Forum Thread: Me and My Friend

Me and my friend are doing kali vs kali outside LAN i gave him my public IP and he gaved me his, he is able to DoS me but in his i can't scan for open ports with nmap it says that it's filteres the TCP ir UDP, i don't remeber, and i can't even Dos Jim too.

I dont need the fast way to learn, i just want to know why he can scan me for exploiting and DoS and i can't do any.

Thanks

31 Responses

Maybe its beacause that you two have different versions of Kali or you haven't updated your system...

We have both updated systems.

To update the system i used apt-get update -y && apt-get upgrade -y && apt-get dist upgrade or update, bit any way its updated

"It says"
"I don't remember"

Ask precisely! Report the exact errors, what youtried until now and what do you expect to happen. Also, the exact nmap command.

I think CIUFFY is right......

I forgot, to give everyone a good year and how good its this website, i mean everyone who makes this possible to tech people all around the world, so continue the work and effort.

About my question i meant to say that:
when i do nmap -O -v xxx.xxx.xxx.xxx (Public IP)
It responds =
Starting Nmap 6.47 ( http://nmap.org ) at 2015-01-11 16:18 WET
Initiating Ping Scan at 16:18
Scanning xxx.xxx.xxx.xxx ports
Completed Ping Scan at 16:18, 3.04s elapsed (1 total hosts)
Nmap scan report for xxx.xxx.xxx.xxx host down
Read data files from: /usr/bin/../share/nmap
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 4.51 seconds
Raw packets sent: 8 (304B) | Rcvd: 0 (0B)

On your nmap command add -Pn along with the rest. See if that gets something

Dorin:

First, the scan you are doing is an operating system fingerprint. Not very reliable. Try using an nmap -sT scan. This is the most reliable.

Second, the router may be blocking ping as the error message state. You can suppress ping by using the -P0 switch.

OTW

Now it is:
Starting Nmap 6.47 ( http://nmap.org ) at 2015-01-11 16:43 WET
Nmap scan report for ANantes-xxx-x-xxx-x.wxx-xx.abo.wanadoo.fr (90.59.xx.x)
Host is up (0.11s latency).
Not shown: 999 filtered ports
PORT STATE SERVICE
113/tcp closed ident

Nmap done: 1 IP address (1 host up) scanned in 15.80 seconds

I've done of many ways but its still blocking or filtering.

You didn't show us the command?

Sorry:
nmap -sT -P0 90.59.31.5

Starting Nmap 6.47 ( http://nmap.org ) at 2015-01-11 17:07 WET
Nmap scan report for ANantes-653-1-xxx-5.w90-xx.abo.wanadoo.fr (90.59.xx.x)
Host is up (0.14s latency).
Not shown: 999 filtered ports
PORT STATE SERVICE
113/tcp closed ident

Nmap done: 1 IP address (1 host up) scanned in 14.93 seconds

nmap -sT -Pn -P0 90.59.31.5

Starting Nmap 6.47 ( http://nmap.org ) at 2015-01-11 17:07 WET
Nmap scan report for ANantes-653-1-120-5.xx-xx.abo.wanadoo.fr (90.59.xx.x)
Host is up (0.11s latency).
Not shown: 999 filtered ports
PORT STATE SERVICE
113/tcp closed ident

Nmap done: 1 IP address (1 host up) scanned in 11.78 seconds

I don't know later i will ask him. But its strange to me, that he hasn't open ports.

If he is communicating on the web, he must have port 80 or 443 open. He probably also has port 53 for DNS and others such as 135, 137, 445.

Even when he is online it doesnt scans.

There is likely a device that is blocking your scans. Some ISP's block scans, some IDS's and some firewalls do as well.. Your job is to keep trying out different scans to get past these devices.

Ports to learn..

7,21,22,23,25,80,88,110,111,139,143,389,443,445,514,515,631,1352,2049,3000,3389,4949,5060,5631,5632,5666,5900-5905,6000-6009,8000,8006,8080,8089,8443,8834,9080,9100,9443,17500

Is there is in null byte, the ports, to learn, if yes could you send me?

As what i saw, is that by port 113 i wont get many things or "even nothing", is closed, encrypted comunication. It says many things when i look to that.

Scanning one of my Kali Boxes

"""
root@iPhone:~# nmap -Pn x.x.x

Starting Nmap 6.47 ( http://nmap.org ) at 2015-01-11 04:58 MST
Nmap scan report for x.x.x.x
Host is up (0.0000090s latency).
Not shown: 999 closed ports
PORT STATE SERVICE
xxxx/tcp open unknown

Nmap done: 1 IP address (1 host up) scanned in 4.47 seconds

root@iPhone:~# service ssh stop ok Stopping OpenBSD Secure Shell server: sshd.

root@iPhone:~# nmap -Pn x.x.x.x

Starting Nmap 6.47 ( http://nmap.org ) at 2015-01-11 05:12 MST
Nmap scan report for x.x.x.x
Host is up (0.000010s latency).
All 1000 scanned ports on x.x.x.x are closed

Nmap done: 1 IP address (1 host up) scanned in 4.28 seconds
"""

You have the IP you should move on to the next phase. Scanning a Kali box wont get much.

How can i exploit or ddos him if i can't see open ports, firewall, os (oper. syst), etc. I don't know what to do next. If you can help me i appreciate it

Honestly no disrespect intended but.. I think you should just admit defeat and study here with us some. Then try again.

I might know many things and i might know nothing, but one thing i know is that every day we learn anything new, in this chase, today I've learned that the time i invest for learning hacking/pen-testing/security is poor, so know i will give my best to complete my self.

Anyways, THANKS :)

Is there anyway to download all the tutorials from the website to pdf?

You can just save the page as a .html file for offline viewing.

ghost_

Can i do it with all at once?

Um, no.

Not that I know of.

ghost_

Ok, so recently i was trying to scan a public ip but i can't get the os, and if it possible to exploit a public ip or DoS it, i would like to know, thanks

Check out my tutorial on xprobe2 to get the os.

Share Your Thoughts

  • Hot
  • Active