Lab2 - Escaneo 2023
Lab2 - Escaneo 2023
Opcion 1
Opcion2 (recomendada)
usuario metasploitable:msfadmin
password: msfadmin
Verificación de direcciones IP
windows:ipconfig
linux: ifconfig
linux: ip address
solicitar ip linux
sudo dhclient
terminar ip linux
sudo dhclient -r
Recomendado
systemctl enable ssh
systemctl start ssh
https://www.tenable.com/downloads/nessus?loginAttempted=true
https://www.tenable.com/downloads/nessus
descargar Nessus8.15-debian6-amd64.deb
descargar Nessus10-5-debian10-amd64.deb
https://localhost:8834
Click en avanzado
Aceptar el riesgo y continuar
Nota: en caso de fallas en la actualizacion
usar
┌──(kali㉿kali)-[/opt/nessus/sbin]
└─$ sudo ./nessuscli update
TRAZA DE LA RUTA
Windows
tracert 8.8.8.8
Kali
traceroute 8.8.8.8
Limite de ethernet MTU 1500bytes
Uso de NMAP
nmap -sn 1.1.1.1 ping sweep
nmap 192.168.1.1-255 default scan
Descubrimiento de IP(solo ping)
Revisión de puertos
Escaneo UDP
nmap -sU -p 65-70 ww1.sec4eng.site
escaner udp
ping scan
Vulnerabilidades windows 7
Uso del nessus
firmas (actualización manual)
New scan
Escaneo basico
Definir parametros
guardar
Launch
Análisis de Vulnerabilidades desde metasploit(software)
Iniciar metasploit
[*] Nmap: | vsFTPd version 2.3.4 backdoor, this was reported on 2011-07-04.
[*] Nmap: |
http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backdoored.html
[*] Nmap: |_
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/ftp/vsftpd_23
4_backdoor.rb
……