運(yùn)用網(wǎng)絡(luò)映射器助力Linux管理與安全
我們將要與您分享的這條技巧關(guān)于網(wǎng)絡(luò)映射器(Nmap),它是一種開(kāi)源網(wǎng)絡(luò)瀏覽器,它在網(wǎng)絡(luò)故障診斷、瀏覽和審計(jì)方面都非常理想。這項(xiàng)工具可用來(lái)識(shí)別網(wǎng)絡(luò)中的設(shè)備,也可以識(shí)別在特定設(shè)備上運(yùn)行的服務(wù)。另外,先進(jìn)的信息,如正在使用的操作系統(tǒng)、特定服務(wù)(名字和版本)和網(wǎng)絡(luò)濾波器和防火墻也都能識(shí)別出來(lái)。
用Nmap的服務(wù)識(shí)別通過(guò)現(xiàn)含指紋五千以上的指紋數(shù)據(jù)庫(kù)實(shí)現(xiàn)。這個(gè)數(shù)據(jù)庫(kù)通過(guò)社區(qū)允許提交已知指紋來(lái)支持。
作為盤(pán)點(diǎn)工具的網(wǎng)絡(luò)映射器
網(wǎng)絡(luò)映射器的常規(guī)應(yīng)用之一是生成基本庫(kù)存報(bào)告。這對(duì)網(wǎng)絡(luò)地圖、維護(hù)網(wǎng)絡(luò)設(shè)備和節(jié)點(diǎn)一致的更新、還有識(shí)別流氓、未授權(quán)或遺忘設(shè)備都很實(shí)用。
盤(pán)點(diǎn)的基本掃描利用ping掃描。例如,接下來(lái)的掃描顯示了在192.168.1.0/24網(wǎng)絡(luò)中可用的主機(jī)。-sP指示Nmap進(jìn)行一次ping掃描,而-n則指示不要進(jìn)行名稱(chēng)解析。
nmap -sP -n 192.168.1.0/24 Starting Nmap 4.76 (http://nmap.org) at 2009-05-14 10:18 CDT Host 192.168.1.1 appears to be up. MAC Address: 00:18:3A:A4:43:BA (Westell Technologies) Host 192.168.1.2 appears to be up. Host 192.168.1.3 appears to be up. MAC Address: 00:17:EE:01:95:19 (Motorola CHS) Host 192.168.1.4 appears to be up. MAC Address: 00:16:CB:A3:27:E4 (Apple Computer) Host 192.168.1.5 appears to be up. MAC Address: 00:1E:52:7D:84:7E (Apple) Nmap done: 256 IP addresses (5 hosts up) scanned in 2.17 seconds
這次ping掃描對(duì)于快速建立庫(kù)存清單非常實(shí)用。它也可以是更復(fù)雜腳本和程序驗(yàn)證網(wǎng)絡(luò)地址和變化的結(jié)構(gòu)單元。舉例來(lái)說(shuō),下面的命令報(bào)告了從兩個(gè)日常掃描輸出到文本文件的網(wǎng)絡(luò)中的新主機(jī)(192.168.1.5):
diff monday.scan tuesday.scan | grep "> Host" > Host 192.168.1.5 appears to be up.
指定主機(jī)型盤(pán)點(diǎn)
看一看決定服務(wù)運(yùn)行的特定主機(jī),你可以使用Nmap。例如,讓我們更近地看看192.168.1.5,它看上去是周一掃描后周二掃描前某個(gè)時(shí)候被發(fā)現(xiàn)的:
nmap -n 192.168.1.5 Starting Nmap 4.76 ( http://nmap.org ) at 2009-05-14 12:44 CDT Interesting ports on 192.168.1.5: Not shown: 984 closed ports PORT STATE SERVICE 22/tcp open ssh 88/tcp open kerberos-sec 111/tcp open rpcbind 139/tcp open netbios-ssn 445/tcp open microsoft-ds 515/tcp open printer 548/tcp open afp 631/tcp open ipp 1021/tcp open unknown 1022/tcp open unknown 1023/tcp open netvenuechat 2049/tcp open nfs 3300/tcp open unknown 5900/tcp open vnc 20221/tcp open unknown 20222/tcp open unknown MAC Address: 00:16:CB:A3:27:E4 (Apple Computer) Nmap done: 1 IP address (1 host up) scanned in 10.46 seconds
它看上去是以ssh為基礎(chǔ)的基于Unix系統(tǒng),但是MAC地址識(shí)別讓這個(gè)系統(tǒng)非常像一臺(tái)Apple MAC電腦。但是,近看運(yùn)用Nmap的服務(wù)和版本檢測(cè),可以收集更多信息。-sV參數(shù)用在這里:
mb3:~ root# nmap -n -sV 192.168.1.5 Starting Nmap 4.76 ( http://nmap.org ) at 2009-05-14 12:47 CDT Interesting ports on 192.168.1.5: Not shown: 984 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.1 (protocol 1.99) 88/tcp open kerberos-sec Mac OS X kerberos-sec 111/tcp open rpcbind 139/tcp open netbios-ssn Samba smbd 3.X (workgroup: WORKGROUP) 445/tcp open netbios-ssn Samba smbd 3.X (workgroup: WORKGROUP) 515/tcp open printer 548/tcp open afp? 631/tcp open ipp CUPS 1.3 1021/tcp open rpcbind 1022/tcp open rpcbind 1023/tcp open rpcbind 2049/tcp open rpcbind 3300/tcp open unknown? 5900/tcp open vnc VNC (protocol 3.8) 20221/tcp open unknown? 20222/tcp open unknown?
盡管會(huì)返回?cái)?shù)據(jù),我還是為未識(shí)別的數(shù)據(jù)服務(wù)。
如果你知道這個(gè)服務(wù)/版本,請(qǐng)?zhí)峤灰韵轮讣y到http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port548-TCP:V=4.76%I=7%D=5/14%Time=4A0C5929%P=i386-apple-darwin9.4.0%r( SF:SSLSessionReq,172,"\x01\x03\0\0Q\xec\xff\xff\0\0\x01b\0\0\0\0\0\x18\0\" AD9 SF:6FA5112ED039C\0\x04mini"); MAC Address: 00:16:CB:A3:27:E4 (Apple Computer) Service Info: OS: Mac OS X Host script results: | Discover OS Version over NetBIOS and SMB: Unix |_ Discover system time over SMB: 2009-05-14 12:49:02 UTC-5 Service detection performed. Please report any incorrect results athttp://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 119.68 seconds
現(xiàn)在管理員知道它是MAC操作系統(tǒng)X,并且它用于使用Samba的Windows文件分享,它最可能通過(guò)CUPS分享打印機(jī),并且這個(gè)系統(tǒng)是針對(duì)遠(yuǎn)程管理用虛擬網(wǎng)絡(luò)計(jì)算配置。
安全的Nmap運(yùn)用
正如上文所說(shuō)的,Nmap對(duì)管理員來(lái)說(shuō)很實(shí)用,它在安全審計(jì)方面的能力也很強(qiáng)大。例如,很多公司不允許網(wǎng)絡(luò)服務(wù)器在用戶(hù)網(wǎng)絡(luò)中運(yùn)行(如連接了用戶(hù)電腦和筆記本的網(wǎng)絡(luò))。Nmap可以通過(guò)運(yùn)行在知名端口80和443的網(wǎng)絡(luò)服務(wù)很容易地用于識(shí)別所有系統(tǒng):
nmap -n -p 80,443 192.168.1.0/24 | egrep "ports|open" Interesting ports on 192.168.1.1: 80/tcp open http 443/tcp open https Interesting ports on 192.168.1.2: Interesting ports on 192.168.1.3: Interesting ports on 192.168.1.4: Interesting ports on 192.168.1.5:
另一個(gè)有用的特征是識(shí)別特定版本來(lái)決定系統(tǒng)是否易受某一預(yù)報(bào)弱點(diǎn)的攻擊。例如,讓我們假設(shè)Samba團(tuán)隊(duì)已經(jīng)預(yù)報(bào)一項(xiàng)某特定版本Samba的安全事故,你需要辨認(rèn)所有的Samba版本。下文報(bào)告這些Samba版本:
nmap -n -sV -p 139 192.168.1.0/24 | egrep "ports|139" Interesting ports on 192.168.1.1: 139/tcp closed netbios-ssn Interesting ports on 192.168.1.2: 139/tcp closed netbios-ssn Interesting ports on 192.168.1.3: 139/tcp filtered netbios-ssn Interesting ports on 192.168.1.4: 139/tcp open netbios-ssn Samba smbd 3.2 (workgroup: HQ) Interesting ports on 192.168.1.5: 139/tcp open netbios-ssn Samba smbd 2.1 (workgroup: REMOTE)
Interesting ports on 192.168.1.15: 139/tcp open netbios-ssn Samba smbd 3.2 (workgroup: WORKGROUP)
該技巧已經(jīng)展示了Nmap如何用于網(wǎng)絡(luò)盤(pán)點(diǎn)掃描、更徹底的盤(pán)點(diǎn)和審計(jì)、識(shí)別未授權(quán)服務(wù)并協(xié)助安全攻擊評(píng)估。Nmap是隨時(shí)可用的好工具„把它和檢索目標(biāo)行命令或搜索文件中的特定字符串連結(jié)在一起,它會(huì)變成有力的報(bào)告工具。