hacktricks/network-services-pentesting/113-pentesting-ident.md

6.4 KiB

113 - Kupima Ident

Jifunze kuhusu kuvamia AWS kutoka sifuri hadi shujaa na htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)!

Njia nyingine za kusaidia HackTricks:

Tumia Trickest kujenga na kutumia mifumo ya kazi kwa urahisi ikiwa na zana za jamii za hali ya juu zaidi duniani.
Pata Ufikiaji Leo:

{% embed url="https://trickest.com/?utm_campaign=hacktrics&utm_medium=banner&utm_source=hacktricks" %}

Taarifa Msingi

Itifaki ya Ident hutumiwa kwenye Mtandao kuunganisha unganisho la TCP na mtumiaji maalum. Iliundwa awali kusaidia katika usimamizi wa mtandao na usalama, inafanya kazi kwa kuruhusu seva kuuliza mteja kwenye bandari 113 ili kuomba habari kuhusu mtumiaji wa unganisho la TCP fulani.

Hata hivyo, kutokana na wasiwasi wa faragha wa kisasa na uwezekano wa matumizi mabaya, matumizi yake yamepungua kwani inaweza kwa bahati mbaya kufunua habari za mtumiaji kwa vyama visivyoruhusiwa. Hatua za usalama zilizoboreshwa, kama vile unganisho lililofichwa na udhibiti mkali wa ufikiaji, zinapendekezwa ili kupunguza hatari hizi.

Bandari ya chaguo: 113

PORT    STATE SERVICE
113/tcp open  ident

Uchambuzi

Kwa Mikono - Pata mtumiaji/Tambua huduma

Ikiwa mashine inaendesha huduma ya ident na samba (445) na umehusishwa na samba ukitumia bandari 43218. Unaweza kupata ni mtumiaji yupi anayeendesha huduma ya samba kwa kufanya:

Ikiwa tu unabonyeza kuingia unapohusishwa na huduma:

Makosa mengine:

Nmap

Kwa chaguo-msingi (`-sC``) nmap itatambua kila mtumiaji wa kila bandari inayoendeshwa:

PORT    STATE SERVICE     VERSION
22/tcp  open  ssh         OpenSSH 4.3p2 Debian 9 (protocol 2.0)
|_auth-owners: root
| ssh-hostkey:
|   1024 88:23:98:0d:9d:8a:20:59:35:b8:14:12:14:d5:d0:44 (DSA)
|_  2048 6b:5d:04:71:76:78:56:96:56:92:a8:02:30:73:ee:fa (RSA)
113/tcp open  ident
|_auth-owners: identd
139/tcp open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: LOCAL)
|_auth-owners: root
445/tcp open  netbios-ssn Samba smbd 3.0.24 (workgroup: LOCAL)
|_auth-owners: root

Ident-user-enum

Ident-user-enum ni skripti ya PERL ya kimsingi kutafuta huduma ya ident (113/TCP) ili kubaini mmiliki wa mchakato unayesikiliza kila bandari ya TCP kwenye mfumo wa lengo. Orodha ya majina ya watumiaji iliyokusanywa inaweza kutumika kwa mashambulizi ya kuhadithi nywila kwenye huduma zingine za mtandao. Inaweza kusakinishwa kwa kutumia apt install ident-user-enum.

root@kali:/opt/local/recon/192.168.1.100# ident-user-enum 192.168.1.100 22 113 139 445
ident-user-enum v1.0 ( http://pentestmonkey.net/tools/ident-user-enum )

192.168.1.100:22  root
192.168.1.100:113 identd
192.168.1.100:139 root
192.168.1.100:445 root

Shodan

  • oident

Files

identd.conf

Tumia Trickest kujenga na kutumia mifumo ya kazi kwa kutumia zana za jamii za juu kabisa duniani.
Pata Ufikiaji Leo:

{% embed url="https://trickest.com/?utm_campaign=hacktrics&utm_medium=banner&utm_source=hacktricks" %}

Amri za Kiotomatiki za HackTricks

Protocol_Name: Ident    #Protocol Abbreviation if there is one.
Port_Number:  113     #Comma separated if there is more than one.
Protocol_Description: Identification Protocol         #Protocol Abbreviation Spelled out

Entry_1:
Name: Notes
Description: Notes for Ident
Note: |
The Ident Protocol is used over the Internet to associate a TCP connection with a specific user. Originally designed to aid in network management and security, it operates by allowing a server to query a client on port 113 to request information about the user of a particular TCP connection.

https://book.hacktricks.xyz/pentesting/113-pentesting-ident

Entry_2:
Name: Enum Users
Description: Enumerate Users
Note: apt install ident-user-enum    ident-user-enum {IP} 22 23 139 445 (try all open ports)
Jifunze AWS hacking kutoka sifuri hadi shujaa na htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)!

Njia nyingine za kusaidia HackTricks: