Paso 1
Paso 2
Paso 3
Paso 4
Paso 5
Paso 6
Paso 7
Paso 8
Paso 9
Paso 10
Paso 11
11.1
11.2
root@kali:~# sudo minicom
Welcome to minicom 2.7.1
OPCIONES: I18n
Compilado en May 6 2018, 08:02:47.
Port /dev/ttyUSB0, 20:43:06
Presione CTRL-A Z para obtener ayuda sobre teclas especiales
{
CTRL-A Z for help | 115200 8N1 | NOR | Minicom 2.7.1 | VT102 | Desconectado |
0
root@kali:~# sudo nmap -Pn -p 80 192.168.1.62
Starting Nmap 7.60 ( https://nmap.org ) at 2024-05-31 20:46 EDT
setup_target: failed to determine route to 192.168.1.62
WARNING: No targets were specified, so 0 hosts scanned.
Nmap done: 0 IP addresses (0 hosts up) scanned in 0.06 seconds
root@kali:~# ifconfig
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 203.0.113.1 netmask 255.255.255.0 broadcast 203.0.113.255
inet6 2800:e2:8f80:1cc5:a00:27ff:fe23:f9f4 prefixlen 64 scopeid
0x0<global>
inet6 fe80::a00:27ff:fe23:f9f4 prefixlen 64 scopeid 0x20<link>
ether 08:00:27:23:f9:f4 txqueuelen 1000 (Ethernet)
RX packets 84 bytes 11336 (11.0 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 21 bytes 1646 (1.6 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 16 bytes 960 (960.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 16 bytes 960 (960.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
root@kali:~# eliminar sudo ip addr del 203.0.113.1/24 dev eth0
bash: eliminar: no se encontró la orden
root@kali:~# ping 192.168.1.62
connect: La red es inaccesible
root@kali:~# sudo ifconfig eth0 192.168.1.100 netmask 255.255.255.0
root@kali:~# ifconfig
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.1.100 netmask 255.255.255.0 broadcast 192.168.1.255
inet6 2800:e2:8f80:1cc5:a00:27ff:fe23:f9f4 prefixlen 64 scopeid
0x0<global>
inet6 fe80::a00:27ff:fe23:f9f4 prefixlen 64 scopeid 0x20<link>
ether 08:00:27:23:f9:f4 txqueuelen 1000 (Ethernet)
RX packets 166 bytes 21449 (20.9 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 22 bytes 1736 (1.6 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 16 bytes 960 (960.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 16 bytes 960 (960.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
root@kali:~# ping 192.168.1.62
PING 192.168.1.62 (192.168.1.62) 56(84) bytes of data.
64 bytes from 192.168.1.62: icmp_seq=1 ttl=255 time=106 ms
64 bytes from 192.168.1.62: icmp_seq=2 ttl=255 time=17.8 ms
64 bytes from 192.168.1.62: icmp_seq=3 ttl=255 time=37.6 ms
64 bytes from 192.168.1.62: icmp_seq=4 ttl=255 time=58.7 ms
64 bytes from 192.168.1.62: icmp_seq=5 ttl=255 time=90.0 ms
64 bytes from 192.168.1.62: icmp_seq=6 ttl=255 time=16.6 ms
64 bytes from 192.168.1.62: icmp_seq=7 ttl=255 time=11.7 ms
64 bytes from 192.168.1.62: icmp_seq=8 ttl=255 time=6.01 ms
^C
--- 192.168.1.62 ping statistics ---
8 packets transmitted, 8 received, 0% packet loss, time 7014ms
rtt min/avg/max/mdev = 6.018/43.166/106.610/35.720 ms
root@kali:~# sudo nmap -Pn -p 1-65535 192.168.1.62
Starting Nmap 7.60 ( https://nmap.org ) at 2024-05-31 20:50 EDT
Nmap scan report for 192.168.1.62
Host is up (0.034s latency).
Not shown: 65534 closed ports
PORT STATE SERVICE
80/tcp open http
MAC Address: 8C:AA:B5:D3:20:30 (Unknown)
Nmap done: 1 IP address (1 host up) scanned in 1448.90 seconds
root@kali:~# sudo nmap -Pn -p 1-65535 -sV 192.168.1.62
Starting Nmap 7.60 ( https://nmap.org ) at 2024-05-31 21:41 EDT
Nmap scan report for 192.168.1.62
Host is up (0.0079s latency).
Not shown: 65534 closed ports
PORT STATE SERVICE VERSION
80/tcp open http
1 service unrecognized despite returning data. If you know the service/version,
please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?
new-service :
SF-Port80-TCP:V=7.60%I=7%D=5/31%Time=665A7F55%P=x86_64-pc-linux-
gnu%r(GetR
SF:equest,60,"HTTP/1\.0\x20200\x20OK\r\nContent-Type:\x20text/plain\r\nCon
SF:tent-Length:\x2012\r\nConnection:\x20close\r\n\r\nHello,\x20world")%r(H
SF:TTPOptions,60,"HTTP/1\.0\x20200\x20OK\r\nContent-Type:\x20text/plain\r\
SF:nContent-Length:\x2012\r\nConnection:\x20close\r\n\r\nHello,\x20world")
SF:%r(RTSPRequest,60,"HTTP/1\.0\x20200\x20OK\r\nContent-Type:\x20text/plai
SF:n\r\nContent-Length:\x2012\r\nConnection:\x20close\r\n\r\nHello,\x20wor
SF:ld")%r(FourOhFourRequest,89,"HTTP/1\.0\x20404\x20Not\x20Found\r\
nConten
SF:t-Type:\x20text/html\r\nContent-Length:\x2047\r\nConnection:\x20close\r
SF:\n\r\nNot\x20found:\x20/nice%20ports%2C/Tri%6Eity\.txt%2ebak");
MAC Address: 8C:AA:B5:D3:20:30 (Unknown)
Service detection performed. Please report any incorrect results at
https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 908.45 seconds
root@kali:~#
de nuevo se abrio se agrego otro programa a la esp
root@kali:~# ifconfig
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 203.0.113.1 netmask 255.255.255.0 broadcast 203.0.113.255
inet6 2800:e2:8f80:1cc5:a00:27ff:fe23:f9f4 prefixlen 64 scopeid
0x0<global>
inet6 fe80::a00:27ff:fe23:f9f4 prefixlen 64 scopeid 0x20<link>
ether 08:00:27:23:f9:f4 txqueuelen 1000 (Ethernet)
RX packets 33 bytes 3876 (3.7 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 19 bytes 1466 (1.4 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 16 bytes 960 (960.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 16 bytes 960 (960.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
root@kali:~# sudo ip addr del 203.0.113.1/24 dev eth0
root@kali:~# sudo ip addr add 192.168.1.100/24 dev eth0
root@kali:~# ifconfig
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.1.100 netmask 255.255.255.0 broadcast 0.0.0.0
inet6 2800:e2:8f80:1cc5:a00:27ff:fe23:f9f4 prefixlen 64 scopeid
0x0<global>
inet6 fe80::a00:27ff:fe23:f9f4 prefixlen 64 scopeid 0x20<link>
ether 08:00:27:23:f9:f4 txqueuelen 1000 (Ethernet)
RX packets 68 bytes 8706 (8.5 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 19 bytes 1466 (1.4 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 16 bytes 960 (960.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 16 bytes 960 (960.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
root@kali:~# sudo nmap -Pn -p 1-65535 -sV 192.168.1.62
Starting Nmap 7.60 ( https://nmap.org ) at 2024-05-31 22:08 EDT
Nmap done: 1 IP address (0 hosts up) scanned in 0.81 seconds
root@kali:~# ping 192.168.1.62
PING 192.168.1.62 (192.168.1.62) 56(84) bytes of data.
64 bytes from 192.168.1.62: icmp_seq=1 ttl=255 time=53.1 ms
64 bytes from 192.168.1.62: icmp_seq=2 ttl=255 time=66.8 ms
64 bytes from 192.168.1.62: icmp_seq=3 ttl=255 time=89.8 ms
64 bytes from 192.168.1.62: icmp_seq=4 ttl=255 time=112 ms
64 bytes from 192.168.1.62: icmp_seq=5 ttl=255 time=36.1 ms
64 bytes from 192.168.1.62: icmp_seq=6 ttl=255 time=6.40 ms
64 bytes from 192.168.1.62: icmp_seq=7 ttl=255 time=8.20 ms
64 bytes from 192.168.1.62: icmp_seq=8 ttl=255 time=5.26 ms
^A64 bytes from 192.168.1.62: icmp_seq=9 ttl=255 time=5.50 ms
64 bytes from 192.168.1.62: icmp_seq=10 ttl=255 time=5.27 ms
^C
--- 192.168.1.62 ping statistics ---
10 packets transmitted, 10 received, 0% packet loss, time 9015ms
rtt min/avg/max/mdev = 5.262/38.953/112.847/37.987 ms
root@kali:~# sudo nmap -Pn -p 1-65535 -sV 192.168.1.62
Starting Nmap 7.60 ( https://nmap.org ) at 2024-05-31 22:09 EDT
Nmap scan report for 192.168.1.62
Host is up (0.011s latency).
Not shown: 65532 closed ports
PORT STATE SERVICE VERSION
80/tcp open http
443/tcp open https?
8080/tcp open http-proxy?
1 service unrecognized despite returning data. If you know the service/version,
please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?
new-service :
SF-Port80-TCP:V=7.60%I=7%D=5/31%Time=665A837B%P=x86_64-pc-linux-
gnu%r(GetR
SF:equest,6D,"HTTP/1\.0\x20200\x20OK\r\nContent-Type:\x20text/plain\r\nCon
SF:tent-Length:\x2025\r\nConnection:\x20close\r\n\r\nHello,\x20world\x20fr
SF:om\x20port\x2080");
MAC Address: 8C:AA:B5:D3:20:30 (Unknown)
Service detection performed. Please report any incorrect results at
https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 228.96 seconds
root@kali:~#