Results 1 to 2 of 2

Thread: Nmap on kali linux

  1. #1

    Question Nmap on kali linux

    Hello, I am new to the pen test.

    I have slight knowledge in network and system, title pro sys and network... so slight knowledge in routing, osi model and a bit of linux but I forgot a lot.

    -So I wanted to attempt a flood and penetration on a test site. which is weird to access the ip I ping the site and tracert I get an ip that goes from 96 to 97 on the penultimate byte during my floods.
    However when I type the ip on the internet browser I come across a cloudfare page (I imagine the cloud server that hosts the site?).
    So is it still effective when trying to flood via metasploit?

    The site remains very active so I imagine that there is a minimum of security (I had made one at a time via ufw 3 months ago for the anti back).

    -Furthermore, during an nmap it is sometimes noted that all the ports are in ignored state!!!??? but then how is it possible that the site is accessible on the internet!?
    For example I can have during my first nmap results of ports but during the second scan there is nothing more detected:

    ──(root㉿kali)-[~]
    └─# proxychains nmap 188.114.97.*
    [proxychains] config file found: /etc/proxychains.conf
    [proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
    [proxychains] DLL init: proxychains-ng 4.16
    Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-25 22:19 CEST
    Nmap scan report for 188.114.97.*
    Host is up (0.016s latency).
    Not shown: 996 filtered tcp ports (no-response)
    PORT STATE SERVICE
    80/tcp open http
    443/tcp open https
    8080/tcp open http-proxy
    8443/tcp open https-alt

    Nmap done: 1 IP address (1 host up) scanned in 53.07 seconds

    ┌──(root㉿kali)-[~]
    └─# proxychains nmap -sV 188.114.97.*
    [proxychains] config file found: /etc/proxychains.conf
    [proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
    [proxychains] DLL init: proxychains-ng 4.16
    Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-25 22:21 CEST
    Nmap scan report for 188.114.97.$
    Host is up (0.0020s latency).
    All 1000 scanned ports on 188.114.97.* are in ignored states.
    Not shown: 1000 filtered tcp ports (no-response)

    Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
    Nmap done: 1 IP address (1 host up) scanned in 11.49 seconds

    -Finally, it s weird, with "nmap -sV"
    without typing ''proxychians'' first on the other ip adress, i found service "tcpwrapped" but i didn't found any vulnerabilitie on metasploit.



    Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-24 18:40 CEST
    Nmap scan report for davidduke.com (188.114.96.*)
    Host is up (0.013s latency).
    Other addresses for davidduke.com (not scanned): 188.114.97.* **06:98c1:3120>
    Not shown: 997 filtered tcp ports (no-response)
    PORT STATE SERVICE VERSION
    80/tcp open tcpwrapped
    443/tcp open tcpwrapped
    8080/tcp open tcpwrapped

    Service detection performed. Please report any incorrect results at https://>
    Nmap done: 1 IP address (1 host up) scanned in 72.63 seconds


    Thanks. sorry english is not my mothertongue.

  2. #2
    Join Date
    2021-May
    Location
    UK
    Posts
    772
    Kali is a very capable pen testing OS but it doesn't just 'find and exploit' things by itself.

    Only port 80 (http) or 443 (https) need to be open for a web server to show you web pages all other 65533 ports could be closed and it wouldn't matter..

    A default nmap scan (which incidently is a SYN scan) only checks the most common 1000 ports anyway, and depending on what type of nmap scan you use, you can get very different results back from the same IP's

    Your using a * wildcard for the last octet of your IP addresses in your scannng, that's a large and 'very noisy' scan, and a quick whois lookup would have given you more info;

    inetnum: 188.114.96.0 - 188.114.99.255
    netname: CLOUDFLARENET-EU

    so 96, 97, 98 and 99 subnets are ALL part of Cloudflare IP allocation

    https://www.freecodecamp.org/news/wh...l-of-all-time/

Similar Threads

  1. Replies: 0
    Last Post: 2021-09-17, 15:42
  2. nmap 7.80 has broken scripts. How can I downgrade to an earlier nmap version?
    By Alias Pseudonym in forum TroubleShooting Archive
    Replies: 0
    Last Post: 2019-11-27, 18:52

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •