码迷,mamicode.com
首页 > 其他好文 > 详细

隐身扫描服务信息

时间:2019-01-25 23:23:03      阅读:215      评论:0      收藏:0      [点我收藏+]

标签:received   tar   for   namp   shel   rem   扫描   rac   orm   

1、Use Namp performing SYN scanning of the remote system

  •        in the lab ,there are two systems in you windows.an  instance of Metasploitable2 is used to performing TCP SYN scan ,as following :

技术分享图片

  •       you can also use the telnet  to collect the Metasploitable2 below the windows‘s console ,and suspend this system .it‘s fine to kali linux System , to dowlnload the Xshell .

技术分享图片

 To performing  TCP stealth  scans with Nmap the -sS option must should include in this option , then we scan the IP address of the host  that the host is to be scanned .

eg : nmap -sS 192.168.142.170 -p 80

 技术分享图片

  we can  see the screenshot ,Nmap listens  for a response and identifies the open ports by analyzing the TCP flags that are activated in any response received .we can use Nmap to performing multiple sepcified ports  use the comma-delimited list of port numbers  like this :    nmap -sS 192.168142.17 -p 21 ,80, 443  

besides, we can scanning a list ports like this : nmap -sS 192.168.142.170 -p  21-98    ,  but if we did not specify  the ports ,default scanning the ports is from 1 to 1000 .   in fact  a full scan is always best practice when attempting to identify all of the possible attack surface on a target . addinational  we can  scanning multiple addresses simultaneously .like this : nmap 192.168.142.0-255 -sS -p 80  .and  use the iplist.txt download the ip addresses .use the option -iL appoint targets ..  generally speaking  Nmap is a fast and highly effextive way to perform  the stealth scanning .

2、Stealth scanning with Metasploit

    Metasploit has an auxiliary module that can be used to perform SYN scans on  specified TCP ports ,use the command "msfconsole" to start the Metasploit like this:

技术分享图片

 we use the auxiliary :   syn

技术分享图片

and then to configure : set the ports 、 host 、 and therads 

技术分享图片

 to run the auxiliary,,,also set the port list

技术分享图片  技术分享图片

3、Stealth scanning with hping3

    hping3 can also be used to perform a TCP stealth  scan  , we use the command  : hping3 192.168.142.170 --scan 80 -S

 技术分享图片

4、use the Lazy script to penetration to test wesite

技术分享图片

configure the option and performing

技术分享图片

and then use the fsociety to guess the auxiliary

技术分享图片

and then input the target ip address

技术分享图片

after Violence test ,we can get the  A weak password for obtaining services on the target host.

技术分享图片

 

 

  

..

 

隐身扫描服务信息

标签:received   tar   for   namp   shel   rem   扫描   rac   orm   

原文地址:https://www.cnblogs.com/xinxianquan/p/10322136.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!