0% found this document useful (0 votes)
9 views18 pages

Proyecto 2

The document outlines a series of command-line operations performed on a Kali Linux system, including network configuration and scanning using Nmap. The user modifies the network interface settings, successfully pings a target IP address, and conducts multiple Nmap scans to identify open ports and services on a specified host. Key findings include the identification of open ports 80, 443, and 8080 on the target IP address 192.168.1.62.

Uploaded by

alexis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views18 pages

Proyecto 2

The document outlines a series of command-line operations performed on a Kali Linux system, including network configuration and scanning using Nmap. The user modifies the network interface settings, successfully pings a target IP address, and conducts multiple Nmap scans to identify open ports and services on a specified host. Key findings include the identification of open ports 80, 443, and 8080 on the target IP address 192.168.1.62.

Uploaded by

alexis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Paso 1

Paso 2
Paso 3

Paso 4

Paso 5
Paso 6

Paso 7
Paso 8

Paso 9
Paso 10
Paso 11
11.1
11.2
root@kali:~# sudo minicom
Welcome to minicom 2.7.1

OPCIONES: I18n
Compilado en May 6 2018, 08:02:47.
Port /dev/ttyUSB0, 20:43:06

Presione CTRL-A Z para obtener ayuda sobre teclas especiales

{
CTRL-A Z for help | 115200 8N1 | NOR | Minicom 2.7.1 | VT102 | Desconectado |
0
root@kali:~# sudo nmap -Pn -p 80 192.168.1.62

Starting Nmap 7.60 ( https://nmap.org ) at 2024-05-31 20:46 EDT


setup_target: failed to determine route to 192.168.1.62
WARNING: No targets were specified, so 0 hosts scanned.
Nmap done: 0 IP addresses (0 hosts up) scanned in 0.06 seconds
root@kali:~# ifconfig
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 203.0.113.1 netmask 255.255.255.0 broadcast 203.0.113.255
inet6 2800:e2:8f80:1cc5:a00:27ff:fe23:f9f4 prefixlen 64 scopeid
0x0<global>
inet6 fe80::a00:27ff:fe23:f9f4 prefixlen 64 scopeid 0x20<link>
ether 08:00:27:23:f9:f4 txqueuelen 1000 (Ethernet)
RX packets 84 bytes 11336 (11.0 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 21 bytes 1646 (1.6 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 16 bytes 960 (960.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 16 bytes 960 (960.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

root@kali:~# eliminar sudo ip addr del 203.0.113.1/24 dev eth0


bash: eliminar: no se encontró la orden
root@kali:~# ping 192.168.1.62
connect: La red es inaccesible
root@kali:~# sudo ifconfig eth0 192.168.1.100 netmask 255.255.255.0
root@kali:~# ifconfig
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.1.100 netmask 255.255.255.0 broadcast 192.168.1.255
inet6 2800:e2:8f80:1cc5:a00:27ff:fe23:f9f4 prefixlen 64 scopeid
0x0<global>
inet6 fe80::a00:27ff:fe23:f9f4 prefixlen 64 scopeid 0x20<link>
ether 08:00:27:23:f9:f4 txqueuelen 1000 (Ethernet)
RX packets 166 bytes 21449 (20.9 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 22 bytes 1736 (1.6 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536


inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 16 bytes 960 (960.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 16 bytes 960 (960.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

root@kali:~# ping 192.168.1.62


PING 192.168.1.62 (192.168.1.62) 56(84) bytes of data.
64 bytes from 192.168.1.62: icmp_seq=1 ttl=255 time=106 ms
64 bytes from 192.168.1.62: icmp_seq=2 ttl=255 time=17.8 ms
64 bytes from 192.168.1.62: icmp_seq=3 ttl=255 time=37.6 ms
64 bytes from 192.168.1.62: icmp_seq=4 ttl=255 time=58.7 ms
64 bytes from 192.168.1.62: icmp_seq=5 ttl=255 time=90.0 ms
64 bytes from 192.168.1.62: icmp_seq=6 ttl=255 time=16.6 ms
64 bytes from 192.168.1.62: icmp_seq=7 ttl=255 time=11.7 ms
64 bytes from 192.168.1.62: icmp_seq=8 ttl=255 time=6.01 ms
^C
--- 192.168.1.62 ping statistics ---
8 packets transmitted, 8 received, 0% packet loss, time 7014ms
rtt min/avg/max/mdev = 6.018/43.166/106.610/35.720 ms
root@kali:~# sudo nmap -Pn -p 1-65535 192.168.1.62

Starting Nmap 7.60 ( https://nmap.org ) at 2024-05-31 20:50 EDT


Nmap scan report for 192.168.1.62
Host is up (0.034s latency).
Not shown: 65534 closed ports
PORT STATE SERVICE
80/tcp open http
MAC Address: 8C:AA:B5:D3:20:30 (Unknown)

Nmap done: 1 IP address (1 host up) scanned in 1448.90 seconds


root@kali:~# sudo nmap -Pn -p 1-65535 -sV 192.168.1.62

Starting Nmap 7.60 ( https://nmap.org ) at 2024-05-31 21:41 EDT


Nmap scan report for 192.168.1.62
Host is up (0.0079s latency).
Not shown: 65534 closed ports
PORT STATE SERVICE VERSION
80/tcp open http
1 service unrecognized despite returning data. If you know the service/version,
please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?
new-service :
SF-Port80-TCP:V=7.60%I=7%D=5/31%Time=665A7F55%P=x86_64-pc-linux-
gnu%r(GetR
SF:equest,60,"HTTP/1\.0\x20200\x20OK\r\nContent-Type:\x20text/plain\r\nCon
SF:tent-Length:\x2012\r\nConnection:\x20close\r\n\r\nHello,\x20world")%r(H
SF:TTPOptions,60,"HTTP/1\.0\x20200\x20OK\r\nContent-Type:\x20text/plain\r\
SF:nContent-Length:\x2012\r\nConnection:\x20close\r\n\r\nHello,\x20world")
SF:%r(RTSPRequest,60,"HTTP/1\.0\x20200\x20OK\r\nContent-Type:\x20text/plai
SF:n\r\nContent-Length:\x2012\r\nConnection:\x20close\r\n\r\nHello,\x20wor
SF:ld")%r(FourOhFourRequest,89,"HTTP/1\.0\x20404\x20Not\x20Found\r\
nConten
SF:t-Type:\x20text/html\r\nContent-Length:\x2047\r\nConnection:\x20close\r
SF:\n\r\nNot\x20found:\x20/nice%20ports%2C/Tri%6Eity\.txt%2ebak");
MAC Address: 8C:AA:B5:D3:20:30 (Unknown)

Service detection performed. Please report any incorrect results at


https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 908.45 seconds
root@kali:~#

de nuevo se abrio se agrego otro programa a la esp


root@kali:~# ifconfig
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 203.0.113.1 netmask 255.255.255.0 broadcast 203.0.113.255
inet6 2800:e2:8f80:1cc5:a00:27ff:fe23:f9f4 prefixlen 64 scopeid
0x0<global>
inet6 fe80::a00:27ff:fe23:f9f4 prefixlen 64 scopeid 0x20<link>
ether 08:00:27:23:f9:f4 txqueuelen 1000 (Ethernet)
RX packets 33 bytes 3876 (3.7 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 19 bytes 1466 (1.4 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536


inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 16 bytes 960 (960.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 16 bytes 960 (960.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

root@kali:~# sudo ip addr del 203.0.113.1/24 dev eth0


root@kali:~# sudo ip addr add 192.168.1.100/24 dev eth0
root@kali:~# ifconfig
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.1.100 netmask 255.255.255.0 broadcast 0.0.0.0
inet6 2800:e2:8f80:1cc5:a00:27ff:fe23:f9f4 prefixlen 64 scopeid
0x0<global>
inet6 fe80::a00:27ff:fe23:f9f4 prefixlen 64 scopeid 0x20<link>
ether 08:00:27:23:f9:f4 txqueuelen 1000 (Ethernet)
RX packets 68 bytes 8706 (8.5 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 19 bytes 1466 (1.4 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536


inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 16 bytes 960 (960.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 16 bytes 960 (960.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

root@kali:~# sudo nmap -Pn -p 1-65535 -sV 192.168.1.62

Starting Nmap 7.60 ( https://nmap.org ) at 2024-05-31 22:08 EDT


Nmap done: 1 IP address (0 hosts up) scanned in 0.81 seconds
root@kali:~# ping 192.168.1.62
PING 192.168.1.62 (192.168.1.62) 56(84) bytes of data.
64 bytes from 192.168.1.62: icmp_seq=1 ttl=255 time=53.1 ms
64 bytes from 192.168.1.62: icmp_seq=2 ttl=255 time=66.8 ms
64 bytes from 192.168.1.62: icmp_seq=3 ttl=255 time=89.8 ms
64 bytes from 192.168.1.62: icmp_seq=4 ttl=255 time=112 ms
64 bytes from 192.168.1.62: icmp_seq=5 ttl=255 time=36.1 ms
64 bytes from 192.168.1.62: icmp_seq=6 ttl=255 time=6.40 ms
64 bytes from 192.168.1.62: icmp_seq=7 ttl=255 time=8.20 ms
64 bytes from 192.168.1.62: icmp_seq=8 ttl=255 time=5.26 ms
^A64 bytes from 192.168.1.62: icmp_seq=9 ttl=255 time=5.50 ms
64 bytes from 192.168.1.62: icmp_seq=10 ttl=255 time=5.27 ms
^C
--- 192.168.1.62 ping statistics ---
10 packets transmitted, 10 received, 0% packet loss, time 9015ms
rtt min/avg/max/mdev = 5.262/38.953/112.847/37.987 ms
root@kali:~# sudo nmap -Pn -p 1-65535 -sV 192.168.1.62

Starting Nmap 7.60 ( https://nmap.org ) at 2024-05-31 22:09 EDT


Nmap scan report for 192.168.1.62
Host is up (0.011s latency).
Not shown: 65532 closed ports
PORT STATE SERVICE VERSION
80/tcp open http
443/tcp open https?
8080/tcp open http-proxy?
1 service unrecognized despite returning data. If you know the service/version,
please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?
new-service :
SF-Port80-TCP:V=7.60%I=7%D=5/31%Time=665A837B%P=x86_64-pc-linux-
gnu%r(GetR
SF:equest,6D,"HTTP/1\.0\x20200\x20OK\r\nContent-Type:\x20text/plain\r\nCon
SF:tent-Length:\x2025\r\nConnection:\x20close\r\n\r\nHello,\x20world\x20fr
SF:om\x20port\x2080");
MAC Address: 8C:AA:B5:D3:20:30 (Unknown)

Service detection performed. Please report any incorrect results at


https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 228.96 seconds
root@kali:~#

You might also like