hacktricks/network-services-pentesting/10000-network-data-management-protocol-ndmp.md
Translator workflow 75e8745ba3 Translated to Hindi
2023-11-06 08:38:02 +00:00

7.7 KiB

☁️ HackTricks Cloud ☁️ -🐦 Twitter 🐦 - 🎙️ Twitch 🎙️ - 🎥 Youtube 🎥

प्रोटोकॉल जानकारी

NDMP, यानी नेटवर्क डेटा प्रबंधन प्रोटोकॉल, एक प्रोटोकॉल है जो नेटवर्क एटैच्ड स्टोरेज [NAS](https://en.wikipedia.org/wiki/Network-attached_storage) उपकरणों और बैकअप उपकरणों के बीच डेटा ले जाने के लिए बनाया गया है। इससे बैकअप सर्वर के माध्यम से डेटा ले जाने की आवश्यकता नहीं होती है, जिससे गति में सुधार होता है और बैकअप सर्वर से लोड हट जाता है। Wikipedia से।

डिफ़ॉल्ट पोर्ट: 10000

PORT      STATE SERVICE REASON  VERSION
10000/tcp open  ndmp    syn-ack Symantec/Veritas Backup Exec ndmp

जांच


Network Data Management Protocol (NDMP)

The Network Data Management Protocol (NDMP) is a protocol used for managing and controlling data backup and recovery operations in a networked storage environment. It allows for the transfer of data between a backup application and a storage device or media server.

Enumeration Techniques

Enumeration is the process of gathering information about a target system or network. In the case of NDMP, enumeration techniques can be used to gather information about the NDMP server, such as its version, supported features, and configuration settings.

1. Banner Grabbing

Banner grabbing is a technique used to gather information about a target system by capturing the banner or header information that is sent by the system when a connection is established. This can be done using tools like Telnet or Netcat.

To perform banner grabbing on an NDMP server, you can use the following command:

$ telnet <target_ip> <port>

Once connected, the server banner will be displayed, providing information about the NDMP server.

2. Port Scanning

Port scanning is the process of scanning a target system or network to identify open ports and the services running on those ports. This can be done using tools like Nmap.

To perform a port scan on an NDMP server, you can use the following command:

$ nmap -p <port> <target_ip>

This will scan the specified port on the target IP address and provide information about the open ports and the services running on them.

3. Service Enumeration

Service enumeration involves identifying the services running on a target system or network. This can be done using tools like Nmap or by manually inspecting the open ports.

To enumerate the services running on an NDMP server, you can use the following command:

$ nmap -sV <target_ip>

This will scan the target IP address and attempt to identify the services running on the open ports.


References

nmap -n -sV --script "ndmp-fs-info or ndmp-version" -p 10000 <IP> #Both are default scripts

शोडन

ndmp

☁️ हैकट्रिक्स क्लाउड ☁️ -🐦 ट्विटर 🐦 - 🎙️ ट्विच 🎙️ - 🎥 यूट्यूब 🎥