This tutorial provides a guide on how to use various network scanning tools to discover and analyze devices connected to a network. We’ll use tools like ifconfig
, Netdiscover
, and Zenmap
to gather network information and potentially access a vulnerable device.
This tutorial is for beginners.
How to Defend Against This Attack
Avoid Jailbreaking Your Phone:
Jailbroken phones are vulnerable because they establish an SSH connection and often retain the default password.
If You Do Jailbreak:
Change the default SSH password immediately to secure your device.
Tools Required:
ifconfig
(orip
on newer systems)Netdiscover
Nmap
(Zenmap for GUI)- SSH client
Step 1: Discovering Devices Connected to the Same Network
- Identify Your IP Address:
- Open a terminal.
- Enter the following command to display network configuration:
ifconfig
- For newer Linux versions, use:
ip a
- Look for your IP address listed under
inet
within your network interface details. - Note down the IP address. It will be something like
192.168.100.10
.
2. Connect Network Adapter to Wi-Fi:
- Ensure your network adapter is connected to the intended Wi-Fi network.
- Run the command again to check the connection details and confirm your IP address:
ifconfig
- Determine the IP Range for Scanning:
- Based on your IP address, determine the network range. For example, if your IP is
192.168.100.10
, your network range might be192.168.100.0/24
. - Use your own IP address to determine this range.
4. Scan with Netdiscover:
- Use the following command to scan the network:
netdiscover -r 192.168.100.0/24
- Replace
192.168.100.0/24
with your own IP range. This will list active devices, but it might not provide extensive detail about each device.
Step 2: Gathering Sensitive Information about Connected Devices
- Set Up Zenmap:
- Open Zenmap (the GUI for Nmap).
- Enter the same IP range (e.g.,
192.168.100.0/24
) into the target field.
2. Run a Ping Scan:
- Select the
Ping Scan
profile to quickly identify live hosts without sending too many packets. - This scan is faster and less intrusive, providing a quick overview of active devices.
3. Perform a Quick Scan:
- After identifying active hosts, select the
Quick Scan
profile. - This scan provides more detailed information than a ping scan, including open ports and, potentially, the operating system details.
Step 3: Gathering More Sensitive Information and Accessing a Vulnerable iPhone
- Run Quick Scan Plus:
- Choose the
Quick Scan Plus
profile for a more thorough scan. - This scan takes longer but digs deeper into each device’s configuration and open ports.
2. Analyze the Results:
- Review the scan results for any unusual open ports or services.
- Particularly look for devices with SSH (port 22) open.
3. Accessing a Jailbroken iPhone:
- If you find an iPhone with port 22 open, it’s likely jailbroken.
- Try to access it using SSH:
ssh root@192.168.100.XX
- Replace
192.168.100.XX
with the actual IP number of the iPhone. - The default password for many jailbroken iOS devices is
alpine
.
Important Note:
Accessing devices without permission is illegal and unethical. This tutorial is intended for educational purposes only—to demonstrate the potential vulnerabilities in network devices, particularly those that are not properly secured or updated. Always ensure you have explicit permission to scan and access network devices.