mirror of
https://github.com/carlospolop/hacktricks
synced 2024-12-12 22:33:13 +00:00
111 lines
7.2 KiB
Markdown
111 lines
7.2 KiB
Markdown
<details>
|
||
|
||
<summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks云 ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 推特 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>🎙️ Twitch 🎙️</strong></a> - <a href="https://www.youtube.com/@hacktricks_LIVE"><strong>🎥 Youtube 🎥</strong></a></summary>
|
||
|
||
- 你在一家**网络安全公司**工作吗?你想在HackTricks中看到你的**公司广告**吗?或者你想获得**PEASS的最新版本或下载HackTricks的PDF**吗?请查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
|
||
|
||
- 发现我们的独家[**NFTs**](https://opensea.io/collection/the-peass-family)收藏品[**The PEASS Family**](https://opensea.io/collection/the-peass-family)
|
||
|
||
- 获取[**官方PEASS和HackTricks的衣物**](https://peass.creator-spring.com)
|
||
|
||
- **加入** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord群组**](https://discord.gg/hRep4RUj7f) 或 [**电报群组**](https://t.me/peass) 或 **关注**我在**推特**上的[**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/hacktricks_live)**。**
|
||
|
||
- **通过向[hacktricks repo](https://github.com/carlospolop/hacktricks)和[hacktricks-cloud repo](https://github.com/carlospolop/hacktricks-cloud)提交PR来分享你的黑客技巧**。
|
||
|
||
</details>
|
||
|
||
|
||
# **协议信息**
|
||
|
||
来自EtherNet/IP的维基百科文章[http://en.wikipedia.org/wiki/EtherNet/IP](http://en.wikipedia.org/wiki/EtherNet/IP)
|
||
|
||
> EtherNet/IP是在20世纪90年代末由Rockwell Automation开发的,作为Rockwell工业以太网网络解决方案的一部分。Rockwell给EtherNet/IP起了这个名字,并将其交给了ODVA,现在ODVA管理该协议,并通过要求新开发的使用该协议的产品遵守已建立的标准来确保多供应商系统的互操作性。
|
||
|
||
> EtherNet/IP最常用于工业自动化控制系统,例如水处理厂、制造工厂和公用事业。几家控制系统供应商已经开发了可通过EtherNet/IP进行通信的可编程自动化控制器和I/O。
|
||
|
||
通过使用列表标识消息(0x63)查询TCP/44818来正确定位EtherNet/IP设备。响应消息将确定它是否是EtherNet/IP设备,并解析信息以枚举设备。\
|
||
来自[这里](https://github.com/digitalbond/Redpoint)
|
||
|
||
**默认端口:** 44818 UDP/TCP
|
||
```
|
||
PORT STATE SERVICE
|
||
44818/tcp open EtherNet/IP
|
||
```
|
||
# **枚举**
|
||
|
||
Enumeration is the process of gathering information about a target network or system. In the context of Ethernet/IP, enumeration involves identifying and discovering devices, services, and configurations within the network.
|
||
|
||
枚举是收集有关目标网络或系统的信息的过程。在以太网/IP的上下文中,枚举涉及识别和发现网络中的设备、服务和配置。
|
||
|
||
## **Scanning for Ethernet/IP Devices**
|
||
|
||
## **扫描以太网/IP设备**
|
||
|
||
To scan for Ethernet/IP devices, you can use tools like Nmap or specialized tools like `enum4linux`. These tools can help you identify devices that are using the Ethernet/IP protocol.
|
||
|
||
要扫描以太网/IP设备,可以使用Nmap等工具,或者专门的工具如`enum4linux`。这些工具可以帮助您识别使用以太网/IP协议的设备。
|
||
|
||
Here is an example of using Nmap to scan for Ethernet/IP devices:
|
||
|
||
以下是使用Nmap扫描以太网/IP设备的示例:
|
||
|
||
```plaintext
|
||
nmap -p 44818 --script=ethernet-ip-enumeration <target>
|
||
```
|
||
|
||
## **Identifying Ethernet/IP Services**
|
||
|
||
## **识别以太网/IP服务**
|
||
|
||
Once you have identified Ethernet/IP devices, the next step is to identify the services running on these devices. This can be done using tools like `enum4linux` or by manually inspecting the network traffic.
|
||
|
||
一旦您识别出以太网/IP设备,下一步是识别这些设备上运行的服务。可以使用`enum4linux`等工具,也可以通过手动检查网络流量来完成。
|
||
|
||
## **Enumerating Ethernet/IP Configurations**
|
||
|
||
## **枚举以太网/IP配置**
|
||
|
||
To enumerate Ethernet/IP configurations, you can use tools like `enum4linux` or `nmap`. These tools can help you gather information about the network topology, device configurations, and other relevant details.
|
||
|
||
要枚举以太网/IP配置,可以使用`enum4linux`或`nmap`等工具。这些工具可以帮助您收集有关网络拓扑、设备配置和其他相关详细信息的信息。
|
||
|
||
## **Exploiting Ethernet/IP Vulnerabilities**
|
||
|
||
## **利用以太网/IP漏洞**
|
||
|
||
Once you have gathered enough information about the Ethernet/IP network, you can proceed to exploit any vulnerabilities that you have discovered. This may involve using tools like Metasploit or developing custom exploits.
|
||
|
||
一旦您收集到足够的以太网/IP网络信息,可以继续利用您发现的任何漏洞。这可能涉及使用Metasploit等工具或开发自定义的利用工具。
|
||
|
||
## **Conclusion**
|
||
|
||
## **结论**
|
||
|
||
Enumeration is a crucial step in the process of network penetration testing. By identifying and gathering information about Ethernet/IP devices, services, and configurations, you can gain valuable insights that can be used to exploit vulnerabilities and secure the network.
|
||
|
||
枚举是网络渗透测试过程中的关键步骤。通过识别和收集有关以太网/IP设备、服务和配置的信息,您可以获得有价值的见解,这些见解可以用于利用漏洞和保护网络的安全。
|
||
```bash
|
||
nmap -n -sV --script enip-info -p 44818 <IP>
|
||
pip3 install cpppo
|
||
python3 -m cpppo.server.enip.list_services [--udp] [--broadcast] --list-identity -a <IP>
|
||
```
|
||
# Shodan
|
||
|
||
* `port:44818 "产品名称"`
|
||
|
||
|
||
<details>
|
||
|
||
<summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>🎙️ Twitch 🎙️</strong></a> - <a href="https://www.youtube.com/@hacktricks_LIVE"><strong>🎥 Youtube 🎥</strong></a></summary>
|
||
|
||
- 你在一家**网络安全公司**工作吗?想要在HackTricks中**宣传你的公司**吗?或者你想要**获取PEASS的最新版本或下载PDF格式的HackTricks**吗?请查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
|
||
|
||
- 发现我们的独家[**NFTs**](https://opensea.io/collection/the-peass-family)收藏品——[**The PEASS Family**](https://opensea.io/collection/the-peass-family)
|
||
|
||
- 获取[**官方PEASS和HackTricks周边产品**](https://peass.creator-spring.com)
|
||
|
||
- **加入**[**💬**](https://emojipedia.org/speech-balloon/) [**Discord群组**](https://discord.gg/hRep4RUj7f)或[**电报群组**](https://t.me/peass),或者**关注**我在**Twitter**上的[**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/hacktricks_live)**。**
|
||
|
||
- **通过向[hacktricks repo](https://github.com/carlospolop/hacktricks)和[hacktricks-cloud repo](https://github.com/carlospolop/hacktricks-cloud)提交PR来分享你的黑客技巧**。
|
||
|
||
</details>
|