Inguma/CLI/Scan-Exploits
Jump to navigation
Jump to search
You are here: | Scan & Exploits
|
Scan & Exploits
Autoscan
The autoscan feature enables to scan a complete network automatically. To run it, simply issue:
inguma> autoscan
Here is an example of output:
Target host or network: 192.168.1.0/24 Brute force username and passwords (y/n)[n]: Automagically fuzz available targets (y/n)[n]: Print to filename (enter for stdout): Inguma 'autoscan' report started at Mon Nov 7 12:50:31 2011 ------------------------------------------------------------ Detecting hosts in network 192.168.1.0/24 Adding to discovered hosts 192.168.1.15 Adding to discovered hosts 192.168.1.254 List of discovered hosts ------------------------ f4:ca:e5:**:**:** 192.168.1.15 (Unknown) f4:ca:e5:**:**:** 192.168.1.254 (Unknown) Port scanning target 192.168.1.15 portscan: eth0: No such device exists (BIOCSETIF failed: Device not configured) MAC Address target 192.168.1.15 192.168.1.15 MAC: f4:ca:e5:**:**:** Unknown Checking if is in promiscuous state target 192.168.1.15 Target 192.168.1.15 is promiscuous: False Identifying services target 192.168.1.15 Detecting operating system target 192.168.1.15 Possible Operative System List ------------------------------ Netscreen 5XP firewall+vpn (OS 3.0.1r2) Netscreen 5XP firewall+vpn (os 4.0.3r2.0) Accuracy: 96.25 % Gathering NetBIOS information target 192.168.1.15 Connecting to the CIFS server target 192.168.1.15 Dumping RPC endpoints target 192.168.1.15 Dumping SAM database target 192.168.1.15 Finding 'gold' anonymously in the CIFS shares target 192.168.1.15 Port scanning target 192.168.1.254 portscan: eth0: No such device exists (BIOCSETIF failed: Device not configured) MAC Address target 192.168.1.254 192.168.1.254 MAC: f4:ca:e5:**:**:** Unknown Checking if is in promiscuous state target 192.168.1.254 Target 192.168.1.254 is promiscuous: True Identifying services target 192.168.1.254 Detecting operating system target 192.168.1.254 WARNING: Test T5 answered by an ICMP WARNING: Test T6 answered by an ICMP WARNING: more Test T7 answered by an ICMP Possible Operative System List ------------------------------ FreeSCO 0.27 (Linux 2.0.38) Gentoo 1.2 linux (Kernel 2.4.19-gentoo-rc5) Linux 2.4.0 - 2.5.20 Linux 2.4.18 Linux 2.4.18 - 2.4.20 (x86) Linux 2.4.19 w/grsecurity patch Linux 2.4.20 Linux 2.4.20 (X86, Redhat 7.3) Linux 2.4.20 - 2.4.22 w/grsecurity.org patch Linux 2.4.21 (x86, RedHat) Linux 2.4.22 (SPARC) Linux 2.4.22 or 2.6.4 - 2.6.10 Linux 2.4.22-ck2 (x86) w/grsecurity.org and HZ=1000 patches Linux 2.4.22-gentoo-rc Linux 2.4.25 w/grsec (x86) Linux 2.4.30 Linux 2.4.7 - 2.6.11 Linux 2.5.25 - 2.6.8 or Gentoo 1.2 Linux 2.4.19 rc1-rc7 Linux 2.6.0-test10 (x86) Linux 2.6.0-test9 - 2.6.0 (x86) Linux 2.6.3 - 2.6.10 Linux 2.6.3 - 2.6.7 (X86) Linux 2.6.6 Linux 2.6.7 - 2.6.8 Microsoft Windows 2000 SP4 Accuracy: 83.75 % Gathering NetBIOS information target 192.168.1.254 Connecting to the CIFS server target 192.168.1.254 Dumping RPC endpoints target 192.168.1.254 Dumping SAM database target 192.168.1.254 Finding 'gold' anonymously in the CIFS shares target 192.168.1.254
Autoexploit
INCOMPLETE SECTION OR ARTICLE
This section/article is being written and is therefore not complete.
Thank you for your comprehension.
Thank you for your comprehension.
Exploit
INCOMPLETE SECTION OR ARTICLE
This section/article is being written and is therefore not complete.
Thank you for your comprehension.
Thank you for your comprehension.