본문 바로가기

NCS/기술적보안구축

To Idle scanning

 

 

-sI <zombie host[:probeport]>: Idle scan
--packet-trace: Show all packets sent and received
-r: Scan ports consecutively - don't randomize
-Pn: Treat all hosts as online -- skip host discovery

 

 

root@kali:~# cat /etc/hosts

10.1.4.2 Victim-lux01
10.1.4.4 Victim-w12
10.1.4.3 Zombie-w7
10.1.4.1 Attacker-kali 

 

 

On side Kai
ip.src == 10.1.4.3 and ip.dst == 10.1.4.1


On side Victim
ip.src == 10.1.4.1

 

On Kali

root@kali:~# nmap -Pn -p1-1023 -sI Zombie-w7 Victim-w12 -r --packet-trace

 

 

 root@kali:~# nmap -Pn -p1-1023 -sI Victim-lux01 Victim-w12 -r

 Starting Nmap 7.25BETA1 ( https://nmap.org ) at 2017-09-14 20:43 KST
mass_dns: warning: Unable to open /etc/resolv.conf. Try using --system-dns or specify valid servers with --dns-servers
mass_dns: warning: Unable to determine any DNS servers. Reverse DNS is disabled. Try using --system-dns or specify valid servers with --dns-servers

Idle scan using zombie Victim-lux01 (10.1.4.2:80); Class: Incremental
Even though your Zombie (Victim-lux01; 10.1.4.2) appears to be vulnerable to IP ID sequence prediction (class: Incremental), our attempts have failed.  This generally means that either the Zombie uses a separate IP ID base for each host (like Solaris), or because you cannot spoof IP packets (perhaps your ISP has enabled egress filtering to prevent IP spoofing), or maybe the target network recognizes the packet source as bogus and drops them
QUITTING!