Неведомые гости по SSH

Discussion in 'Болталка' started by PROjEKT, 14 Oct 2011.

  1. PROjEKT

    PROjEKT Banned

    Joined:
    22 Jun 2011
    Messages:
    4
    Likes Received:
    3
    Reputations:
    5
    Не могу понять , что за чудо юдо , там аж 4 сетевые карты и прописано три стевых интерфейса ?
    Что думаете ?
    Где вообще sshd_config и в качестве текстового редактора , что там можно использовать ? Не ее не vi не пашет .

    ssh
    login:root
    password:admin
    IP:81.195.123.177
     
  2. [stranger]

    [stranger] Member

    Joined:
    2 Feb 2010
    Messages:
    167
    Likes Received:
    29
    Reputations:
    4
  3. sn0w

    sn0w Статус пользователя:

    Joined:
    26 Jul 2005
    Messages:
    1,023
    Likes Received:
    1,309
    Reputations:
    327
    отличная идея посканить пулы мту)
     
  4. PROjEKT

    PROjEKT Banned

    Joined:
    22 Jun 2011
    Messages:
    4
    Likes Received:
    3
    Reputations:
    5
    Интересно , а в Лондоне гостей ждут ?
    :D
    А у Вас было когда нибудь удаленое знакомство с оборудованием от циски ?
    Вот там даже sshd_config есть, вот только , как пользоваться текстовым блакнотиком до сиз пор не научился. Может кто поможет ?
    Как включите форвардлинг, дайте знать.
    ssh
    89.105.123.90
    root:admin

    На вебе admin.
     
  5. [stranger]

    [stranger] Member

    Joined:
    2 Feb 2010
    Messages:
    167
    Likes Received:
    29
    Reputations:
    4
    Хехе, тонко :)
     
  6. PROjEKT

    PROjEKT Banned

    Joined:
    22 Jun 2011
    Messages:
    4
    Likes Received:
    3
    Reputations:
    5
    Была история начиналась с обычных ssh гостей , но позже закончилась реальными...

    ssh
    [email protected]
    password:admin

    Всем известная dd-wrt имеет юниксовое начало .
    Тут вообще все сладко и сразу включен форвадинг под ssh, что дает возможность поднять ssh туннелинг.
    Ну веб морда само собой доступна и даже есть возможность поднять свой VPN сервер по PPTP к железке с наружи.
    Тоесть сразу два вида туннеля, любой , который пожелаете на ваш вкус.
     
  7. sn0w

    sn0w Статус пользователя:

    Joined:
    26 Jul 2005
    Messages:
    1,023
    Likes Received:
    1,309
    Reputations:
    327
    nmap -sS -p80 -Pn --open 81.195.124-126.1-254

    диапазоны пуловые тока вставляйте и будет много счастья
     
  8. PROjEKT

    PROjEKT Banned

    Joined:
    22 Jun 2011
    Messages:
    4
    Likes Received:
    3
    Reputations:
    5
    nmap -sS -e em0 -p80 -Pn -T4 -min-hostgroup 600 -max-rtt-timeout 2000ms --open 81.195.124-126.1-254
    Warning: You specified a highly aggressive --min-hostgroup.

    Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-10-14 05:00 MSD

    Nmap scan report for 81.195.124.5
    Host is up (0.035s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.124.13
    Host is up (0.039s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.124.25
    Host is up (0.027s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.124.37
    Host is up (0.029s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.124.53
    Host is up (0.031s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.124.77
    Host is up (0.032s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.124.89
    Host is up (0.028s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.124.93
    Host is up (0.039s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.124.109
    Host is up (0.033s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.124.161
    Host is up (0.030s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.124.169
    Host is up (0.028s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.13
    Host is up (0.031s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.29
    Host is up (0.043s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.33
    Host is up (0.038s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.49
    Host is up (0.030s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.53
    Host is up (0.029s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.73
    Host is up (0.027s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.85
    Host is up (0.027s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.101
    Host is up (0.030s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.105
    Host is up (0.041s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.121
    Host is up (0.032s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.161
    Host is up (0.032s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.165
    Host is up (0.029s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.169
    Host is up (0.037s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.177
    Host is up (0.035s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.181
    Host is up (0.025s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.189
    Host is up (0.024s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.193
    Host is up (0.030s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.209
    Host is up (0.036s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.241
    Host is up (0.031s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.125.253
    Host is up (0.038s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.126.9
    Host is up (0.021s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.126.17
    Host is up (0.036s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.126.33
    Host is up (0.028s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.126.49
    Host is up (0.035s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.126.57
    Host is up (0.034s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.126.81
    Host is up (0.030s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.126.121
    Host is up (0.039s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.126.145
    Host is up (0.031s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.126.217
    Host is up (0.028s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap scan report for 81.195.126.249
    Host is up (0.033s latency).
    PORT STATE SERVICE
    80/tcp open http

    Nmap done: 762 IP addresses (762 hosts up) scanned in 45.79 seconds


    Только логины с паролями самые распостраненые лень искать, которые идут по умолчанию на разные марки роутеров ADSL, есть у кого ?
     
    #8 PROjEKT, 14 Oct 2011
    Last edited: 14 Oct 2011
  9. sn0w

    sn0w Статус пользователя:

    Joined:
    26 Jul 2005
    Messages:
    1,023
    Likes Received:
    1,309
    Reputations:
    327
    http://www.ipaddresslocation.org/ip_ranges/get_ranges.php
     
  10. PROjEKT

    PROjEKT Banned

    Joined:
    22 Jun 2011
    Messages:
    4
    Likes Received:
    3
    Reputations:
    5
    Обычно с VNC сканера тянут диапозоны.
    Если идти данной дорогой , то надо парсер написать на перл , которые преобразует все диапозоны в понятный вид nmap , ну и заделает все в скрит.
    Далее все листы можно скормить ncrack.
    Он умеет работать с листами от nmap на прямую и сам по себе быстрее гидры или медузы.

    Не получилось с ncrack. По факту не смог скушать листы nmap на опции -oN, другие стандарты листов не пробывал. Но западные говорят , что это лучший брут.