{"id":3737,"date":"2012-06-08T00:58:21","date_gmt":"2012-06-08T03:58:21","guid":{"rendered":"http:\/\/www.ethicalhacker.com.br\/site\/?p=3737"},"modified":"2019-07-18T12:26:43","modified_gmt":"2019-07-18T15:26:43","slug":"detectando-firewalls-com-nmap-2","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2012\/06\/basico\/detectando-firewalls-com-nmap-2\/","title":{"rendered":"Detectando Firewalls com NMAP"},"content":{"rendered":"<p style=\"text-align: justify;\">Neste pequeno artigo mostrarei como detectar firewalls utilizando o NMAP. \u00a0A t\u00e1tica consiste no exame atrav\u00e9s de ACK, ou seja, TCP ACK<br \/>\ntrabalha com apenas um bit ACK ligado, por\u00e9m, devido a normas\u00a0de RFC o alvo deve por obriga\u00e7\u00e3o responder atrav\u00e9s de pacotes\u00a0RST.<br \/>\nA partir de ent\u00e3o podemos verificar se as portas est\u00e3o com\u00a0regras de filtragem ou n\u00e3o.<\/p>\n<p style=\"text-align: justify;\">Em nosso alvo um Windows 7 192.168.42.1, habilitaremos o firewall.<\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/fw.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-3717\" title=\"fw\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/fw.png\"  alt=\"\" width=\"603\" height=\"556\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/fw.png 603w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/fw-300x276.png 300w\" sizes=\"auto, (max-width: 603px) 100vw, 603px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">Agora em nosso nosso BackTrack, utilizaremos o seguinte comando:\u00a0<strong># nmap -sA 192.168.42.1 -p 80, 3306<\/strong><\/p>\n<p style=\"text-align: justify;\">ou seja, estamos fazendo uma varredura na porta 80 http e na porta 3306 MySQL<\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/bk1f.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-3718\" title=\"bk1f\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/bk1f.png\"  alt=\"\" width=\"639\" height=\"195\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/bk1f.png 639w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/bk1f-300x91.png 300w\" sizes=\"auto, (max-width: 639px) 100vw, 639px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">Como resultado obtivemos ambas portas com status filtered ou filtrada., agora vamos desabilitar o firewall de nosso alvo e ver o que acontece.<\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/fwd.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-3719\" title=\"fwd\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/fwd.png\"  alt=\"\" width=\"600\" height=\"585\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/fwd.png 600w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/fwd-300x292.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">Por fim, vamos realizar nova varredura e analisar os resultados,\u00a0<strong># nmap -sA 192.168.42.1 -p 80, 3306<\/strong><\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/bkunf.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-3720\" title=\"bkunf\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/bkunf.png\"  alt=\"\" width=\"640\" height=\"200\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/bkunf.png 640w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/bkunf-300x93.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">Desta vez o resultado nos mostra ambas portas com status unfiltered ou n\u00e3o filtrada.<\/p>\n<p style=\"text-align: justify;\">E isso ai, at\u00e9 a pr\u00f3xima !<\/p>\n<p style=\"text-align: justify;\">\r\n\t\t<div class='author-shortcodes'>\r\n\t\t\t<div class='author-inner'>\r\n\t\t\t\t<div class='author-image'>\r\n\t\t\t<img src='https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/186048_100001838322519_1550894_n-11668_57x57.jpg' alt='' \/>\r\n\t\t\t<div class='author-overlay'><\/div>\r\n\t\t<\/div> <!-- .author-image --> \r\n\t\t<div class='author-info'>\r\n\t\t\t<p style=\"text-align: justify;\">Autor: S\u00edlvio C\u00e9sar Roxo Giavaroto<\/p>\n<p style=\"text-align: justify;\">\u00c9 MBA Especialista em Gest\u00e3o de Seguran\u00e7a da Informa\u00e7\u00e3o,\nTecn\u00f3logo em Redes de Computadores, C|EH Certified Ethical Hacker,\natua como Pentest e Analista de Seguran\u00e7a em Servidores Linux no\nGoverno do Estado de S\u00e3o Paulo, Professor Universit\u00e1rio , Instrutor\nC|EH e C|HFI.<\/p>\n<p style=\"text-align: justify;\">\r\n\t\t<\/div> <!-- .author-info --><\/p>\n<p style=\"text-align: justify;\">\r\n\t\t\t<\/div> <!-- .author-inner -->\r\n\t\t<\/div> <!-- .author-shortcodes --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Neste pequeno artigo mostrarei como detectar firewalls utilizando o NMAP. \u00a0A t\u00e1tica consiste no exame atrav\u00e9s de ACK, ou seja, TCP ACK trabalha com apenas um bit ACK ligado, por\u00e9m, devido a normas\u00a0de RFC o alvo deve por obriga\u00e7\u00e3o responder atrav\u00e9s de pacotes\u00a0RST. A partir de ent\u00e3o podemos verificar se as portas est\u00e3o com\u00a0regras de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3716,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[89,101],"tags":[],"class_list":["post-3737","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-basico","category-tutorial-backtrack"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/3737","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=3737"}],"version-history":[{"count":8,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/3737\/revisions"}],"predecessor-version":[{"id":10563,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/3737\/revisions\/10563"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/3716"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=3737"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=3737"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=3737"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}