6.4 KiB
113 - Pentesting Ident
{% hint style="success" %}
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
Use Trickest to easily build and automate workflows powered by the world's most advanced community tools.
Get Access Today:
{% embed url="https://trickest.com/?utm_source=hacktricks&utm_medium=banner&utm_campaign=ppc&utm_content=113-pentesting-ident" %}
Basic Information
Ident protokol se koristi preko Interneta za povezivanje TCP veze sa specifičnim korisnikom. Prvobitno dizajniran da pomogne u upravljanju mrežom i bezbednosti, funkcioniše tako što omogućava serveru da upita klijenta na portu 113 kako bi zatražio informacije o korisniku određene TCP veze.
Međutim, zbog savremenih briga o privatnosti i potencijala za zloupotrebu, njegova upotreba je opala jer može nenamerno otkriti informacije o korisniku neovlašćenim stranama. Preporučuju se poboljšane mere bezbednosti, kao što su enkriptovane veze i stroge kontrole pristupa, kako bi se umanjili ovi rizici.
Podrazumevani port: 113
PORT STATE SERVICE
113/tcp open ident
Enumeracija
Ručna - Dobijanje korisnika/Identifikacija usluge
Ako mašina pokreće uslugu ident i samba (445) i povezani ste na sambu koristeći port 43218. Možete saznati koji korisnik pokreće samba uslugu tako što ćete uraditi:
Ako samo pritisnete enter kada se povežete na uslugu:
Druge greške:
Nmap
Podrazumevano (`-sC``) nmap će identifikovati svakog korisnika svake aktivne usluge:
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 4.3p2 Debian 9 (protocol 2.0)
|_auth-owners: root
| ssh-hostkey:
| 1024 88:23:98:0d:9d:8a:20:59:35:b8:14:12:14:d5:d0:44 (DSA)
|_ 2048 6b:5d:04:71:76:78:56:96:56:92:a8:02:30:73:ee:fa (RSA)
113/tcp open ident
|_auth-owners: identd
139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: LOCAL)
|_auth-owners: root
445/tcp open netbios-ssn Samba smbd 3.0.24 (workgroup: LOCAL)
|_auth-owners: root
Ident-user-enum
Ident-user-enum je jednostavan PERL skript za upit ident servisu (113/TCP) kako bi se odredio vlasnik procesa koji sluša na svakom TCP portu ciljnog sistema. Lista korisničkih imena prikupljenih može se koristiti za napade pogađanja lozinki na drugim mrežnim servisima. Može se instalirati sa apt install ident-user-enum
.
root@kali:/opt/local/recon/192.168.1.100# ident-user-enum 192.168.1.100 22 113 139 445
ident-user-enum v1.0 ( http://pentestmonkey.net/tools/ident-user-enum )
192.168.1.100:22 root
192.168.1.100:113 identd
192.168.1.100:139 root
192.168.1.100:445 root
Shodan
oident
Files
identd.conf
Koristite Trickest za lako kreiranje i automatizaciju radnih tokova pokretanih najnaprednijim alatima zajednice na svetu.
Pribavite pristup danas:
{% embed url="https://trickest.com/?utm_source=hacktricks&utm_medium=banner&utm_campaign=ppc&utm_content=113-pentesting-ident" %}
HackTricks Automatic Commands
Protocol_Name: Ident #Protocol Abbreviation if there is one.
Port_Number: 113 #Comma separated if there is more than one.
Protocol_Description: Identification Protocol #Protocol Abbreviation Spelled out
Entry_1:
Name: Notes
Description: Notes for Ident
Note: |
The Ident Protocol is used over the Internet to associate a TCP connection with a specific user. Originally designed to aid in network management and security, it operates by allowing a server to query a client on port 113 to request information about the user of a particular TCP connection.
https://book.hacktricks.xyz/pentesting/113-pentesting-ident
Entry_2:
Name: Enum Users
Description: Enumerate Users
Note: apt install ident-user-enum ident-user-enum {IP} 22 23 139 445 (try all open ports)
{% hint style="success" %}
Učite i vežbajte AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Učite i vežbajte GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Podržite HackTricks
- Proverite planove pretplate!
- Pridružite se 💬 Discord grupi ili telegram grupi ili pratite nas na Twitteru 🐦 @hacktricks_live.
- Podelite hakerske trikove slanjem PR-ova na HackTricks i HackTricks Cloud github repozitorijume.