse = require "stdnse" local table = require "table" description = [[ Sniffs the network for incoming broadcast communication and attempts to decode the received packets. It supports protocols like CDP, HSRP, Spotify, DropBox, DHCP, ARP and a few more. See packetdecoders.lua for more information. The script attempts to sniff all ethernet based interfaces with an IPv4 address unless a specific interface was given using the -e argument to Nmap. ]] --- -- @usage -- nmap --script broadcast-listener -- nmap --script broadcast-listener -e eth0 -- -- @output -- | broadcast-listener: -- | udp -- | ...
一般軟體或ping 跑出192.168.0.250設備的MAC address 這算還好的, 還會回應ping ========================== ========================== 主要看的有紅字.... 1. port: 80, 21,1025 2. MAC address 3. ftp 沒有開啟anonymouse登入 4. 判斷設備是Telecomm 5. traceroute 只有一個HOP Starting Nmap 7.12 ( https://nmap.org ) at 2016-05-22 21:06 ¥x¥_?D·CRE?! NSE: Loaded 138 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 21:06 Completed NSE at 21:06, 0.00s elapsed Initiating NSE at 21:06 Completed NSE at 21:06, 0.00s elapsed Initiating ARP Ping Scan at 21:06 Scanning 192.168.0.250 [1 port] Completed ARP Ping Scan at 21:06, 0.18s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 21:06 Completed Parallel DNS resolution of 1 host. at 21:06, 0.02s elapsed Initiating SYN Stealth Scan at 21:06 Scanning 192.168.0.250 [1000 ports] Discovered open port 1025/tcp on 192.168.0.250 Discovered open port 80/tcp on 192.168.0.250 Discovered open port 21/tcp on 192.168.0.250 SYN Stealth Scan ...
留言
張貼留言