In this pics I am port scanning my VM which is running windows XP with SP2 using ZoneAlarm as a firewall. Of course I got only filtered ports because the firewall on my windows machine was blocking all the probes. Later I quite the ZoneAlarm and I port scanned it again. I also made sure the the windows firewall was not on as well but I also got all the ports to be filtered.
I have read that with out a firewall you can basically just walk into a windows machine. So how would I do that?
The attacking VM I used was Protech and to port scan I used nmap. The command that I used was nmap -sV -P0 192.168.110.100.
Hacking my VM called shitbox!
- Lyecdevf
- cyber Idi Amin
- Posts: 1222
- Joined: 16 Mar 2006, 17:00
- 18
- Location: In between life and death.
- Contact:
Hacking my VM called shitbox!
We will either find a way, or make one.
- Hannibal
- Hannibal
don't forget desktops are not servers.
try some online scanners to verify your onboard scanner is working.
http://www.t1shopper.com/tools/port-scanner/
http://nmap-online.com/
--
On the Nmap online scanner, it must be a false positive, because I don't have port 80 and 53 open. At best a windows box might be listening on 135 and/or 443.
Grc scanner is pretty good, though I ran out of time to check it on my box while the firewall is down.
Some desktop firewalls might still be running in the background just like a avp. Try a reboot with out starting the firewall apps.
DNR
try some online scanners to verify your onboard scanner is working.
http://www.t1shopper.com/tools/port-scanner/
http://nmap-online.com/
https://www.grc.com/x/ne.dll?bh0bkyd2Starting Nmap 4.75 ( http://nmap.org ) at 2008-10-30 17:23 Central Europe Standard Time
Interesting ports on 45.sub-75-218-226.myvzw.com (75.218.226.45):
Not shown: 4998 filtered ports
PORT STATE SERVICE
53/tcp open domain
80/tcp open http
Nmap done: 1 IP address (1 host up) scanned in 17.30 seconds
--
On the Nmap online scanner, it must be a false positive, because I don't have port 80 and 53 open. At best a windows box might be listening on 135 and/or 443.
Grc scanner is pretty good, though I ran out of time to check it on my box while the firewall is down.
Some desktop firewalls might still be running in the background just like a avp. Try a reboot with out starting the firewall apps.
DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
- bad_brain
- Site Owner
- Posts: 11636
- Joined: 06 Apr 2005, 16:00
- 19
- Location: In your eye floaters.
- Contact:
to get more reliable results you should do a connect-scan (-sT switch)....and open ports only mean there are services running, the security level of the system depends on the state of the services available to the outside (flaws patched, good config)...so no firewall doesn't mean the system is easy to compromise...