Scanning and OS Fingerprinting

Here we will look at a lab in which we are connected to a environment where we have to enumerate devices in the network and also use some of the nmap switches to find the os running on the hosts.

Description

In this lab you will be connected to an enterprise network with some clients and servers. You have to map the network.

Goals

  • Run a ping scan with fping

  • Run a ping scan with nmap, do you find any differences? Can you tell why?

  • Perform a SYN scan against the targets. Identify clients and servers

  • Identify the version of every daemon listening on the network

  • Identify, if it is possible, the operating system running on each host

Tools

The best tools for this lab are:

  • fping

  • nmap

Solutions

lets verify if we are connected to the enterprise environment. That can be checked by checking the ip address.

as u can see, i'm connected to the enterprise network over the tap0interface.

we now know that we are now connected to the network with ip 10.142.111.240/24.

so now i'll do a ping sweep to detect other devices that are present in the network

these are the hosts that were present in the network.

Now we will run a ping scan on the same network with nmap ping scan as show below

nmap -sn 10.142.111.0/24

now we know the devices present in the network, lets go ahead and perform a syn scan on them,

In order to perform a syn scan we need root user permissions. So , make sure to use sudo if you are not running as a root.

please note that syn scan take a little longer to run as it is stealthy 🤫.

  • -sS -- use syn scan

  • -vv -- Verbose

now that we have results from the syn scan, we will go ahead and try to determine the Os and versions that are running the above hosts, by using -sV and -O, also lets use a option -A

  • -sV Version scan

  • -O for the os detection.

  • -A is for aggressive scanning (it runs NSE scripts like vuln to detect the vulnerabilities)

This table below summarizes the results:

Host

OS

Confidence

10.142.111.1

OpenBSD

92%

10.142.111.1

FreeBSD

87%

10.142.111.6

Unknown Linux

10.142.111.48

Windows XP SP3

100%

10.142.111.96

Unknown Linux

10.142.111.99

OpenBSD

92%

10.142.111.99

FreeBSD

87%

10.142.111.100

Unknown

10.142.111.213

Unknown Linux

i think that completes the scanning and Os fingerprinting. I recommend going through the nmap manual once before using the tools.

For more nmap commands and cheat sheet click here.

That it for today see ya, until next time bye 🥰

Last updated

Was this helpful?