Inguma/CLI/Scan-Exploits

From aldeid
Jump to navigation Jump to search
You are here:
Scan & Exploits

Scan & Exploits

Autoscan

The autoscan feature enables to scan a complete network automatically. To run it, simply issue:

inguma> autoscan

Here is an example of output:

Target host or network: 192.168.1.0/24
Brute force username and passwords (y/n)[n]: 
Automagically fuzz available targets (y/n)[n]: 
Print to filename (enter for stdout): 
Inguma 'autoscan' report started at Mon Nov  7 12:50:31 2011
------------------------------------------------------------

Detecting hosts in network 192.168.1.0/24

Adding to discovered hosts 192.168.1.15
Adding to discovered hosts 192.168.1.254
List of discovered hosts
------------------------

f4:ca:e5:**:**:** 192.168.1.15   (Unknown)
f4:ca:e5:**:**:** 192.168.1.254  (Unknown)

Port scanning target 192.168.1.15

portscan: eth0: No such device exists (BIOCSETIF failed: Device not configured)
MAC Address target 192.168.1.15

192.168.1.15 MAC: f4:ca:e5:**:**:** Unknown
Checking if is in promiscuous state target 192.168.1.15

Target 192.168.1.15 is promiscuous: False
Identifying services target 192.168.1.15

Detecting operating system target 192.168.1.15

Possible Operative System List
------------------------------

  Netscreen 5XP firewall+vpn (OS 3.0.1r2)
  Netscreen 5XP firewall+vpn (os 4.0.3r2.0)

Accuracy: 96.25 %

Gathering NetBIOS information target 192.168.1.15

Connecting to the CIFS server target 192.168.1.15

Dumping RPC endpoints target 192.168.1.15

Dumping SAM database target 192.168.1.15

Finding 'gold' anonymously in the CIFS shares target 192.168.1.15
Port scanning target 192.168.1.254

portscan: eth0: No such device exists (BIOCSETIF failed: Device not configured)
MAC Address target 192.168.1.254

192.168.1.254 MAC: f4:ca:e5:**:**:** Unknown
Checking if is in promiscuous state target 192.168.1.254

Target 192.168.1.254 is promiscuous: True
Identifying services target 192.168.1.254

Detecting operating system target 192.168.1.254

WARNING: Test T5 answered by an ICMP
WARNING: Test T6 answered by an ICMP
WARNING: more Test T7 answered by an ICMP
Possible Operative System List
------------------------------

  FreeSCO 0.27 (Linux 2.0.38)
  Gentoo 1.2 linux (Kernel 2.4.19-gentoo-rc5)
  Linux 2.4.0 - 2.5.20
  Linux 2.4.18
  Linux 2.4.18 - 2.4.20 (x86)
  Linux 2.4.19 w/grsecurity patch
  Linux 2.4.20
  Linux 2.4.20 (X86, Redhat 7.3)
  Linux 2.4.20 - 2.4.22 w/grsecurity.org patch
  Linux 2.4.21 (x86, RedHat)
  Linux 2.4.22 (SPARC)
  Linux 2.4.22 or 2.6.4 - 2.6.10
  Linux 2.4.22-ck2 (x86)   w/grsecurity.org and HZ=1000 patches
  Linux 2.4.22-gentoo-rc
  Linux 2.4.25 w/grsec (x86)
  Linux 2.4.30
  Linux 2.4.7 - 2.6.11
  Linux 2.5.25 - 2.6.8 or Gentoo 1.2 Linux 2.4.19 rc1-rc7
  Linux 2.6.0-test10 (x86)
  Linux 2.6.0-test9 - 2.6.0 (x86)
  Linux 2.6.3 - 2.6.10
  Linux 2.6.3 - 2.6.7 (X86)
  Linux 2.6.6
  Linux 2.6.7 - 2.6.8
  Microsoft Windows 2000 SP4

Accuracy: 83.75 %

Gathering NetBIOS information target 192.168.1.254

Connecting to the CIFS server target 192.168.1.254

Dumping RPC endpoints target 192.168.1.254

Dumping SAM database target 192.168.1.254

Finding 'gold' anonymously in the CIFS shares target 192.168.1.254

Autoexploit

INCOMPLETE SECTION OR ARTICLE
This section/article is being written and is therefore not complete.
Thank you for your comprehension.

Exploit

INCOMPLETE SECTION OR ARTICLE
This section/article is being written and is therefore not complete.
Thank you for your comprehension.