examinando redes com nmap
DESCRIPTION
A palestra tem como objetivo principal ajudar o participante a entender como funciona o Nmap e como pode ajudá-lo em suas tarefas diárias.TRANSCRIPT
![Page 2: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/2.jpg)
1,1Bilhão de dólares
Perdas em decorrência de incidentes de segurança.
Fonte: Revista Exame
![Page 3: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/3.jpg)
x 5.729
Isso é o mesmo que...
![Page 4: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/4.jpg)
x 6.233
Isso é o mesmo que...
![Page 5: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/5.jpg)
ReduzaRiscos
![Page 6: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/6.jpg)
Unagi
![Page 7: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/7.jpg)
Histórico
![Page 8: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/8.jpg)
![Page 9: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/9.jpg)
E o Oscar vai para...
![Page 10: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/10.jpg)
Fases da varredura
3Resolução DNS reverso
4Examede portas
1Enumeração de alvos
2Descobertade hosts
5Detecção de versão
6Detecçãode S.O.
7Traceroute
8Examede Script
9Saída9Saída(Resultado)
![Page 11: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/11.jpg)
Varredura de portas
é crime ?““
Depende.
![Page 12: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/12.jpg)
Principalmente porque
a legislação pode variar.
![Page 13: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/13.jpg)
Mas e se
alguém espiasse você?
![Page 14: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/14.jpg)
Na dúvida,
peçapermissão.
![Page 15: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/15.jpg)
Como o Nmap pode
nos ajudar?““
![Page 16: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/16.jpg)
1Inventário de hosts
![Page 17: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/17.jpg)
Inventário de HostsLeve em conta
1. Se precisa de um levantamento de S. O.2. Quanta banda possui disponível.3. Como automatizar o processo.
#nmap –sS –O –T3 -oA invent 10.0.0.1/24
![Page 18: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/18.jpg)
Inventário de HostsE depois?
Nmap::ScannerNmap::Parser Interpretadores XML do Nmap
![Page 19: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/19.jpg)
Procure por
padrões.
![Page 20: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/20.jpg)
Se você usa Nagios
Nmap2Nagios-ng - http://bit.ly/dm4YaUNmap3Nagios - http://bit.ly/abrttC
Bastante úteis:
![Page 21: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/21.jpg)
![Page 22: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/22.jpg)
![Page 23: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/23.jpg)
2 Varredura de vulnerabilidades
![Page 24: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/24.jpg)
Varredura de VulnerabilidadesLeve em conta
1. Quais os protocolos do serviço vulnerável.2. Quais as portas do serviço vulnerável.3. Se existe um script para a NSE pronto.
# nmap –PE -sV -sU -p U:1434 // -oA sql_svr 10.0.0.1-255
![Page 25: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/25.jpg)
Sabedoria Ninja #1
![Page 26: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/26.jpg)
3Testar oFirewall
![Page 27: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/27.jpg)
Teste o FirewallLeve em conta
1. Configuração do firewall.2. O resultado esperado.3. Ordem das portas analisadas.
# nmap –PO –sA –r fw1.dominio.com
![Page 28: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/28.jpg)
Sabedoria Ninja #2
![Page 29: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/29.jpg)
Como faço para ir
mais rápido?““
![Page 30: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/30.jpg)
Para conquistar,
divida.
![Page 31: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/31.jpg)
Antes de começar,
planeje.
![Page 32: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/32.jpg)
Defenda-se!
![Page 33: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/33.jpg)
Exames pró-ativos
![Page 34: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/34.jpg)
Bloqueie e retardeno firewall
![Page 35: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/35.jpg)
Detectevarreduras
![Page 36: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/36.jpg)
Abordagens mais comuns
X
![Page 37: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/37.jpg)
A chave é
equilíbrio.
![Page 38: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/38.jpg)
Defesas contra NmapAlgumas dicas básicas
Realizeexames pró-ativos
Bloqueie e retarde noFirewall
DetecteVarreduras
![Page 39: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/39.jpg)
O que vem
agora?
![Page 40: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/40.jpg)
Alguns livros sobre Nmap
![Page 41: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/41.jpg)
Site do NmapSempre mais atual
www.nmap.org
![Page 42: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/42.jpg)
E
lembre-se!
![Page 43: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/43.jpg)
Experimente!
![Page 45: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/45.jpg)
AgradecimentosColaboraram para esta apresentação
André Lima, Gordon “Fyodor” Lyon, Sávio Mendes, Vanessa Maia e a equipe desuporte do Instituto Infnet.
Agradecimentos especiais a minha namorada Renata Senna, que ajudouenormemente com o layout dessa apresentação.
![Page 46: Examinando redes com Nmap](https://reader037.vdocuments.site/reader037/viewer/2022102400/55583a36d8b42ac6078b4b02/html5/thumbnails/46.jpg)
CréditosImagensComputer room 2. Ante Vekic (http://www.sxc.hu/photo/1237883)Crossroads Sign 2. Patricio Mas (http://www.sxc.hu/photo/891878)Darío Conca. Felipe Gabriel/Lancenet (http://tinyurl.com/2csnslb)Fire Alarm 1. Steven Trousdale (http://www.sxc.hu/photo/1231666)Gavel. Jason Morrison - (http://www.sxc.hu/photo/952313)Gordon "Fyodor" Lyon. (www.nmap.org)Monkeys not monkeying around. Kevin Rohr - (http://www.sxc.hu/photo/139755)moster!!!. Supreet Vaid (http://www.sxc.hu/photo/263315)Nmap. Alexis Mancini (http://nmap.org/nmap_propaganda.html)Phrack. Phrack Magazine (http://www.phrack.org/)Ross “Unagi”. (friendsgeneration.com)Route. Helmut Gevert (http://www.sxc.hu/photo/788115)Sherlock Holmes. Marija Gjurgjan (http://www.sxc.hu/photo/968046)Sneak Peek. Armin Hanisch (http://www.sxc.hu/photo/764984)Surfing the waves 2. Matthew Bowden (http://www.sxc.hu/photo/1013656)To Sign a Contract 2. shho (http://www.sxc.hu/photo/1221951)Turtle. Jean Scheijen (http://www.sxc.hu/photo/648657)Wireless. Stephan Hempelmann (http://www.sxc.hu/photo/437031)