• Nenhum resultado encontrado

Princípios em Segurança da Informação

N/A
N/A
Protected

Academic year: 2021

Share "Princípios em Segurança da Informação"

Copied!
9
0
0

Texto

(1)

Princípios em Segurança da Informação

Atividade realizada:

Produzir Um relatório com todos os dados gerados a partir da

identificação de serviços e portas abertas na rede.

Método de uso: O Nmap (“Network Mapper”) uma ferramenta de código aberto para exploração de rede e auditoria de segurança. Ela foi desenhada para escanear rapidamente redes amplas, embora também funcione muito bem contra hosts individuais. O Nmap utiliza pacotes IP em estado bruto (raw) de maneira inovadora para determinar quais hosts estão disponíveis na rede, quais serviços (nome da aplicação e versão) os hosts oferecem, quais sistemas operacionais (e versões de SO) eles estão executando, que tipos de filtro de pacotes/firewalls estão em uso, e dezenas de outras características. Embora o Nmap seja normalmente utilizado para auditorias de segurança, muitos administradores de sistemas e rede consideram-no útil para tarefas rotineiras tais como inventário de rede, gerenciamento de serviços de atualização agendados, e monitoramento de host ou disponibilidade de serviço.

Comandos Usados para o escaneamento:

Nmap- Ultiliza-se como Comando mestre para o inicio do “Network Scan/Map”.

-sS- TCP SYN scan: Técnica também conhecida como “half-open”, pois não abre uma conexão TCP completa. É enviado um pacote SYN, como se ele fosse uma conexão real e aguarda uma resposta. Caso um pacote SYN-ACK seja recebido, a porta está aberta, enquanto um como resposta indica que a porta está fechada. A vantagem dessa abordagem é que poucos irão detectar esse scanning de portas.

–sV- Version detection: Após as portas TCP e/ou UDP serem descobertas por algum dos

métodos, o nmap irá determinar qual o serviço está rodando atualmente. O arquivo nmap-service-probes é utilizado para determinar tipos de protocolos, nome da aplicação, número da versão e outros detalhes.

Abaixo segue-se o relatório da rede com suas portas abertas.

StartingNmap 6.47 ( http://nmap.org ) at 2014-12-01 21:51 BRST Nmap scan report for 192.168.8.1

Host is up (0.027s latency). Not shown: 998 closed ports PORT STATE SERVICE 23/tcpopen telnet

80/tcpopen http

Nmap scan report for 192.168.8.102 Host is up (0.0011s latency).

Not shown: 990 filtered ports PORT STATE SERVICE 135/tcpopen msrpc 139/tcpopen netbios-ssn 445/tcpopen microsoft-ds 554/tcpopen rtsp 902/tcpopen iss-realsecure 912/tcpopen apex-mesh 2869/tcp openicslap

(2)

5357/tcp openwsdapi 10243/tcpopen unknown 49155/tcpopen unknown

Nmap scan report for 192.168.8.103 Host is up (0.0011s latency).

Not shown: 990 filtered ports PORT STATE SERVICE 135/tcpopen msrpc 139/tcpopen netbios-ssn 445/tcpopen microsoft-ds 554/tcpopen rtsp 902/tcpopen iss-realsecure 912/tcpopen apex-mesh 2869/tcp openicslap 5357/tcp openwsdapi 10243/tcpopen unknown 49155/tcpopen unknown

Nmap scan report for 192.168.8.104 Host is up (0.0012s latency).

Not shown: 990 filtered ports PORT STATE SERVICE 135/tcpopen msrpc 139/tcpopen netbios-ssn 445/tcpopen microsoft-ds 554/tcpopen rtsp 902/tcpopen iss-realsecure 912/tcpopen apex-mesh 2869/tcp openicslap 5357/tcp openwsdapi 10243/tcpopen unknown 49155/tcpopen unknown

Nmap scan report for 192.168.8.105 Host is up (0.0011s latency).

Not shown: 990 filtered ports PORT STATE SERVICE 135/tcpopen msrpc 139/tcpopen netbios-ssn 445/tcpopen microsoft-ds 554/tcpopen rtsp 902/tcpopen iss-realsecure 912/tcpopen apex-mesh 2869/tcp openicslap 5357/tcp openwsdapi 10243/tcpopen unknown 49156/tcpopen unknown

Nmap scan report for 192.168.8.110 Host is up (0.0012s latency).

Not shown: 990 filtered ports PORT STATE SERVICE 135/tcpopen msrpc

(3)

445/tcpopen microsoft-ds 554/tcpopen rtsp 902/tcpopen iss-realsecure 912/tcpopen apex-mesh 2869/tcp openicslap 5357/tcp openwsdapi 10243/tcpopen unknown 49155/tcpopen unknown

Nmap scan report for 192.168.8.117 Host is up (0.0013s latency).

Not shown: 990 filtered ports PORT STATE SERVICE 135/tcpopen msrpc 139/tcpopen netbios-ssn 445/tcpopen microsoft-ds 554/tcpopen rtsp 902/tcpopen iss-realsecure 912/tcpopen apex-mesh 2869/tcp openicslap 5357/tcp openwsdapi 10243/tcpopen unknown 49155/tcpopen unknown

Nmap scan report for 192.168.8.121 Host is up (0.00021s latency).

All 1000 scanned ports on 192.168.8.121 are filtered

Nmap scan report for 192.168.8.130 Host is up (0.0012s latency).

Not shown: 990 filtered ports PORT STATE SERVICE 135/tcpopen msrpc 139/tcpopen netbios-ssn 445/tcpopen microsoft-ds 554/tcpopen rtsp 902/tcpopen iss-realsecure 912/tcpopen apex-mesh 2869/tcp openicslap 5357/tcp openwsdapi 10243/tcpopen unknown 49155/tcpopen unknown

Nmap scan report for 192.168.8.131 Host is up (0.00081s latency). Not shown: 986 closed ports PORT STATE SERVICE 135/tcpopen msrpc 139/tcpopen netbios-ssn 445/tcpopen microsoft-ds 902/tcpopen iss-realsecure 912/tcpopen apex-mesh 3306/tcp openmysql 5357/tcp openwsdapi 5432/tcp openpostgresql

(4)

49152/tcpopen unknown 49153/tcpopen unknown 49154/tcpopen unknown 49155/tcpopen unknown 49156/tcpopen unknown 49159/tcpopen unknown

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:21 BRST Nmap scan report for 192.168.40.20

Host is up (0.0030s latency). Not shown: 998 closed ports PORT STATE SERVICE 53/tcp filtered domain 2001/tcp filtered dc

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:21 BRST Nmap scan report for 192.168.40.21

Host is up (0.0031s latency). Not shown: 998 closed ports PORT STATE SERVICE 53/tcp filtered domain 2001/tcp filtered dc

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:21 BRST Nmap scan report for 192.168.40.22

Host is up (0.0075s latency). Not shown: 998 closed ports PORT STATE SERVICE 53/tcp filtered domain 2001/tcp filtered dc

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:21 BRST Nmap scan report for 192.168.40.23

Host is up (0.010s latency).

All 1000 scanned ports on 192.168.40.23 are closed

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:21 BRST Nmap scan report for 192.168.40.25

Host is up (0.025s latency). Not shown: 998 closed ports PORT STATE SERVICE 23/tcpopen telnet

80/tcpopen http

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:26 BRST Nmap scan report for 192.168.40.1

Host is up (0.083s latency). Not shown: 998 closed ports PORT STATE SERVICE 23/tcpopen telnet

80/tcpopen http

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:26 BRST Nmap scan report for 192.168.40.2

(5)

Not shown: 989 ost is up (0.004closed ports PORT STATE SERVICE

22/tcp open ssh 53/tcp open domain 80/tcp open http 443/tcp open https 1056/tcp filtered vfo 2001/tcp filtered dc 5432/tcp open postgresql 8080/tcp open http-proxy 8081/tcp open blackice-icecap 8082/tcp open blackice-alerts 8090/tcp open unknown

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:27 BRST Nmap scan report for 192.168.40.5

Host is up (0.015s latency). Not shown: 990 closed ports PORT STATE SERVICE 135/tcpopen msrpc 139/tcpopen netbios-ssn 445/tcpopen microsoft-ds 8081/tcp openblackice-icecap 49152/tcpopen unknown 49153/tcpopen unknown 49154/tcpopen unknown 49155/tcpopen unknown 49157/tcpopen unknown 49160/tcpopen unknown

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:27 BRST Nmap scan report for 192.168.40.20

Host is up (0.0024s latency). Not shown: 998 closed ports PORT STATE SERVICE 53/tcp filtered domain 2001/tcp filtered dc

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:27 BRST Nmap scan report for 192.168.40.21

Host is up (0.0019s latency). Not shown: 998 closed ports PORT STATE SERVICE 53/tcp filtered domain 2001/tcp filtered dc

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:28 BRST Nmap scan report for 192.168.40.23

Host is up (0.011s latency).

All 1000 scanned ports on 192.168.40.23 are closed

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:28 BRST Nmap scan report for 192.168.40.25

Host is up (0.018s latency). Not shown: 998 closed ports

(6)

PORT STATE SERVICE 23/tcpopen telnet

80/tcpopen http

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:28 BRST Nmap scan report for 192.168.40.26

Host is up (0.011s latency).

All 1000 scanned ports on 192.168.40.26 are closed

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:28 BRST Nmap scan report for 192.168.40.31

Host is up (0.0048s latency). Not shown: 999 closed ports PORT STATE SERVICE 62078/tcpopen iphone-sync

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:29 BRST Nmap scan report for 192.168.40.33

Host is up (0.049s latency). Not shown: 999 closed ports PORT STATE SERVICE 7000/tcpopen afs3-fileserver

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:29 BRST Nmap scan report for 192.168.40.38

Host is up (0.050s latency). Not shown: 999 closed ports PORT STATE SERVICE 62078/tcpopen iphone-sync

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:32 BRST Nmap scan report for 192.168.40.42

Host is up (0.052s latency).

All 1000 scanned ports on 192.168.40.42 are closed

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:32 BRST Nmap scan report for 192.168.40.43

Host is up (0.017s latency).

All 1000 scanned ports on 192.168.40.43 are closed

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:32 BRST Nmap scan report for 192.168.40.49

Host is up (0.0044s latency). Not shown: 998 closed ports PORT STATE SERVICE 53/tcp filtered domain 2001/tcp filtered dc

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:34 BRST Nmap scan report for 192.168.40.68

Host is up (0.062s latency). Not shown: 999 filtered ports PORT STATE SERVICE 2869/tcpopen icslap

(7)

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:35 BRST Nmap scan report for 192.168.40.78

Host is up (0.062s latency). Not shown: 998 closed ports PORT STATE SERVICE 53/tcp filtered domain 2001/tcp filtered dc

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:39 BRST Nmap scan report for 192.168.40.104

Host is up (0.030s latency). Not shown: 991 filtered ports PORT STATE SERVICE 135/tcpopen msrpc 139/tcpopen netbios-ssn 445/tcpopen microsoft-ds 49152/tcpopen unknown 49153/tcpopen unknown 49154/tcpopen unknown 49155/tcpopen unknown 49156/tcpopen unknown 49157/tcpopen unknown

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:40 BRST Nmap scan report for 192.168.40.109

Host is up (0.024s latency). Not shown: 997 filtered ports PORT STATE SERVICE 135/tcpopen msrpc 139/tcpopen netbios-ssn 445/tcpopen microsoft-ds

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:40 BRST Nmap scan report for 192.168.40.116

Host is up (0.014s latency). Not shown: 985 closed ports PORT STATE SERVICE 135/tcp filtered msrpc 139/tcp filtered netbios-ssn 445/tcp filtered microsoft-ds 902/tcp open iss-realsecure 912/tcp open apex-mesh 1110/tcp filterednfsd-status 2869/tcp filteredicslap 3389/tcp filteredms-wbt-server 10243/tcp open unknown 19780/tcp filtered unknown 49152/tcp open unknown 49153/tcp open unknown 49154/tcp open unknown 49155/tcp open unknown 49156/tcp open unknown

(8)

Nmap scan report for 192.168.40.116 Host is up (0.051s latency).

Not shown: 985 closed ports PORT STATE SERVICE 135/tcp filtered msrpc 139/tcp filtered netbios-ssn 445/tcp filtered microsoft-ds 902/tcp open iss-realsecure 912/tcp open apex-mesh 1110/tcp filterednfsd-status 2869/tcp filteredicslap 3389/tcp filteredms-wbt-server 10243/tcp open unknown 19780/tcp filtered unknown 49152/tcp open unknown 49153/tcp open unknown 49154/tcp open unknown 49155/tcp open unknown 49156/tcp open unknown

Starting Nmap 6.40 ( http://nmap.org ) at 2014-12-01 18:45 BRST Nmap scan report for 192.168.40.132

Host is up (0.029s latency). Not shown: 989 closed ports PORT STATE SERVICE 135/tcpopen msrpc 139/tcpopen netbios-ssn 445/tcpopen microsoft-ds 2869/tcp openicslap 5357/tcp openwsdapi 49152/tcpopen unknown 49153/tcpopen unknown 49154/tcpopen unknown 49155/tcpopen unknown 49156/tcpopen unknown 49163/tcpopen unknown

Nmap scan report for 192.168.40.31 Host is up (0.0062s latency).

Not shown: 977 closed ports PORT STATE SERVICE 85/tcp filtered mit-ml-dev 259/tcp filtered esro-gen 1038/tcp filteredmtqp 1064/tcp filteredjstel 1067/tcpfilteredinstl_boots 1123/tcp filteredmurray 1138/tcp filteredencrypted_admin 2030/tcp filtered device2 2366/tcp filteredqip-login 2394/tcp filtered ms-olap2 2869/tcp filteredicslap 3945/tcp filteredemcads 4998/tcp filtered maybe-veritas 5000/tcp filteredupnp

(9)

5961/tcp filtered unknown 8400/tcp filteredcvd 9290/tcp filtered unknown 13783/tcp filtered netbackup 20005/tcp filtered btx 21571/tcp filtered unknown 27356/tcp filtered unknown 40193/tcp filtered unknown 62078/tcp openiphone-sync

Referências

Documentos relacionados

A nota final dos candidatos habilitados para os cargos de Analista Judiciário - Área Judiciária, Analista Judiciário - Área Ju- diciária - Especialidade Execução de Mandados

Promovido pela Câmara Brasileira da Indústria da Construção (CBIC), por meio do seu Fórum de Ação Social e Cidadania (Fasc), e pelo SESI Nacional, com apoio Brasil, o

Explique como a frequência do sinal alternado pode afetar as medidas de tensão realizadas com os multímetros.. ESTA002-17 – Circuitos Elétricos I Laboratório

Entre os informes nacionais e locais, destaque para: o relato sobre a última reunião do Fórum dos SPFs com o governo e a Marcha dos SPFs ocorrida ontem em Brasília; o relato da

A elaboração das atividades pautou-se em quatro pontos importantes enumerados por Sasseron (2011) para fundamentar o planejamento de Sequências de Ensino

Resumo: A revista Candeeiro, da Seção Sindical dos Docentes, da Universidade Federal de Sergipe, ao longo do seu período de existência entre 1998 e 2016,

Regularização e encargos perante os órgãos competentes da diferença de área construída a maior com 450,20m², bem como a baixa dos gravames que constam da matrícula que

www.fundacaofafipa.org.br/concurso e será publicado no Diário Oficial do Município de Matelândia. 5.10 Se após a análise do recurso, permanecer a decisão de indeferimento