# 194,6667,6660-7000 - Pentesting IRC
{% hint style="success" %}
Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\
Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Support HackTricks
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
* **Join the** π¬ [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** π¦ [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
{% endhint %}
## κΈ°λ³Έ μ 보
IRCλ μ²μμ **μΌλ° ν
μ€νΈ νλ‘ν μ½**λ‘, IANAμ μν΄ **194/TCP**λ‘ ν λΉλμμ§λ§, μΌλ°μ μΌλ‘ **6667/TCP** λ° μ μ¬ν ν¬νΈμμ μ€νλμ΄ **λ£¨νΈ κΆν** μμ΄ μλν μ μμ΅λλ€.
μλ²μ μ°κ²°νλ λ° νμν κ²μ **λλ€μ**λΏμ
λλ€. μ°κ²° ν, μλ²λ μ¬μ©μμ IPμ λν΄ μ DNS μ‘°νλ₯Ό μνν©λλ€.
μ¬μ©μλ λ λ§μ μ κ·Όμ μν΄ **μ¬μ©μ μ΄λ¦**κ³Ό **λΉλ°λ²νΈ**κ° νμν **μ΄μμ**μ μΌλ° **μ¬μ©μ**λ‘ λλ©λλ€. μ΄μμλ λ€μν μμ€μ κΆνμ κ°μ§λ©°, κ΄λ¦¬μ κΆνμ΄ κ°μ₯ λμ΅λλ€.
**κΈ°λ³Έ ν¬νΈ:** 194, 6667, 6660-7000
```
PORT STATE SERVICE
6667/tcp open irc
```
## Enumeration
### Banner
IRCλ **TLS**λ₯Ό μ§μν μ μμ΅λλ€.
```bash
nc -vn
openssl s_client -connect : -quiet
```
### Manual
μ¬κΈ°μμ **무μμ λλ€μ**μ μ¬μ©νμ¬ IRCμ μ°κ²°νκ³ μ‘μΈμ€ν λ€μ ν₯λ―Έλ‘μ΄ μ 보λ₯Ό λμ΄νλ λ°©λ²μ λ³Ό μ μμ΅λλ€. IRCμ λ λ§μ λͺ
λ Ήμ΄λ [μ¬κΈ°](https://en.wikipedia.org/wiki/List\_of\_Internet\_Relay\_Chat\_commands#USERIP)μμ νμΈν μ μμ΅λλ€.
```bash
#Connection with random nickname
USER ran213eqdw123 0 * ran213eqdw123
NICK ran213eqdw123
#If a PING : is responded you need to send
#PONG :
VERSION
HELP
INFO
LINKS
HELPOP USERCMDS
HELPOP OPERCMDS
OPERATOR CAPA
ADMIN #Admin info
USERS #Current number of users
TIME #Server's time
STATS a #Only operators should be able to run this
NAMES #List channel names and usernames inside of each channel -> Nombre del canal y nombre de las personas que estan dentro
LIST #List channel names along with channel banner
WHOIS #WHOIS a username
USERHOST #If available, get hostname of a user
USERIP #If available, get ip of a user
JOIN #Connect to a channel
#Operator creds Brute-Force
OPER
```
μλ²μ λΉλ°λ²νΈλ‘ λ‘κ·ΈμΈνλ €κ³ μλν μλ μμ΅λλ€. ngIRCdμ κΈ°λ³Έ λΉλ°λ²νΈλ `wealllikedebian`μ
λλ€.
```bash
PASS wealllikedebian
NICK patrick
USER test1 test2 :test3
```
### **IRC μλΉμ€ μ°ΎκΈ° λ° μ€μΊ**
```bash
nmap -sV --script irc-botnet-channels,irc-info,irc-unrealircd-backdoor -p 194,6660-7000
```
### [Brute Force](../generic-methodologies-and-resources/brute-force.md#irc)
### Shodan
* `νΈμ€νΈ μ΄λ¦ μ‘°ν`
{% hint style="success" %}
Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\
Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Support HackTricks
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
* **Join the** π¬ [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** π¦ [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
{% endhint %}