GwBgt1="`ip route list | grep "default" | cut -d " " -s -f 5`" # Script use Arpspoof, SSLStrip, Ettercap, Urlsnarf and Driftnet.
# Arpspoof+Ettercap+SSLStrip=Your Password (MITM) Save dalam format *sh, dan jangan lupa di ‘chmod 755’.
Nmap done: 1 IP address (1 host up) scanned in 81.72 seconds Read data files from: /usr/local/share/nmap Nmap scan report for 86.39.202.35.easyhost.be (86.39.202.35)ĭevice type: general purpose|broadband router|media device|specialized at 10:09Ĭompleted Parallel DNS resolution of 20 hosts. Initiating Parallel DNS resolution of 20 hosts. WARNING: RST from 86.39.202.35 port 21 - is this port really open? SYN Stealth Scan Timing: About 18.88% done ETC: 10:10 (0:02:13 remaining)Ĭompleted SYN Stealth Scan at 10:08, 59.16s elapsed (1000 total ports) Increasing send delay for 86.39.202.35 from 0 to 5 due to 47 out of 155 dropped probes since last increase. at 10:07Ĭompleted Parallel DNS resolution of 1 host.
Initiating Parallel DNS resolution of 1 host.
Nah sebelum menggunakan Netenum, kita cari tahu dulu identitas domainnya melalui Nmap / nmap -v -A 86.39.202.35Ĭompleted Ping Scan at 10:07, 1.09s elapsed (1 total hosts) Langsung saja kita peraktekan ya cara analisisnya, karena saya lagi galau dan sedang tidak mood untuk mengetik pesan pembuka.