---
title: "79 - Finger"
weight: 79
date: "2026-03-10T10:03:28+08:00"
lastmod: "2026-03-10T13:26:55+08:00"
---

💡 **学习提示**: 本文档介绍 **Finger** 的渗透测试方法，适合信息安全初学者和从业人员参考。

⚠️ **法律声明**: 本文档仅供学习和授权测试使用。未经授权的系统测试可能违反法律法规。

---

> ⚠️ **法律声明**: 本文档仅供学习和授权测试使用。未经授权的系统测试可能违反法律法规。

## 79 - 渗透测试 Finger

### **Basic Info**

The **Finger** program/service is utilized for retrieving details about computer users. Typically, the information provided includes the **user's login name, full name**, and, in some cases, additional details. These extra details could encompass the office location and phone number (if available), the time the user logged in, the period of inactivity (idle time), the last instance mail was read by the user, and the contents of the user's plan and project files.

**默认 port:** 79

```
PORT   STATE SERVICE
79/tcp open  finger
```

### **信息收集**

#### **Banner Grabbing/Basic connection**

```bash
nc -vn <IP> 79
echo "root" | nc -vn <IP> 79
```

#### **User enumeration**

```bash
finger @<Victim>       #List users
finger admin@<Victim>  #Get info of user
finger user@<Victim>   #Get info of user
```

Alternatively you can use **finger-user-enum** from [**pentestmonkey**](http://pentestmonkey.net/tools/user-enumeration/finger-user-enum), some examples:

```bash
finger-user-enum.pl -U users.txt -t 10.0.0.1
finger-user-enum.pl -u root -t 10.0.0.1
finger-user-enum.pl -U users.txt -T ips.txt
```

#### **Nmap execute a script for doing using default scripts**

#### Metasploit uses more tricks than Nmap

```
use auxiliary/scanner/finger/finger_users
```

#### Shodan

```bash
# Shodan 搜索语法
port:79
```

#### ZoomEye

```bash
# ZoomEye 搜索语法
port:79
```

---

## 📖 参考资料

- [HackTricks - 79-finger](https://book.hacktricks.wiki/en/network-services-pentesting/79-finger.html)

