Muestra las diferencias entre dos versiones de la página.
Próxima revisión | Revisión previa | ||
norcorea:nmap [2025/01/13 21:37] anonimo creado |
norcorea:nmap [2025/01/13 22:04] (actual) anonimo |
||
---|---|---|---|
Línea 1: | Línea 1: | ||
- | as | + | Paso 1: Saber que rango de ips se asignan a un país, para ello buscar en https://www.ipdeny.com/ipblocks/ \\ |
+ | - como podemos ver, en https://www.ipdeny.com/ipblocks/data/countries/kp.zone sólamente tiene el bloque 175.45.176.0/22. \\ | ||
+ | Ésto quiere decir que se asignan 32 bits - 22 = 10, 2^10 = 1024 ips \\ | ||
+ | Escaneo completo y detallado mediante nmap de las 1024 ips que incluya la detección del sistema operativo \\ | ||
+ | nmap -A -v 175.45.176.0/22 (Nota: ejecutar con sudo) \\ | ||
+ | Aquí el problema que nos encontramos es que al ser la salida muy larga y exceder el buffer de la terminal el resultado se nos perderá, por lo tanto es mejor guardar el resultado de la salida en un fichero de texto, así que vamos a corregir el comando: \\ | ||
+ | nmap -A -v 175.45.176.0/22 > resultado.txt (Nota: ejecutar con sudo) \\ | ||
+ | después de 3 horas termina el escaneo, el archivo lo subo para que podais analizarlo y aprender, aquí la salida interesante: \\ | ||
+ | Completed Connect Scan at 14:51, 8653.30s elapsed (18000 total ports) \\ | ||
+ | Initiating Service scan at 14:51 \\ | ||
+ | Scanning 37 services on 18 hosts \\ | ||
+ | Completed Service scan at 14:52, 72.44s elapsed (37 services on 18 hosts) \\ | ||
+ | NSE: Script scanning 18 hosts. \\ | ||
+ | Initiating NSE at 14:52 \\ | ||
+ | Completed NSE at 14:56, 244.20s elapsed \\ | ||
+ | Initiating NSE at 14:56 \\ | ||
+ | Completed NSE at 15:04, 466.18s elapsed \\ | ||
+ | Initiating NSE at 15:04 \\ | ||
+ | Completed NSE at 15:04, 0.01s elapsed \\ | ||
+ | Nmap scan report for mail1.silibank.net.kp (175.45.176.21) \\ | ||
+ | Host is up (0.48s latency). \\ | ||
+ | Not shown: 998 filtered ports \\ | ||
+ | PORT STATE SERVICE VERSION \\ | ||
+ | 995/tcp open pop3s? \\ | ||
+ | 7443/tcp closed oracleas-https \\ | ||
+ | \\ | ||
+ | Nmap scan report for 175.45.176.22 \\ | ||
+ | Host is up (0.46s latency). \\ | ||
+ | Not shown: 998 filtered ports \\ | ||
+ | PORT STATE SERVICE VERSION \\ | ||
+ | 995/tcp open pop3s? \\ | ||
+ | 8888/tcp open sun-answerbook? \\ | ||
+ | \\ | ||
+ | Nmap scan report for 175.45.176.68 \\ | ||
+ | Host is up (0.47s latency). \\ | ||
+ | Not shown: 999 filtered ports \\ | ||
+ | PORT STATE SERVICE VERSION \\ | ||
+ | 80/tcp open http Apache httpd 2.4.25 ((RedStar4.0) OpenSSL/1.0.1e-fips PHP/5.6.2) \\ | ||
+ | \\ | ||
+ | Nmap scan report for 175.45.176.69 \\ | ||
+ | Host is up (0.42s latency). \\ | ||
+ | Not shown: 998 filtered ports \\ | ||
+ | PORT STATE SERVICE VERSION \\ | ||
+ | 25/tcp open tcpwrapped \\ | ||
+ | |_smtp-commands: Couldn't establish connection on port 25 \\ | ||
+ | 80/tcp open http Apache httpd 2.4.25 ((RedStar4.0) OpenSSL/1.0.1e-fips PHP/5.6.2) \\ | ||
+ | \\ | ||
+ | Nmap scan report for 175.45.176.71 \\ | ||
+ | Host is up (0.43s latency). \\ | ||
+ | Not shown: 998 filtered ports \\ | ||
+ | PORT STATE SERVICE VERSION \\ | ||
+ | 80/tcp open http Apache httpd 2.4.25 ((RedStar4.0) OpenSSL/1.0.1e-fips PHP/5.6.2) \\ | ||
+ | 443/tcp open ssl/https? \\ | ||
+ | \\ | ||
+ | Nmap scan report for 175.45.176.72 \\ | ||
+ | Host is up (0.52s latency). \\ | ||
+ | Not shown: 977 closed ports \\ | ||
+ | PORT STATE SERVICE VERSION \\ | ||
+ | 13/tcp filtered daytime \\ | ||
+ | 80/tcp open http Microsoft IIS httpd 7.5 \\ | ||
+ | 82/tcp filtered xfer \\ | ||
+ | 135/tcp filtered msrpc \\ | ||
+ | 139/tcp filtered netbios-ssn \\ | ||
+ | 443/tcp open ssl/https? \\ | ||
+ | 445/tcp filtered microsoft-ds \\ | ||
+ | 555/tcp filtered dsf \\ | ||
+ | 593/tcp filtered http-rpc-epmap \\ | ||
+ | 722/tcp filtered unknown \\ | ||
+ | 1151/tcp filtered unizensus \\ | ||
+ | 1433/tcp open ms-sql-s Microsoft SQL Server 2000 8.00.311; RTMa \\ | ||
+ | 2710/tcp filtered sso-service \\ | ||
+ | 3017/tcp filtered event_listener \\ | ||
+ | 3372/tcp filtered msdtc \\ | ||
+ | 4444/tcp filtered krb524 \\ | ||
+ | 4446/tcp filtered n1-fwp \\ | ||
+ | 30718/tcp filtered unknown \\ | ||
+ | 49152/tcp open unknown \\ | ||
+ | 49153/tcp open unknown \\ | ||
+ | 49154/tcp open msrpc Microsoft Windows RPC \\ | ||
+ | 49155/tcp open unknown \\ | ||
+ | 60020/tcp filtered unknown \\ | ||
+ | Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows \\ | ||
+ | \\ | ||
+ | Nmap scan report for 175.45.176.75 \\ | ||
+ | Host is up (0.45s latency). \\ | ||
+ | Not shown: 998 filtered ports \\ | ||
+ | PORT STATE SERVICE VERSION \\ | ||
+ | 80/tcp open http Apache httpd 2.4.25 ((RedStar4.0) OpenSSL/1.0.1e-fips) \\ | ||
+ | 443/tcp open ssl/http Apache httpd 2.4.25 ((RedStar4.0) OpenSSL/1.0.1e-fips) \\ | ||
+ | | ssl-cert: Subject: commonName=www.vok.rep.kp/organizationName=KRT/stateOrProvinceName=Pyongyang/countryName=KP \\ | ||
+ | | Subject Alternative Name: IP Address:175.45.176.75, IP Address:175.45.176.85, IP Address:175.45.176.73, IP Address:175.45.176.83, DNS:www.vok.rep.kp, DNS:www.gnu.rep.kp \\ | ||
+ | | Issuer: commonName=www.dprk.gov.kp/organizationName=dprk/stateOrProvinceName=Pyongyang/countryName=KP \\ | ||
+ | | Public Key type: rsa \\ | ||
+ | | Public Key bits: 4096 \\ | ||
+ | | Signature Algorithm: sha256WithRSAEncryption \\ | ||
+ | | Not valid before: 2018-08-21T04:02:01 \\ | ||
+ | | Not valid after: 2021-08-20T04:02:01 \\ | ||
+ | | MD5: fed6 b74d 0e32 58be cdd1 9774 3b3f 989b \\ | ||
+ | |_SHA-1: ac0a fed2 701d 3d18 994a 05d9 708d 18b1 f37e 5d40 \\ | ||
+ | \\ | ||
+ | Nmap scan report for 175.45.176.76 \\ | ||
+ | Host is up (0.46s latency). \\ | ||
+ | Not shown: 997 filtered ports \\ | ||
+ | PORT STATE SERVICE VERSION \\ | ||
+ | 25/tcp open tcpwrapped \\ | ||
+ | |_smtp-commands: Couldn't establish connection on port 25 \\ | ||
+ | 80/tcp open http Apache httpd 2.4.25 ((RedStar4.0) OpenSSL/1.0.1e-fips PHP/5.6.2) \\ | ||
+ | 443/tcp open ssl/https? \\ | ||
+ | | http-methods: \\ | ||
+ | |_ Supported Methods: GET HEAD \\ | ||
+ | \\ | ||
+ | Nmap scan report for 175.45.176.80 \\ | ||
+ | Host is up (0.48s latency). \\ | ||
+ | Not shown: 999 filtered ports \\ | ||
+ | PORT STATE SERVICE VERSION \\ | ||
+ | 80/tcp open http nginx 1.18.0 \\ | ||
+ | \\ | ||
+ | Nmap scan report for 175.45.176.81 \\ | ||
+ | Host is up (0.45s latency). \\ | ||
+ | Not shown: 997 filtered ports \\ | ||
+ | PORT STATE SERVICE VERSION \\ | ||
+ | 25/tcp open tcpwrapped \\ | ||
+ | |_smtp-commands: Couldn't establish connection on port 25 \\ | ||
+ | 80/tcp open http nginx 1.18.0 \\ | ||
+ | 443/tcp open ssl/http nginx 1.18.0 \\ | ||
+ | | ssl-cert: Subject: commonName=192.168.245.6 \\ | ||
+ | | Subject Alternative Name: DNS:Xen-6, DNS:Xen-6 \\ | ||
+ | | Issuer: commonName=192.168.245.6 \\ | ||
+ | | Public Key type: rsa \\ | ||
+ | | Public Key bits: 2048 \\ | ||
+ | | Signature Algorithm: sha256WithRSAEncryption \\ | ||
+ | | Not valid before: 2022-10-19T13:19:44 \\ | ||
+ | | Not valid after: 2032-10-16T13:19:44 \\ | ||
+ | | MD5: dc5e 7405 d03b 976c 7b8d ea61 4c87 e08c \\ | ||
+ | |_SHA-1: e336 92d0 0745 3bb0 fde9 e727 2aad 564a 83fa da37 \\ | ||
+ | \\ | ||
+ | Nmap scan report for 175.45.176.85 \\ | ||
+ | Host is up (0.45s latency). \\ | ||
+ | Not shown: 997 filtered ports \\ | ||
+ | PORT STATE SERVICE VERSION \\ | ||
+ | 25/tcp open tcpwrapped \\ | ||
+ | |_smtp-commands: Couldn't establish connection on port 25 \\ | ||
+ | 80/tcp open http Apache httpd 2.4.25 ((RedStar4.0) OpenSSL/1.0.1e-fips) \\ | ||
+ | 443/tcp open ssl/http Apache httpd 2.4.25 ((RedStar4.0) OpenSSL/1.0.1e-fips) \\ | ||
+ | | http-methods: \\ | ||
+ | |_ Supported Methods: GET HEAD POST \\ | ||
+ | \\ | ||
+ | Nmap scan report for 175.45.176.91 \\ | ||
+ | Host is up (0.42s latency). \\ | ||
+ | Not shown: 998 filtered ports \\ | ||
+ | PORT STATE SERVICE VERSION \\ | ||
+ | 80/tcp open http nginx 1.18.0 \\ | ||
+ | 443/tcp closed https \\ | ||
+ | \\ | ||
+ | Nmap scan report for 175.45.177.1 \\ | ||
+ | Host is up (0.39s latency). \\ | ||
+ | Not shown: 998 filtered ports \\ | ||
+ | PORT STATE SERVICE VERSION \\ | ||
+ | 80/tcp open http Apache httpd 2.4.25 ((RedStar4.0) OpenSSL/1.0.1e-fips PHP/5.6.2) \\ | ||
+ | 443/tcp open ssl/https? \\ | ||
+ | \\ | ||
+ | Nmap scan report for 175.45.177.10 \\ | ||
+ | Host is up (0.56s latency). \\ | ||
+ | Not shown: 969 filtered ports \\ | ||
+ | PORT STATE SERVICE VERSION \\ | ||
+ | 22/tcp closed ssh \\ | ||
+ | 23/tcp closed telnet \\ | ||
+ | 25/tcp open tcpwrapped \\ | ||
+ | |_smtp-commands: Couldn't establish connection on port 25 \\ | ||
+ | 53/tcp closed domain \\ | ||
+ | 80/tcp open http nginx 1.18.0 \\ | ||
+ | 113/tcp closed ident \\ | ||
+ | 199/tcp closed smux \\ | ||
+ | 256/tcp closed fw1-secureremote \\ | ||
+ | 443/tcp open ssl/http nginx 1.18.0 \\ | ||
+ | |_http-server-header: nginx/1.18.0 \\ | ||
+ | |_http-title: Welcome to nginx! \\ | ||
+ | | ssl-cert: Subject: commonName=5-XEN \\ | ||
+ | | Subject Alternative Name: DNS:5-XEN, DNS:5-XEN \\ | ||
+ | | Issuer: commonName=5-XEN \\ | ||
+ | | Public Key type: rsa \\ | ||
+ | | Public Key bits: 2048 \\ | ||
+ | | Signature Algorithm: sha256WithRSAEncryption \\ | ||
+ | | Not valid before: 2022-09-26T09:45:28 \\ | ||
+ | | Not valid after: 2032-09-23T09:45:28 \\ | ||
+ | | MD5: 5362 755f 3041 cc43 3b16 61fb 60ed 2966 \\ | ||
+ | |_SHA-1: e614 fbef 2595 bddf 52cd e1cc 6977 90ca 7c2a e612 \\ | ||
+ | 554/tcp closed rtsp \\ | ||
+ | 993/tcp closed imaps \\ | ||
+ | 1042/tcp closed afrog \\ | ||
+ | 1048/tcp closed neod2 \\ | ||
+ | 1057/tcp closed startron \\ | ||
+ | 1999/tcp closed tcp-id-port \\ | ||
+ | 2638/tcp closed sybase \\ | ||
+ | 3003/tcp closed cgms \\ | ||
+ | 3389/tcp closed ms-wbt-server \\ | ||
+ | 3551/tcp closed apcupsd \\ | ||
+ | 3800/tcp closed pwgpsi \\ | ||
+ | 3851/tcp closed spectraport \\ | ||
+ | 4126/tcp closed ddrepl \\ | ||
+ | 5054/tcp closed rlm-admin \\ | ||
+ | 5900/tcp closed vnc \\ | ||
+ | 5987/tcp closed wbem-rmi \\ | ||
+ | 6789/tcp closed ibm-db2-admin \\ | ||
+ | 9666/tcp closed zoomcp \\ | ||
+ | 19283/tcp closed keysrvr \\ | ||
+ | 27356/tcp closed unknown \\ | ||
+ | 49155/tcp closed unknown \\ | ||
+ | 49160/tcp closed unknown \\ | ||
+ | \\ | ||
+ | Nmap scan report for 175.45.177.11 \\ | ||
+ | Host is up (0.54s latency). \\ | ||
+ | Not shown: 948 filtered ports \\ | ||
+ | PORT STATE SERVICE VERSION \\ | ||
+ | 23/tcp closed telnet \\ | ||
+ | 53/tcp closed domain \\ | ||
+ | 80/tcp open http nginx 1.18.0 \\ | ||
+ | 143/tcp closed imap \\ | ||
+ | 199/tcp closed smux \\ | ||
+ | 256/tcp closed fw1-secureremote \\ | ||
+ | 301/tcp closed unknown \\ | ||
+ | 443/tcp open ssl/http nginx 1.18.0 \\ | ||
+ | | http-methods: \\ | ||
+ | |_ Supported Methods: GET HEAD \\ | ||
+ | |_http-server-header: nginx/1.18.0 \\ | ||
+ | |_http-title: Welcome to nginx! \\ | ||
+ | | ssl-cert: Subject: commonName=192.168.245.6 \\ | ||
+ | | Subject Alternative Name: DNS:Xen-6, DNS:Xen-6 \\ | ||
+ | | Issuer: commonName=192.168.245.6 \\ | ||
+ | | Public Key type: rsa \\ | ||
+ | | Public Key bits: 2048 \\ | ||
+ | | Signature Algorithm: sha256WithRSAEncryption \\ | ||
+ | | Not valid before: 2022-10-19T13:19:44 \\ | ||
+ | | Not valid after: 2032-10-16T13:19:44 \\ | ||
+ | | MD5: dc5e 7405 d03b 976c 7b8d ea61 4c87 e08c \\ | ||
+ | |_SHA-1: e336 92d0 0745 3bb0 fde9 e727 2aad 564a 83fa da37 \\ | ||
+ | 554/tcp closed rtsp \\ | ||
+ | 587/tcp closed submission \\ | ||
+ | 617/tcp closed sco-dtmgr \\ | ||
+ | 993/tcp closed imaps \\ | ||
+ | 995/tcp closed pop3s \\ | ||
+ | 999/tcp closed garcon \\ | ||
+ | 1025/tcp closed NFS-or-IIS \\ | ||
+ | 1048/tcp closed neod2 \\ | ||
+ | 1057/tcp closed startron \\ | ||
+ | 1060/tcp closed polestar \\ | ||
+ | 1069/tcp closed cognex-insight \\ | ||
+ | 1070/tcp closed gmrupdateserv \\ | ||
+ | 1247/tcp closed visionpyramid \\ | ||
+ | 1972/tcp closed intersys-cache \\ | ||
+ | 1984/tcp closed bigbrother \\ | ||
+ | 2049/tcp closed nfs \\ | ||
+ | 2121/tcp closed ccproxy-ftp \\ | ||
+ | 3306/tcp closed mysql \\ | ||
+ | 3389/tcp closed ms-wbt-server \\ | ||
+ | 4003/tcp closed pxc-splr-ft \\ | ||
+ | 5560/tcp closed isqlplus \\ | ||
+ | 5900/tcp closed vnc \\ | ||
+ | 5959/tcp closed unknown \\ | ||
+ | 6005/tcp closed X11:5 \\ | ||
+ | 6059/tcp closed X11:59 \\ | ||
+ | 6839/tcp closed unknown \\ | ||
+ | 7938/tcp closed lgtomapper \\ | ||
+ | 8086/tcp closed d-s-n \\ | ||
+ | 8088/tcp closed radan-http \\ | ||
+ | 8192/tcp closed sophos \\ | ||
+ | 8402/tcp closed abarsd \\ | ||
+ | 8652/tcp closed unknown \\ | ||
+ | 8873/tcp closed dxspider \\ | ||
+ | 8888/tcp closed sun-answerbook \\ | ||
+ | 9666/tcp closed zoomcp \\ | ||
+ | 10000/tcp closed snet-sensor-mgmt \\ | ||
+ | 19801/tcp closed unknown \\ | ||
+ | 24800/tcp closed unknown \\ | ||
+ | 27356/tcp closed unknown \\ | ||
+ | 44501/tcp closed unknown \\ | ||
+ | 49155/tcp closed unknown \\ | ||
+ | 49160/tcp closed unknown \\ | ||
+ | 49165/tcp closed unknown \\ | ||
+ | 60443/tcp closed unknown \\ | ||
+ | \\ | ||
+ | Nmap scan report for 175.45.178.129 \\ | ||
+ | Host is up (0.34s latency). \\ | ||
+ | Not shown: 985 closed ports \\ | ||
+ | PORT STATE SERVICE VERSION \\ | ||
+ | 22/tcp open ssh Cisco SSH 1.25 (protocol 1.99) \\ | ||
+ | | ssh-hostkey: \\ | ||
+ | | 1024 ac:2f:68:9c:2f:a2:b5:2b:09:ce:87:b3:37:bb:3e:ee (RSA1) \\ | ||
+ | |_ 1024 3e:03:e3:75:20:ba:92:e9:2c:9a:d4:53:95:6b:a1:ea (RSA) \\ | ||
+ | |_sshv1: Server supports SSHv1 \\ | ||
+ | 23/tcp open telnet Cisco router telnetd \\ | ||
+ | 25/tcp filtered smtp \\ | ||
+ | 139/tcp filtered netbios-ssn \\ | ||
+ | 1038/tcp filtered mtqp \\ | ||
+ | 1061/tcp filtered kiosk \\ | ||
+ | 1077/tcp filtered imgames \\ | ||
+ | 1658/tcp filtered sixnetudr \\ | ||
+ | 3300/tcp filtered ceph \\ | ||
+ | 5087/tcp filtered biotic \\ | ||
+ | 6565/tcp filtered unknown \\ | ||
+ | 6779/tcp filtered unknown \\ | ||
+ | 8045/tcp filtered unknown \\ | ||
+ | 8222/tcp filtered unknown \\ | ||
+ | 60020/tcp filtered unknown \\ | ||
+ | Service Info: OS: IOS; Device: router; CPE: cpe:/o:cisco:ios \\ | ||
+ | \\ | ||
+ | Nmap scan report for 175.45.178.134 \\ | ||
+ | Host is up (0.54s latency). \\ | ||
+ | Not shown: 992 closed ports \\ | ||
+ | PORT STATE SERVICE VERSION \\ | ||
+ | 25/tcp filtered smtp \\ | ||
+ | 139/tcp filtered netbios-ssn \\ | ||
+ | 646/tcp filtered ldp \\ | ||
+ | 1187/tcp filtered alias \\ | ||
+ | 1723/tcp filtered pptp \\ | ||
+ | 5550/tcp filtered sdadmind \\ | ||
+ | 8001/tcp filtered vcom-tunnel \\ | ||
+ | 64680/tcp filtered unknown \\ | ||
+ | \\ | ||
+ | Nmap scan report for 175.45.178.138 \\ | ||
+ | Host is up (0.39s latency). \\ | ||
+ | Not shown: 985 closed ports \\ | ||
+ | PORT STATE SERVICE VERSION \\ | ||
+ | 22/tcp filtered ssh \\ | ||
+ | 23/tcp filtered telnet \\ | ||
+ | 25/tcp filtered smtp \\ | ||
+ | 53/tcp filtered domain \\ | ||
+ | 80/tcp filtered http \\ | ||
+ | 139/tcp filtered netbios-ssn \\ | ||
+ | 1028/tcp filtered unknown \\ | ||
+ | 1096/tcp filtered cnrprotocol \\ | ||
+ | 1840/tcp filtered netopia-vo2 \\ | ||
+ | 2869/tcp filtered icslap \\ | ||
+ | 3168/tcp filtered poweronnud \\ | ||
+ | 4005/tcp filtered pxc-pin \\ | ||
+ | 9595/tcp filtered pds \\ | ||
+ | 10621/tcp filtered unknown \\ | ||
+ | 49161/tcp filtered unknown \\ | ||
+ | \\ | ||
+ | NSE: Script Post-scanning. \\ | ||
+ | Initiating NSE at 15:04 \\ | ||
+ | Completed NSE at 15:04, 0.00s elapsed \\ | ||
+ | Initiating NSE at 15:04 \\ | ||
+ | Completed NSE at 15:04, 0.00s elapsed \\ | ||
+ | Initiating NSE at 15:04 \\ | ||
+ | Completed NSE at 15:04, 0.00s elapsed \\ | ||
+ | Read data files from: /usr/bin/../share/nmap \\ | ||
+ | Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . \\ | ||
+ | Nmap done: 1024 IP addresses (18 hosts up) scanned in 9665.53 seconds \\ | ||
+ | Ips de los servidores con algún servicio o puerto abierto: \\ | ||
+ | cat resultado.txt | grep 'open port' | cut -d' ' -f6 | sort | uniq \\ | ||
+ | Número de servidores con algún servicio o puerto abierto: \\ | ||
+ | cat resultado.txt | grep 'open port' | cut -d' ' -f6 | sort | uniq | wc -l \\ | ||
+ | Ips de los servidores con el puerto 80 abierto (servidores web) \\ | ||
+ | cat resultado.txt | grep 'open port' | grep '80' | cut -d' ' -f6 | sort | uniq \\ | ||
+ | Número de servidores con el puerto 80 abierto \\ | ||
+ | cat resultado.txt | grep 'open port' | grep '80' | cut -d' ' -f6 | sort | uniq | wc -l \\ | ||
+ | Ips de los servidores con el puerto 443 abierto (servidores web con ssl) \\ | ||
+ | cat resultado.txt | grep 'open port' | grep '443' | cut -d' ' -f6 | sort | uniq \\ | ||
+ | 175.45.176.71 \\ | ||
+ | 175.45.176.72 \\ | ||
+ | 175.45.176.75 \\ | ||
+ | 175.45.176.76 \\ | ||
+ | 175.45.176.81 \\ | ||
+ | 175.45.176.85 \\ | ||
+ | 175.45.177.1 \\ | ||
+ | 175.45.177.10 \\ | ||
+ | 175.45.177.11 \\ | ||
+ | \\ | ||
+ | Número de servidores con el puerto 443 abierto (servidores web con ssl) \\ | ||
+ | cat resultado.txt | grep 'open port' | grep '443' | cut -d' ' -f6 | sort | uniq | wc -l \\ | ||
+ | Aquí es donde vemos que sólo 9 de 13 servidores web tienen ssl, para ver cuales no tienen: \\ | ||
+ | cat resultado.txt | grep 'open port' | grep '80' | cut -d' ' -f6 | sort | uniq | grep -v -f <(cat resultado.txt | grep 'open port' | grep '443' | cut -d' ' -f6 | sort | uniq) \\ | ||
+ | 175.45.176.68 \\ | ||
+ | 175.45.176.69 \\ | ||
+ | 175.45.176.80 \\ | ||
+ | 175.45.176.91 \\ | ||
+ | \\ | ||
+ | |||
+ | {{ :norcorea:resultado.txt.tar.gz |}} |