Skip to content

Nilaksha

  • Talk to me anonymously
  • Privacy Policy

Getting to know anyone you want.

February 4, 2020 by Nilaksha

A known prerequisite for any kind of a hacking attack is reconnaissance. This can be carried out in many ways, eavesdropping, physically visiting the victim domain, getting access to the victim’s network are some of the traditional and still used tactics.

I’d say reconnaissance for a hacking attack is the longest and the toughest phase of all in most of the cases. Based on the data you get such as victim’s operating system, installed patches, service pack versions, opened ports of the victim or a system loopholes can be used to create exploits for your own advantage. The demonstration I am doing here is getting to know who your neighbors are in a WIFI network. This demonstration also works in a wired network. We seek to find operating systems they use, how many are there, OS flavors and open ports ..etc. I will use two tools for this demonstration, Metasploit and NMAP. The use of these tools will be discussed on course.

Lets begin…

Fire up your Kali. Open a terminal and start your SQL server with this command service postgresql start. Then run msf_db init to initiate an MSF instance of the database. We need this since we will demonstrate this using Metasploit. Open up your msf console by running msfconsole. This will greet you with a fine art by our creators.

Type on db_status to make sure your database connection to postgresql is live.

Now, we are performing a scan in the connected network for host data type the following command to perform a network scan via your msfconsole. nmap -Pn -sS -A -oX result_db 192.168.1.1-25 . Give him some time till he complete his hunt.

Let’s discuss about the above command parameters.

  • -Pn : Skip ping test and scan every host provided in range
  • -sS : Perform a SYN scan. Scans for 22, 25, 80 ports those correspond to the services SSH, SMTP, HTTP
  • -A : Aggressive scan. Tells the scanner to do a drilled down scan.
  • -oX : gives a human readable output in the XML format
  • resilt_db : The name of the database in which the data will be saved
  • 192.168.1.1-25 : The IP address range.

The above execution will display a bunch of findings about the network hosts. now lets import the saved database, type db_import result_db and then, key in hosts to display the findings. This will show an organized result as below. As you can see, the OS flavor data is missing from the result.

Lets now pick an individual host to perform a further scan to obtain OS flavors and processes running within. this is due to aggressive scan sometimes may not work for IP ranges. Execute the following command to run a deep scan on an individual host. db_nmap -sS -A 192.168.1.7. This will start an isolated aggressive scan on the host specified by the IP address. The result sometimes can be very exciting.

Type services to get the services running on the host. This also will list down the open ports and the OS flavor.

To prepare for an attack, you will be specifically looking for open ports, operating systems and processes the host runs in the given time. NMAP and Metasploit are some handy tools to perform this type of an information gathering.

Bonus!

If you see the port 23 is opened or filtered, you can try a brute force attack like I have mentioned here.

Happy hunting!

Post navigation

Previous Post:

Brute force attacking any PC

Next Post:

Why passionate programmers are likely to join their first company after all of the ladder climbing.

19 Commments

  1. sex says:
    December 17, 2020 at 8:32 am

    Im thankful for the blog article. Really looking forward to read more. Really Great. Kayle Grange Stafford

    Reply
  2. sikis says:
    December 17, 2020 at 9:45 pm

    There is definately a great deal to learn about this topic. I really like all the points you ave made. Olympia Ambrosi Vasilek

    Reply
  3. bahis says:
    December 18, 2020 at 4:30 am

    Hi there, You have done a great job. I will certainly digg it and personally suggest to my friends. I’m sure they’ll be benefited from this site. Reeta Waldo Esmeralda

    Reply
  4. bahis says:
    December 18, 2020 at 8:08 am

    I always used to study paragraph in news papers but now as I am a user of web therefore from now I am using net for content, thanks to web. Alicia Hollis Nanice

    Reply
  5. sikis says:
    December 18, 2020 at 9:56 am

    One of our guests recently advised the following website. Eartha Thorstein Halle

    Reply
  6. bahis says:
    December 18, 2020 at 12:18 pm

    I really like your writing style, superb information, thanks for posting : D. Nisse Sol Ammann

    Reply
  7. sikis says:
    December 18, 2020 at 3:15 pm

    Some really choice articles on this website , saved to favorites . Alfreda Jed Church

    Reply
  8. bahis says:
    December 19, 2020 at 8:30 am

    I appreciate you sharing this post. Much thanks again. Fantastic. Ida Hilario Palestine

    Reply
  9. sikis says:
    December 19, 2020 at 11:55 am

    Very informative article. Really thank you! Really Cool. Janean Lothaire Duff

    Reply
  10. bahis says:
    December 19, 2020 at 3:05 pm

    Ahaa, its pleasant conversation about this post at this place at this website, I have read all that, so now me also commenting here. Elga Earvin Gus

    Reply
  11. bahis says:
    December 19, 2020 at 4:45 pm

    Thanks so much for the blog article. Really looking forward to read more. Great. Linet Norman Weingartner

    Reply
  12. bluray says:
    December 20, 2020 at 8:36 am

    If this is done every single day the unhealthy fats and salt actually starts to mount up. Pat Natty Clein

    Reply
  13. yify says:
    December 20, 2020 at 2:09 pm

    Some truly prime articles on this web site , bookmarked. Bellina Lonnie Goat

    Reply
  14. torrent says:
    December 20, 2020 at 3:41 pm

    I think you have remarked some very interesting points , regards for the post. Cammie Michail Rube

    Reply
  15. torrent says:
    December 20, 2020 at 6:37 pm

    Admiring the dedication you put into your website and in depth information you provide. Vania Reinhard Mildred

    Reply
  16. indir says:
    December 20, 2020 at 7:08 pm

    Really informative blog. Really looking forward to read more. Great. Marna Michal Stoops

    Reply
  17. bluray says:
    December 20, 2020 at 8:52 pm

    Pretty! This was a really wonderful post. Thank you for providing this info. Kerrill Bondie Bearce

    Reply
  18. bedava says:
    December 20, 2020 at 10:17 pm

    I like the valuable info you provide to your articles. Essie Shepard Ogilvie

    Reply
  19. Wiley says:
    September 23, 2021 at 7:29 pm

    Hi my friend! I wish to say that this post
    is awesome, great written and come with almost all significant infos.
    I’d like to look extra posts like this .

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

48  ⁄    =  8

Nilaksha


[email protected]

I am obsessed with solving digital problems, flying and building drones, holding a mug of beer on an empty bench in the evening beach.

I am easily possessive over affection and thats my lowest :/

Call me crazy, but I love long conversations ;)
I am #passionate #learner #leader #mentor #fpv_pilot #builder.

Recent Posts

  • A tribute to the hatred!
  • One JS code to conquer all forms!
  • Password Strength Evaluation using John the Ripper
  • Memory Forensics using Volatility
  • How can your website survive a pandemic traffic attack

Archives

  • December 2023
  • August 2022
  • August 2021
  • June 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
© 2023 Nilaksha