zoukankan      html  css  js  c++  java
  • 隐身扫描服务信息

    1、Use Namp performing SYN scanning of the remote system

    •        in the lab ,there are two systems in you windows.an  instance of Metasploitable2 is used to performing TCP SYN scan ,as following :

    •       you can also use the telnet  to collect the Metasploitable2 below the windows's console ,and suspend this system .it's fine to kali linux System , to dowlnload the Xshell .

     To performing  TCP stealth  scans with Nmap the -sS option must should include in this option , then we scan the IP address of the host  that the host is to be scanned .

    eg : nmap -sS 192.168.142.170 -p 80

     

      we can  see the screenshot ,Nmap listens  for a response and identifies the open ports by analyzing the TCP flags that are activated in any response received .we can use Nmap to performing multiple sepcified ports  use the comma-delimited list of port numbers  like this :    nmap -sS 192.168142.17 -p 21 ,80, 443  

    besides, we can scanning a list ports like this : nmap -sS 192.168.142.170 -p  21-98    ,  but if we did not specify  the ports ,default scanning the ports is from 1 to 1000 .   in fact  a full scan is always best practice when attempting to identify all of the possible attack surface on a target . addinational  we can  scanning multiple addresses simultaneously .like this : nmap 192.168.142.0-255 -sS -p 80  .and  use the iplist.txt download the ip addresses .use the option -iL appoint targets ..  generally speaking  Nmap is a fast and highly effextive way to perform  the stealth scanning .

    2、Stealth scanning with Metasploit

        Metasploit has an auxiliary module that can be used to perform SYN scans on  specified TCP ports ,use the command "msfconsole" to start the Metasploit like this:

     we use the auxiliary :   syn

    and then to configure : set the ports 、 host 、 and therads 

     to run the auxiliary,,,also set the port list

      

    3、Stealth scanning with hping3

        hping3 can also be used to perform a TCP stealth  scan  , we use the command  : hping3 192.168.142.170 --scan 80 -S

     

    4、use the Lazy script to penetration to test wesite

    configure the option and performing

    and then use the fsociety to guess the auxiliary

    and then input the target ip address

    after Violence test ,we can get the  A weak password for obtaining services on the target host.

      

    ..

  • 相关阅读:
    关于垂直居中
    linux 前后台程序切换
    mac 下jetbrains IDE系列IDE主题
    mac 安装命令行开发者工具
    python 安装MySQLdb mysql_config not fount
    error: command 'cc' failed with exit status 1
    sqllite 入门
    jieba分词
    zookeeper 故障重连机制
    深入学习 celery
  • 原文地址:https://www.cnblogs.com/xinxianquan/p/10322136.html
Copyright © 2011-2022 走看看