当前位置:网站首页>Network Security Learning (11) scanning and blasting
Network Security Learning (11) scanning and blasting
2022-07-25 22:51:00 【Shake light·】
adopt VMnet1(8) The network card allows the real machine to communicate with the virtual machine
Enable virtual network card
Configure virtual machines IP Address , Make the virtual machine and the network card in the same network segment
Scanning technology
How to scan ?
Combination of hand and tool .
The following two points are generally done in scanning
Host detection : Determine whether the target host is alive
Port scanning : Find the port opened by the online host , And the service running on the port . Even further determine the target host operating system type and more detailed information
Common port numbers
21 FTP
22 SSH
23 Telnet
25 SMTP( mail )
80 HTTP
443 HTTPs
445 Shared files
1433 SQL Server
1521 Oracle
3306 MySQL
3389 RDP( Remote desktop )
Nmap Scanner
Important parameter
-sp ping scanning
-p Specify the port range
-sv Service version detection ( Software using ports )
-O( Capitalization ) Start operating system detection
-A Full scan
-oN The scan results are saved txt
example :
Namp -sp 10.1.1.0/24 scanning 10.1.1.0 The whole network segment
Nmap -p 21,23-25,3389 10.1.1.1 (23-25 It's a scan 23,24,25)
Nmap -p 21,23 10.1.1.1 -sv scanning 21,23 Service version of
Nmap -A 10.1.1.1 Full scan
Nmap -O 10.1.1.1 Scan target system version
Nmap -p 21,23 10.1.1.1 -oN e:\result
Hydra
Hydra -l user name -p password 10.1.1.1 telnet
Hydra -l a -P Password dictionary 10.1.1.1 rdp
Hydra -L User dictionary -P Password dictionary 10.1.1.1 rdp
Local cracking
Getpass Extract the password from memory
Local violence cracking
pwdump extract sam Medium Hash value
Manual will hash Value to store hash.txt in
Use saminside Software hash Brute force


边栏推荐
- The difference between abstract classes and interface interfaces
- 【集训DAY13】Internet【并查集】
- [tensorflow] 关于 seed
- 【集训DAY12】X equation 【高精度】【数学】
- Similarities and differences between equals and "= ="
- Kibana~ the process number cannot be found after kibana is started in the background
- Array中可以用泛型吗
- The third experiment OSPF
- 【自然语言处理】【向量表示】AugSBERT:改善用于成对句子评分任务的Bi-Encoders的数据增强方法
- 【MySQL提权】UDF提权(附带大马)
猜你喜欢

Understanding of forward proxy and reverse proxy

DOM event object

Why should we launch getaverse?

【集训DAY15】好名字【hash】

1000 okaleido tiger launched binance NFT, triggering a rush to buy

Day006 select structure (if statement exercise)
![[MySQL rights] UDF rights (with Malaysia)](/img/72/d3e46a820796a48b458cd2d0a18f8f.png)
[MySQL rights] UDF rights (with Malaysia)

recyclerview计算滑动距离之computeHorizontalScrollExtent-computeHorizontalScrollRange-computeHorizontalScrol
![[training day13] backpack [dynamic planning] [greed]](/img/a7/3df395d84f510dea8b42ebcc4ff5f2.png)
[training day13] backpack [dynamic planning] [greed]
![[training day13] travel [violence] [dynamic planning]](/img/ac/dd52771fec20432fd084d8e3cc89e1.png)
[training day13] travel [violence] [dynamic planning]
随机推荐
Solve several common problems
Deep recursion, deep search DFS, backtracking, paper cutting learning.
【集训DAY15】好名字【hash】
MatrixCube揭秘102——300行实现的完整分布式存储系统MatrixKV
Stack simulation queue
[training Day12] be go! [dynamic programming] [mathematics]
软件测试 pytest pytest的命名规则 用例的前后置 conftest.py 定制allure报告 @pytest.mark.parametrize()装饰器作数据驱动
Short circuit effect of logical operators short circuit and short circuit or
【集训DAY12】Bee GO!【动态规划】【数学】
Node.js operation database
Vs2017 compilation encountered the error HResult e returned by the call of COM component_ FAIL
1000个Okaleido Tiger首发上线Binance NFT,引发抢购热潮
Severely crack down on illegal we media operators according to law: it is urgent to purify the we media industry
Ribbon execution logic source code analysis
[training Day12] tree! Tree! Tree! [greed] [minimum spanning tree]
The difference between "rewrite" and "overload"
冯诺依曼体系结构
【集训DAY11】Nescafe【贪心】
Mocha test
关于getchar和scanf的使用示例及注意点
