mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-26 14:40:37 +00:00
59 lines
4.4 KiB
Markdown
59 lines
4.4 KiB
Markdown
<details>
|
|
|
|
<summary><strong>htARTE (HackTricks AWS Red Team Expert)</strong>를 통해 AWS 해킹을 처음부터 전문가까지 배워보세요<strong>!</strong></summary>
|
|
|
|
HackTricks를 지원하는 다른 방법:
|
|
|
|
* **회사를 HackTricks에서 광고하거나 HackTricks를 PDF로 다운로드**하려면 [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)를 확인하세요!
|
|
* [**공식 PEASS & HackTricks 스웨그**](https://peass.creator-spring.com)를 얻으세요.
|
|
* [**The PEASS Family**](https://opensea.io/collection/the-peass-family)를 발견하세요. 독점적인 [**NFTs**](https://opensea.io/collection/the-peass-family) 컬렉션입니다.
|
|
* 💬 [**Discord 그룹**](https://discord.gg/hRep4RUj7f) 또는 [**텔레그램 그룹**](https://t.me/peass)에 **참여**하거나 **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)을 **팔로우**하세요.
|
|
* **Hacking 트릭을 공유하려면 PR을** [**HackTricks**](https://github.com/carlospolop/hacktricks) **및** [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) **github 저장소에 제출하세요.**
|
|
|
|
</details>
|
|
|
|
|
|
# **프로토콜 정보**
|
|
|
|
[Wikipedia](https://en.wikipedia.org/wiki/NDMP)에서 가져온 내용:
|
|
|
|
> **NDMP** 또는 **Network Data Management Protocol**은 네트워크에 연결된 저장소 장치([NAS](https://en.wikipedia.org/wiki/Network-attached_storage))와 백업 장치 간에 데이터를 전송하기 위한 프로토콜입니다. 이를 통해 데이터를 백업 서버 자체를 통해 전송할 필요가 없어져 속도가 향상되고 백업 서버의 부하가 줄어듭니다.
|
|
|
|
**기본 포트:** 10000
|
|
```text
|
|
PORT STATE SERVICE REASON VERSION
|
|
10000/tcp open ndmp syn-ack Symantec/Veritas Backup Exec ndmp
|
|
```
|
|
# **열거**
|
|
|
|
Enumeration is the process of gathering information about a target network or system. It involves identifying and collecting data such as open ports, running services, and user accounts. Enumeration is an essential step in the hacking process as it provides valuable information that can be used to exploit vulnerabilities and gain unauthorized access.
|
|
|
|
There are various techniques and tools that can be used for enumeration, including port scanning, service identification, and user enumeration. Each technique focuses on a specific aspect of the target network or system and helps in building a comprehensive picture of its infrastructure.
|
|
|
|
During enumeration, it is important to be thorough and systematic. This involves scanning all possible ports, identifying all running services, and enumerating all user accounts. The collected information should be carefully analyzed to identify potential vulnerabilities and weaknesses that can be exploited.
|
|
|
|
Enumeration can be performed manually or using automated tools. Manual enumeration requires a deep understanding of network protocols and services, while automated tools can simplify the process by scanning and collecting data automatically.
|
|
|
|
Overall, enumeration is a critical phase in the hacking process as it provides the necessary information to plan and execute successful attacks. By understanding the target network or system, hackers can identify and exploit vulnerabilities, ultimately gaining unauthorized access.
|
|
```bash
|
|
nmap -n -sV --script "ndmp-fs-info or ndmp-version" -p 10000 <IP> #Both are default scripts
|
|
```
|
|
## Shodan
|
|
|
|
`ndmp`
|
|
|
|
|
|
|
|
<details>
|
|
|
|
<summary><strong>htARTE (HackTricks AWS Red Team Expert)</strong>를 통해 AWS 해킹을 처음부터 전문가까지 배워보세요<strong>!</strong></summary>
|
|
|
|
HackTricks를 지원하는 다른 방법:
|
|
|
|
* **회사를 HackTricks에서 광고하거나 HackTricks를 PDF로 다운로드**하려면 [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)를 확인하세요!
|
|
* [**공식 PEASS & HackTricks 스웨그**](https://peass.creator-spring.com)를 얻으세요.
|
|
* [**The PEASS Family**](https://opensea.io/collection/the-peass-family)를 발견하세요. 독점적인 [**NFTs**](https://opensea.io/collection/the-peass-family) 컬렉션입니다.
|
|
* 💬 [**Discord 그룹**](https://discord.gg/hRep4RUj7f) 또는 [**텔레그램 그룹**](https://t.me/peass)에 **참여**하거나 **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)을 **팔로우**하세요.
|
|
* **HackTricks**와 **HackTricks Cloud** github 저장소에 PR을 제출하여 **해킹 기교를 공유**하세요.
|
|
|
|
</details>
|