nmap_stuff_-_recon
NMAP STUFF - RECON Recon: Looking for
On the system:
LPAR names / IP addresses User name convention - for brute forcing CICS regions application names passwords config files user guides
Mailing lists (these are public)
IBMMAIN IBMTCP-L CICS-L RACF-L
Googlehacking
site:share.confex.com
sharpoint: LPAR - CICS - IMS attachmate: 'CICS Explorer' 'TSO ID'
============================================
NMAP/Scanning
Nmap is good at identification I.E. - knowing it's a mainframe
Safe scan for mainframe
nmap -n -p- -dd -oA ip.date.initial
nmap -sV -p 23,22,21 -vv -d -oA ip.date.service
Enumerate the LU - Enumerate any VTAM applications
Available Nmap scripts
tn3270-screen vtam-enum cics-enum tso-enum tso-brute cics-user-enum cics-user-brute cics-info
nmap --script tn3270-screen --script-args tn3270-screen.commands="tso;user;password"
nmap -n -p 23 -sV -vv --script vtam-enum --script-args vtam-enum.path=/home/test,idlist=vtam.list
Last updated
Was this helpful?