Forums
Masscan y Nmap a ips de zonas militares - Printable Version

+- Forums (https://foro.acosadores.net)
+-- Forum: Hacking, ataques contra dictaduras (https://foro.acosadores.net/forumdisplay.php?fid=4)
+--- Forum: Mapeo de Dictaduras (https://foro.acosadores.net/forumdisplay.php?fid=12)
+---- Forum: Rusia (https://foro.acosadores.net/forumdisplay.php?fid=16)
+---- Thread: Masscan y Nmap a ips de zonas militares (/showthread.php?tid=18)



Masscan y Nmap a ips de zonas militares - anonimo - 12-15-2024

Puedes ver una versión wiki de éste post en https://wiki.acosadores.net/doku.php?id=rusia:masscan-y-nmap-a-ips-zonas-militares

Si leíste el post anterior Ips de zonas militares podrás entender como se obtiene el fichero areas_con_ips.txt (zonas militares con ips asignadas)

Escaneamos los puertos más comunes

sudo masscan --ports 80,22,443,110,995,143,993,3306,2082,2083,25,2095,2096,2077,2078 --rate 10000 -iL areas_con_ips.txt -oJ masscan_areas_con_ips.json

cat masscan_areas_con_ips.json | grep open

{  "ip": "79.174.36.70",  "timestamp": "1734231736", "ports": [ {"port": 443, "proto": "tcp", "status": "open", "reason": "syn-ack", "ttl": 48} ] }
{  "ip": "79.174.36.220",  "timestamp": "1734231736", "ports": [ {"port": 22, "proto": "tcp", "status": "open", "reason": "syn-ack", "ttl": 48} ] }


mmdblookup --file ../GeoLite2-City.mmdb --ip 79.174.36.70 | grep -oE '[0-9]{1,3}\.[0-9]{6}'
55.687700
37.197100


mmdblookup --file ../GeoLite2-City.mmdb --ip 79.174.36.220 | grep -oE '[0-9]{1,3}\.[0-9]{6}'
55.687700
37.197100


Vemos que las 2 ips pertenecen a la misma zona militar

[attachment=16]

creamos un fichero hosts_areas.txt con esas 2 ips

sudo nmap -F -sS -iL hosts_areas.txt -oA nmap_areas_con_hosts_ru

Starting Nmap 7.80 ( https://nmap.org ) at 2024-12-15 04:08 CET
Nmap scan report for 79.174.36.70
Host is up (0.16s latency).
Not shown: 96 filtered ports
PORT    STATE SERVICE
21/tcp  open  ftp
22/tcp  open  ssh
443/tcp  open  https
1723/tcp open  pptp

Nmap scan report for 79.174.36.220
Host is up (0.17s latency).
Not shown: 95 filtered ports
PORT    STATE SERVICE
21/tcp  open  ftp
22/tcp  open  ssh
80/tcp  open  http
443/tcp  open  https
3306/tcp open  mysql

Nmap done: 2 IP addresses (2 hosts up) scanned in 11.98 seconds