​安全牛学习笔记操作系统识别

Posted

tags:

篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了​安全牛学习笔记操作系统识别相关的知识,希望对你有一定的参考价值。

该笔记为安全牛课堂学员笔记,想看此课程或者信息安全类干货可以移步到安全牛课堂


Security+认证为什么是互联网+时代最火爆的认证?


      牛妹先给大家介绍一下Security+

        Security+ 认证是一种中立第三方认证,其发证机构为美国计算机行业协会CompTIA ;是和CISSP、ITIL 等共同包含在内的国际 IT 业 10 大热门认证之一,和CISSP偏重信息安全管理相比,Security+ 认证更偏重信息安全技术和操作。

       通过该认证证明了您具备网络安全,合规性和操作安全,威胁和漏洞,应用程序、数据和主机安全,访问控制和身份管理以及加密技术等方面的能力。因其考试难度不易,含金量较高,目前已被全球企业和安全专业人士所普遍采纳。

Security+认证如此火爆的原因?

        

       原因一:在所有信息安全认证当中,偏重信息安全技术的认证是空白的, Security+认证正好可以弥补信息安全技术领域的空白 。

      目前行业内受认可的信息安全认证主要有CISP和CISSP,但是无论CISP还是CISSP都是偏重信息安全管理的,技术知识讲的宽泛且浅显,考试都是一带而过。而且CISSP要求持证人员的信息安全工作经验都要5年以上,CISP也要求大专学历4年以上工作经验,这些要求无疑把有能力且上进的年轻人的持证之路堵住。在现实社会中,无论是找工作还是升职加薪,或是投标时候报人员,认证都是必不可少的,这给年轻人带来了很多不公平。而Security+的出现可以扫清这些年轻人职业发展中的障碍,由于Security+偏重信息安全技术,所以对工作经验没有特别的要求。只要你有IT相关背景,追求进步就可以学习和考试。


       原因二: IT运维人员工作与翻身的利器。

       在银行、证券、保险、信息通讯等行业,IT运维人员非常多,IT运维涉及的工作面也非常广。是一个集网络、系统、安全、应用架构、存储为一体的综合性技术岗。虽然没有程序猿们“生当做光棍,死亦写代码”的悲壮,但也有着“锄禾日当午,不如运维苦“的感慨。天天对着电脑和机器,时间长了难免有对于职业发展的迷茫和困惑。Security+国际认证的出现可以让有追求的IT运维人员学习网络安全知识,掌握网络安全实践。职业发展朝着网络安全的方向发展,解决国内信息安全人才的匮乏问题。另外,即使不转型,要做好运维工作,学习安全知识取得安全认证也是必不可少的。


        原因三:接地气、国际范儿、考试方便、费用适中!

CompTIA作为全球ICT领域最具影响力的全球领先机构,在信息安全人才认证方面是专业、公平、公正的。Security+认证偏重操作且和一线工程师的日常工作息息相关。适合银行、证券、保险、互联网公司等IT相关人员学习。作为国际认证在全球147个国家受到广泛的认可。

        在目前的信息安全大潮之下,人才是信息安全发展的关键。而目前国内的信息安全人才是非常匮乏的,相信Security+认证一定会成为最火爆的信息安全认证。

 近期,安全牛课堂在做此类线上培训,感兴趣可以了解

操作系统识别

╋━━━━━━━━━━━━━━━╋

┃操作系统识别                  ┃

┃操作系统识别技术              ┃

┃  总类繁多                    ┃

┃  好产品采用多种技术组合      ┃

┃TTL起始值                     ┃

┃  Windows: 128 (65-----128)   ┃

┃  Linux/Unix: 60 (1-64)       ┃

┃  某些Unix: 255               ┃

╋━━━━━━━━━━━━━━━╋

╋━━━━━━━━━━━━━━━╋

┃操作系统识别                  ┃

┃python                        ┃

┃  from scapy.all import       ┃

┃  win="1.1.1.1"               ┃

┃  linu="1.1.1.2"              ┃

┃  aw=sr1(IP(dst=win)/ICMP())  ┃

┃  al=sr1(IP(dst=linu)/ICMP()) ┃

┃  if a[IP].ttl<=64            ┃

┃      print "host is Linux"   ┃

┃  else                        ┃

┃      print "host is windows" ┃

┃                              ┃

┃./ttl_os.py                   ┃

╋━━━━━━━━━━━━━━━╋

╭────────────────────────────────────────────╮

[ttl_os.py]

#!/usr/bin/python

from scapy.all import *

import loggging

logging.getLogger("scapy.runtime").setLevel(logging.ERROR)

import sys

if len(sys.argv)!=2:

  print "Usage - ./ttl_os.py [IP Address]"

  print "Example - ./ttl_os.py 10.0.0.5"

  print "Example will perform ttl analysis to attempt to determine whether the system is windows or Linux"

  sys.exit()

ip=sys.argv[1]

ans=sr1(IP(dst=str(ip))/ICMP(),timeout=1,verbose=0)

if ans == None:

  print "No response was returned"

elif int(ans[IP].ttl)<=64:

  print "Host is Linux/Unix"

else:

  print "Host is Windows"

╰────────────────────────────────────────────╯

[email protected]:~# chmod u+x ttl_os.py

[email protected]:~# ./ttl_os.py 192.168.1.133

WARNING: No route found for IPv6 destination :: (no default route?)

Host is Windows

[email protected]:~# ./ttl_os.py 192.168.1.134

WARNING: No route found for IPv6 destination :: (no default route?)

Host is Linux/Unix

[email protected]:~# ./ttl_os.py 192.168.1.1

WARNING: No route found for IPv6 destination :: (no default route?)

Host is Linux/Unix

╋━━━━━━━━━━━━━━━╋

┃操作系统识别                  ┃

┃nmap使用多种技术识别操作系统  ┃

┃  nmap 1.1.1.1 -O             ┃

┃  系统服务特征                ┃

╋━━━━━━━━━━━━━━━╋

[email protected]:~# nmap -O 192.138.1.133

Starting Nmap 6.49BETA5 ( https://nmap.org ) at 2015-10-05 01:24 CST

Nmap scan report for 192.138.1.133

Host is up (0.00073s latency).

PORT      STATE SERVICE

135/tcp   open  msrpc

139/tcp   open  netbios- ssn

445/tcp   open  microsoft-ds

3389/tcp  open  ms-wbt-server

MAC Address: 80:00:27:B0:3A:76(Cadmus Computer Systems)

Device type: general purpose

Running: Microsoft Windows XP

OS CPE: cpe:/o:microsoft:windows_xp::sp2 cpe:/o:microsoft:windows_xp::sp3

OS details: microsoft Windos XP SP2 or SP3

OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 7.47 seconds

[email protected]:~# nmap -O 192.138.1.134

tarting Nmap 6.49BETA5 ( https://nmap.org ) at 2015-10-05 01:24 CST

Nmap scan report for 192.138.1.133

Host is up (0.00073s latency).

PORT     STATE SERVICE

21/tcp   open  ftp

22/tcp   open  ssh

23/tcp   open  telnet

25/tcp   open  smtb

53/tcp   open  domain

80/tcp   open  http

111/tcp  open  rpcbind

139/tcp  open  netbios-ssn

445/tcp  open  microsoft-ds

512/tcp  open  exec

513/tcp  open  login

514/tcp  open  shell

1099/tcp open  rmiregistry

1524/tcp open  ingreslock

2049/tcp open  nfs

2121/tcp open  ccproxy-ftp

3306/tcp open  mysql

5432/tcp open  postgresql

5900/tcp open  vnc

6000/tcp open  X11

6667/tcp open  irc

8009/tcp open  ajp13

8180/tcp open  unknown

MAC Address: 80:00:27:B0:3A:76(Cadmus Computer Systems)

Device type: general purpose

Running: Linux 2.6.X

OS CPE: cpe:/o: linux: linux_kernel:2.6

OS details: Linux 2.6.9 - 2.6.33

Network Distance: 1 hop

OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 7.47 seconds

[email protected]:~# nmap -O 192.138.1.1

Starting Nmap 6.49BETA5 ( https://nmap.org ) at 2015-10-03 16:31 CST

Nmap scan report for 192.168.1.1

Host is up (0.00082s latency).

PORT     STATE SERVICE

80/tcp   open  http

1900/tcp open  upup

MAC Address: Do:C7:C0:99:ED:3A (Tp-link Technologies Co.)

Warning: OSScan results may be unrelibale because we coule not find at least 1 open and 1 closed port

Aggressive OS guesses: Canon imageRUNNER C5185 printer (98%), VxWorks(94%), Can on imageRUNNER C2380i pinter(93%), Fujitsu Externus DX80 or IBM DCS9900 NAS divie(93%), Avaya 4526GTX switch (92%), HP ProCurve 3500yl,5406zl, or 6200yl switch or UTStarcom F100 VoIP phone(89%), Nortel CS1000M VoIP PBX or Xerox Phaser 8560DT printer(88%)

No exact OS matches for host (test conditions non-ideal).

Network distance: 1 hop

OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 7.47 seconds

[email protected]:~# xpro

xprobe2  xpro

[email protected]:~# xprobe2 192.168.1.133              //专门识别操作系统的一个工具

                             Xprobe2:主动操作系统指纹工具

    XProbe是一款远程主机操作系统探查工具。开发者基于和Nmap相同的一些技术(same techniques),并加入了自己的创新。Xprobe通过ICMP协议来获得指纹。最新版本是Xprobe2.0.3版本,Xprobe2通过模糊矩阵统计分析主动探测数据报对应的ICMP数据报特征,进而探测得到远端操作系统的类型。注:经过本人测试,对比较老的操作系统,识别效果非常高,对新内核系统则识别效果不太准确。

    下载链接:html">http://www.2cto.com/Soft/201012/25526.html

    安装步骤:

    #tar -zxvf  xprobe2-0.3.tar.gz

    #./configure --prefix=/usr/loca/

    # make

    #make install

     用法:

    #/usr/local/xprobe/bin/xprobe2 -h

   Options:

              -v                       Be verbose

              -r                       Show route to target(traceroute)

              -p Specify portnumber, protocol and state.

                                       Example: tcp:23:open, UDP:53:CLOSED

              -c           Specify config file to use.

              -h                       Print this help.

              -o                Use logfile to log everything.

              -t             Set initial receive timeout or roundtrip time.

              -s           Set packsending delay (milseconds).

              -d              Specify debugging level.

              -D               Disable module number .

              -M               Enable module number .

              -L                       Display modules.

              -m         Specify number of matches to print.

              -T             Enable TCP portscan for specified port(s).

                                       Example: -T21-23,53,110

              -U             Enable UDP portscan for specified port(s).

              -f              force fixed round-trip time (-t opt).

              -F          Generate signature (use -o to save to a file).

              -X    Generate XML output and save it to logfile specified with -o.

              -B   Options forces TCP handshake module to try to guess open TCP port

              -A   Perform analysis of sample packets gathered during portscan in

                    order to detect suspicious traffic (i.e. transparent proxies,

          firewalls/NIDSs resetting connections). Use with -T.

    以上个选项,读者可自己去测试。本人给出一个简单的测试,假设当前目录在/usr/local/xprobe/bin/下

    #./xprobe2 www.163.com

    Xprobe2 v.0.3 Copyright (c) 2002-2005 [email protected], [email protected],

     [email protected]

    [+] Target is www.163.com

    [+] Loading modules.

    [+] Following modules are loaded:

    [x] [1] ping:icmp_ping  -  ICMP echo discovery module

    [x] [2] ping:tcp_ping  -  TCP-based ping discovery module

    [x] [3] ping:udp_ping  -  UDP-based ping discovery module

    [x] [4] infogather:ttl_calc  -  TCP and UDP based TTL distance calculation

    [x] [5] infogather:portscan  -  TCP and UDP PortScanner

    [x] [6] fingerprint:icmp_echo  -  ICMP Echo request fingerprinting module

    [x] [7] fingerprint:icmp_tstamp  -  ICMP Timestamp request fingerprinting module

    [x] [8] fingerprint:icmp_amask  -  ICMP Address mask request fingerprinting module

    [x] [9] fingerprint:icmp_port_unreach  -  ICMP port unreachable fingerprinting module

    [x] [10] fingerprint:tcp_hshake  -  TCP Handshake fingerprinting module

    [x] [11] fingerprint:tcp_rst  -  TCP RST fingerprinting module

    [x] [12] fingerprint:smb  -  SMB fingerprinting module

    [x] [13] fingerprint:snmp  -  SNMPv2c fingerprinting module

    [+] 13 modules registered

    [+] Initializing scan engine

    [+] Running scan engine

    [-] ping:tcp_ping module: no closed/open TCP ports known on 220.181.28.51. 

    Module test failed

    [-] ping:udp_ping module: no closed/open UDP ports known on 220.181.28.51. 

    Module test failed

    [-] No distance calculation. 220.181.28.51 appears to be dead or no ports known

    [+] Host: 220.181.28.51 is up (Guess probability: 50%)

    [+] Target: 220.181.28.51 is alive. Round-Trip Time: 0.02320 sec

    [+] Selected safe Round-Trip Time value is: 0.04640 sec

    [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)

    [-] fingerprint:smb need either TCP port 139 or 445 to run

    [-] fingerprint:snmp: need UDP port 161 open

    [+] Primary guess:

    [+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.6" (Guess probability: 100%)

    [+] Other guesses:

    [+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.7" (Guess probability: 100%)

    [+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.8" (Guess probability: 100%)

    [+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.9" (Guess probability: 100%)

    [+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.10" (Guess probability: 100%)

    [+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.11" (Guess probability: 100%)

    [+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.5" (Guess probability: 100%)

    [+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.4" (Guess probability: 100%)

    [+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.0" (Guess probability: 100%)

    [+] Host 220.181.28.51 Running OS: "Linux Kernel 2.6.1" (Guess probability: 100%)

    [+] Cleaning up scan engine

    [+] Modules deinitialized

    [+] Execution completed

╋━━━━━━━━━━━━━━━╋

┃操作系统识别                  ┃

┃被动操作系统识别              ┃

┃  IDS                         ┃

┃  抓包分析                    ┃

┃被动扫描                      ┃

┃p0f                           ┃

┃  结合ARP地址欺骗识别全网OS   ┃

╋━━━━━━━━━━━━━━━╋

[email protected]:~# p0f

--- p0f 3.07b by Michal Zalewski <[email protected]> ---

[+] Closed 1 file descriptor.

[+] Loaded 320 signatures from ‘p0f.fp‘.

[+] Intercepting traffic on default interface ‘eth0‘.

[+] Default packet filtering configured [+VLAN].

[+] Entered main event loop.

.-[ 192.168.1.107/50093 -> 64.233.187.136/443 (syn) ]-

|

| client   = 192.168.1.107/50093

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/50093 -> 64.233.187.136/443 (mtu) ]-

|

| client   = 192.168.1.107/50093

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/50094 -> 64.233.187.136/443 (syn) ]-

|

| client   = 192.168.1.107/50094

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/50094 -> 64.233.187.136/443 (mtu) ]-

|

| client   = 192.168.1.107/50094

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/50094 -> 64.233.187.136/443 (uptime) ]-

|

| client   = 192.168.1.107/50094

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 250.00 Hz

|

`----

^C[!] WARNING: User-initiated shutdown.

All done. Processed 10 packets.

[email protected]:~# p0f

--- p0f 3.07b by Michal Zalewski <[email protected]> ---

[+] Closed 1 file descriptor.

[+] Loaded 320 signatures from ‘p0f.fp‘.

[+] Intercepting traffic on default interface ‘eth0‘.

[+] Default packet filtering configured [+VLAN].

[+] Entered main event loop.

.-[ 192.168.1.107/54895 -> 180.97.33.107/80 (syn) ]-

|

| client   = 192.168.1.107/54895

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/54895 -> 180.97.33.107/80 (mtu) ]-

|

| client   = 192.168.1.107/54895

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/54895 -> 180.97.33.107/80 (syn+ack) ]-

|

| server   = 180.97.33.107/80

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/54895 -> 180.97.33.107/80 (mtu) ]-

|

| server   = 180.97.33.107/80

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/54895 -> 180.97.33.107/80 (http request) ]-

|

| client   = 192.168.1.107/54895

| app      = Firefox 10.x or newer

| lang     = English

| params   = none

| raw_sig  = 1:Host,User-Agent,Accept=[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8],Accept-Language=[en-US,en;q=0.5],Accept-Encoding=[gzip, deflate],?Cookie,Connection=[keep-alive]:Accept-Charset,Keep-Alive:Mozilla/5.0 (X11; Linux i686; rv:38.0) Gecko/20100101 Firefox/38.0 Iceweasel/38.3.0

|

`----

-[ 192.168.1.107/54895 -> 180.97.33.107/80 (http response) ]-

|

| server   = 180.97.33.107/80

| app      = ???

| lang     = none

| params   = none

| raw_sig  = 1:Date,Content-Type,?Content-Length,Connection=[Keep-Alive],?Location,Server,X-UA-Compatible=[IE=Edge,chrome=1],?Set-Cookie:Keep-Alive,Accept-Ranges:BWS/1.1

|

`----

.-[ 192.168.1.107/57542 -> 180.97.33.107/443 (syn) ]-

|

| client   = 192.168.1.107/57542

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57542 -> 180.97.33.107/443 (mtu) ]-

|

| client   = 192.168.1.107/57542

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/57542 -> 180.97.33.107/443 (uptime) ]-

|

| client   = 192.168.1.107/57542

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 258.62 Hz

|

`----

.-[ 192.168.1.107/57542 -> 180.97.33.107/443 (syn+ack) ]-

|

| server   = 180.97.33.107/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57542 -> 180.97.33.107/443 (mtu) ]-

|

| server   = 180.97.33.107/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/33274 -> 58.215.118.32/443 (syn) ]-

|

| client   = 192.168.1.107/33274

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/33274 -> 58.215.118.32/443 (mtu) ]-

|

| client   = 192.168.1.107/33274

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/33274 -> 58.215.118.32/443 (uptime) ]-

|

| client   = 192.168.1.107/33274

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 249.49 Hz

|

`----

.-[ 192.168.1.107/33274 -> 58.215.118.32/443 (syn+ack) ]-

|

| server   = 58.215.118.32/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/33274 -> 58.215.118.32/443 (mtu) ]-

|

| server   = 58.215.118.32/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/57544 -> 180.97.33.107/443 (syn) ]-

|

| client   = 192.168.1.107/57544

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57544 -> 180.97.33.107/443 (mtu) ]-

|

| client   = 192.168.1.107/57544

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/57544 -> 180.97.33.107/443 (uptime) ]-

|

| client   = 192.168.1.107/57544

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 252.34 Hz

|

`----

.-[ 192.168.1.107/57544 -> 180.97.33.107/443 (syn+ack) ]-

|

| server   = 180.97.33.107/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57544 -> 180.97.33.107/443 (mtu) ]-

|

| server   = 180.97.33.107/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/42700 -> 58.215.118.33/443 (syn) ]-

|

| client   = 192.168.1.107/42700

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42700 -> 58.215.118.33/443 (mtu) ]-

|

| client   = 192.168.1.107/42700

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/42700 -> 58.215.118.33/443 (uptime) ]-

|

| client   = 192.168.1.107/42700

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 233.33 Hz

|

`----

.-[ 192.168.1.107/42701 -> 58.215.118.33/443 (syn) ]-

|

| client   = 192.168.1.107/42701

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42701 -> 58.215.118.33/443 (mtu) ]-

|

| client   = 192.168.1.107/42701

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/42702 -> 58.215.118.33/443 (syn) ]-

|

| client   = 192.168.1.107/42702

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42702 -> 58.215.118.33/443 (mtu) ]-

|

| client   = 192.168.1.107/42702

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/42700 -> 58.215.118.33/443 (syn+ack) ]-

|

| server   = 58.215.118.33/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42700 -> 58.215.118.33/443 (mtu) ]-

|

| server   = 58.215.118.33/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/42702 -> 58.215.118.33/443 (syn+ack) ]-

|

| server   = 58.215.118.33/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42702 -> 58.215.118.33/443 (mtu) ]-

|

| server   = 58.215.118.33/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/42701 -> 58.215.118.33/443 (syn+ack) ]-

|

| server   = 58.215.118.33/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42701 -> 58.215.118.33/443 (mtu) ]-

|

| server   = 58.215.118.33/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/42703 -> 58.215.118.33/443 (syn) ]-

|

| client   = 192.168.1.107/42703

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42703 -> 58.215.118.33/443 (mtu) ]-

|

| client   = 192.168.1.107/42703

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/42703 -> 58.215.118.33/443 (syn+ack) ]-

|

| server   = 58.215.118.33/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/42703 -> 58.215.118.33/443 (mtu) ]-

|

| server   = 58.215.118.33/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/42703 -> 58.215.118.33/443 (uptime) ]-

|

| client   = 192.168.1.107/42703

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 261.90 Hz

|

`----

.-[ 192.168.1.107/33280 -> 58.215.118.32/443 (syn) ]-

|

| client   = 192.168.1.107/33280

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/33280 -> 58.215.118.32/443 (mtu) ]-

|

| client   = 192.168.1.107/33280

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/33280 -> 58.215.118.32/443 (uptime) ]-

|

| client   = 192.168.1.107/33280

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 250.87 Hz

|

`----

.-[ 192.168.1.107/33281 -> 58.215.118.32/443 (syn) ]-

|

| client   = 192.168.1.107/33281

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/33281 -> 58.215.118.32/443 (mtu) ]-

|

| client   = 192.168.1.107/33281

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/33280 -> 58.215.118.32/443 (syn+ack) ]-

|

| server   = 58.215.118.32/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/33280 -> 58.215.118.32/443 (mtu) ]-

|

| server   = 58.215.118.32/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/33281 -> 58.215.118.32/443 (syn+ack) ]-

|

| server   = 58.215.118.32/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,2:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/33281 -> 58.215.118.32/443 (mtu) ]-

|

| server   = 58.215.118.32/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/57551 -> 180.97.33.107/443 (syn) ]-

|

| client   = 192.168.1.107/57551

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57551 -> 180.97.33.107/443 (mtu) ]-

|

| client   = 192.168.1.107/57551

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/57551 -> 180.97.33.107/443 (uptime) ]-

|

| client   = 192.168.1.107/57551

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 248.83 Hz

|

`----

.-[ 192.168.1.107/57551 -> 180.97.33.107/443 (syn+ack) ]-

|

| server   = 180.97.33.107/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57551 -> 180.97.33.107/443 (mtu) ]-

|

| server   = 180.97.33.107/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/38572 -> 180.97.33.108/443 (syn) ]-

|

| client   = 192.168.1.107/38572

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/38572 -> 180.97.33.108/443 (mtu) ]-

|

| client   = 192.168.1.107/38572

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/38572 -> 180.97.33.108/443 (uptime) ]-

|

| client   = 192.168.1.107/38572

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 247.93 Hz

|

`----

.-[ 192.168.1.107/38572 -> 180.97.33.108/443 (syn+ack) ]-

|

| server   = 180.97.33.108/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/38572 -> 180.97.33.108/443 (mtu) ]-

|

| server   = 180.97.33.108/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/50093 -> 64.233.187.136/443 (syn) ]-

|

| client   = 192.168.1.107/50093

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

----

.-[ 192.168.1.107/50093 -> 64.233.187.136/443 (mtu) ]-

|

| client   = 192.168.1.107/50093

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/50093 -> 64.233.187.136/443 (uptime) ]-

|

| client   = 192.168.1.107/50093

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 253.38 Hz

|

`----

.-[ 192.168.1.107/38573 -> 180.97.33.108/443 (syn) ]-

|

| client   = 192.168.1.107/38573

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/38573 -> 180.97.33.108/443 (mtu) ]-

|

| client   = 192.168.1.107/38573

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/38573 -> 180.97.33.108/443 (uptime) ]-

|

| client   = 192.168.1.107/38573

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 248.91 Hz

|

`----

.-[ 192.168.1.107/38573 -> 180.97.33.108/443 (syn+ack) ]-

|

| server   = 180.97.33.108/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/38573 -> 180.97.33.108/443 (mtu) ]-

|

| server   = 180.97.33.108/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

.-[ 192.168.1.107/50094 -> 64.233.187.136/443 (syn) ]-

|

| client   = 192.168.1.107/50094

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/50094 -> 64.233.187.136/443 (mtu) ]-

|

| client   = 192.168.1.107/50094

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/50094 -> 64.233.187.136/443 (uptime) ]-

|

| client   = 192.168.1.107/50094

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 259.26 Hz

|

`----

.-[ 192.168.1.107/57554 -> 180.97.33.107/443 (syn) ]-

|

| client   = 192.168.1.107/57554

| os       = Linux 3.11 and newer

| dist     = 0

| params   = none

| raw_sig  = 4:64+0:0:1460:mss*20,10:mss,sok,ts,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57554 -> 180.97.33.107/443 (mtu) ]-

|

| client   = 192.168.1.107/57554

| link     = Ethernet or modem

| raw_mtu  = 1500

|

`----

.-[ 192.168.1.107/57554 -> 180.97.33.107/443 (uptime) ]-

|

| client   = 192.168.1.107/57554

| uptime   = 0 days 0 hrs 8 min (modulo 198 days)

| raw_freq = 245.76 Hz

|

`----

.-[ 192.168.1.107/57554 -> 180.97.33.107/443 (syn+ack) ]-

|

| server   = 180.97.33.107/443

| os       = ???

| dist     = 9

| params   = none

| raw_sig  = 4:55+9:0:1440:mss*20,7:mss,sok,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,ws:df,id+:0

|

`----

.-[ 192.168.1.107/57554 -> 180.97.33.107/443 (mtu) ]-

|

| server   = 180.97.33.107/443

| link     = IPIP or SIT

| raw_mtu  = 1480

|

`----

╋━━━━━━━━━━━━━━━━━━━━━━━━╋

┃SNMP                                            ┃

┃snmp                                            ┃

┃  信息的金矿                                    ┃

┃  经常被错误配置                                ┃

┃  public / prtvate / manager                    ┃

┃MIB Tree                                        ┃

┃  SNMP Management Informattion Base (MID)       ┃

┃  树形的网络设备管理功能数据库                  ┃

┃  1.3.6.1.4.1.77.1.2.25                         ┃

┃onesixtyone 1.1.1.1 public                      ┃

┃onesixtyone -c dict.txt -i hosts -o my.log -w 100┃

╋━━━━━━━━━━━━━━━━━━━━━━━━╋

     简单网络管理协议(SNMP),由一组网络管理的标准组成,包含一个应用层协议(application layer protocol)、数据库模型(database schema)和一组资源对象。该协议能够支持网络管理系统,用以监测连接到网络上的设备是否有任何引起管理上关注的情况。该协议是互联网工程工作小组(IETF,Internet Engineering Task Force)定义的internet协议簇的一部分。SNMP的目标是管理互联网Internet上众多厂家生产的软硬件平台,因此SNMP受Internet标准网络管理框架的影响也很大。SNMP已经出到第三个版本的协议,其功能较以前已经大大地加强和改进了。

[email protected]:~# onesixtyone

onesixtyone 0.3.2 [options] <host> <community>

  -c <communityfile> file with community names to try

  -i <inputfile>     file with target hosts

  -o <outputfile>    output log

  -d                 debug mode, use twice for more information


  -w n               wait n milliseconds (1/1000 of a second) between sending packets (default 10)

  -q                 quiet mode, do not print log to stdout, use with -l

examples: ./s -c dict.txt 192.168.4.1 public

          ./s -c dict.txt -i hosts -o my.log -w 100

[email protected]:~# onesixtyone 192.168.1.133 pulic

Scanning 1 hosts, 1 communities

192.168.1.133 [public] Hardware: x86 Family 6 Model 42 Steping 7 AT/AT COMPATIBLE - Software: Windows 2000 Version 5.1(Bulid 2600 Uniprocessor Free)

[email protected]:~# dpkg -L onesixtyone

/.

/usr

/usr/bin

/usr/bin/onesixtyone

/usr/share

/usr/share/man

/usr/share/man/man1

/usr/share/man/man1/onesixtyone.1.gz

/usr/share/doc

/usr/share/doc/onesixtyone

/usr/share/doc/onesixtyone/copyright

/usr/share/doc/onesixtyone/changelog.gz

/usr/share/doc/onesixtyone/dict.txt

/usr/share/doc/onesixtyone/README

/usr/share/doc/onesixtyone/changelog.Debian.gz

[email protected]:~# onesixtyone -c /usr/share/doc/onesixtyone/dict.txt 192.168.1.133 -o my.log -w 100

Logging to file my.log

Scanning 1 hosts, 49 communities

[email protected]:~# nmap -sU -p161 192.168.1.134

Starting Nmap 6.49BETA5 ( https://nmap.org ) at 2015-10-06 00:32 CST

Note is up(0.00105 latency).

PORT    STATE  SERVICE

161/udp closed snmp

MAC Address: 08:00:27:Bo:3A:76 (Cadmus Computer Systems)

Nmap done: 1 IP address (0 hosts up) scanned in 0.55 seconds

╋━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╋

┃SNMP扫描                                                  ┃

┃snmpwalk 192.168.20.199 -c public -v 2c                   ┃

┃用户                                                      ┃

┃    snmpwalk -c public -v 2c 1.1.1.1 1.3.6.1.4.1.77.1.2.25┃

┃snmpcheck -t 192.168.20.199                               ┃

┃snmpcheck  -t 192.168.20.199 -c private -v 2              ┃

┃snmpcheck  -t 192.168.20.199 -w                           ┃

╋━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╋

[email protected]:~# snmpwalk 192.168.1.133 -c public -v 2c

[email protected]:~# snmpwalk -c public -v 2c 192.168.1.133 1.3.6.1.4.1.77.1.2.25

[email protected]:~# snmpwalk -c public -v 2c 192.168.1.133 1.3.6.1.2.1.25.6.3.1.2

[email protected]:~# snmpcheck -h

Usage:  snmpcheck [-x] [-n|y] [-h] [-H] [-V NUM] [-L] [-f] [[-a] HOSTS] 

  -h Display this message.

  -a check error log file AND hosts specified on command line.

  -p Don‘t try and ping-echo the host first

  -f Only check for things I can fix

  HOSTS check these hosts for problems.

X Options:

  -x forces ascii base if $DISPLAY set (instead of tk).

  -H start in hidden mode.  (hides user interface)

  -V NUM sets the initial verbosity level of the command log (def: 1)

  -L Show the log window at startup

  -d Don‘t start by checking anything.  Just bring up the interface.

Ascii Options:

  -n Don‘t ever try and fix the problems found.  Just list.

  -y Always fix problems found.

[email protected]:~# snmpcheck -t 192.168.1.133

本文出自 “11662938” 博客,请务必保留此出处http://11672938.blog.51cto.com/11662938/1965387

以上是关于​安全牛学习笔记操作系统识别的主要内容,如果未能解决你的问题,请参考以下文章

安全牛学习笔记​手动漏洞挖掘-SQL盲注

安全牛学习笔记​ NESSUS

安全牛学习笔记​NMAP

​安全牛学习笔记端口扫描

安全牛学习笔记​手动漏洞挖掘

安全牛学习笔记服务扫描