当前位置:网站首页>Vulnerability scanning and reverse osmosis of Internet anti artifact
Vulnerability scanning and reverse osmosis of Internet anti artifact
2022-06-26 11:29:00 【BOGO】
The Internet is a battlefield without gunpowder , A while ago, I went to the customer's site and found that the springboard machine of the customer was intruded , Then 20 Super simple password servers have been reduced to mining machines . The normal program cannot run and the business is disturbed !
So today I'd like to talk about leakage and reverse osmosis !!
In general, the bottom layer of the leakage products on the market is with the help of masscan and nmap To achieve ,masscan comparison nmap It's a lot faster ,masscan Asynchronous transmission mode is adopted , Stateless scanning mode .nmap Need record tcp/ip The state of ,os Can handle TCP/IP The maximum number of connections is 1500 about .
BOGO used it before nmap I wrote a missing script , Can generate execl A script that records a weak password and sends it to a specific mailbox . Wait until you have time ! Enrich it into a small full stack project and give you an analysis of the underlying principles of implementation .
Then before you can build weapons , I can't take a copy under the fire stick ! I'll give you a present today AK47 Use it first !
Start with login and configure :
Many of them choose default . We only configure this part
The server IP Address segment , If more than one paragraph can be filled in the next line . Support B Segment scan !
Then we go back to the home page :
Simple 、 Clean and tidy 、 Dark color magic weapon standard match ~
You can enter the protocol in the search box 、 port 、 service 、IP Wait a series of things for you to find the information you want . I won't list the question mark beside if it helps me !~
server:ssh It means finding all the open ssh Port server
give the result as follows ( My test environment is two virtual machines ):
Then we check all the result sets , Then add tasks :
Then choose... In turn
Then save the execution , There's a task
Then wait a moment , Wait for the little hole to become solid . We click on the task name and we will find that your weak password is exploded directly !
What about? ? God is not magical ? Li is not fierce ? Then there are more cows X Of !
In the same way we type server:mysql, And then choose mysql Weak password
According to the performance of your machine , Maybe the accountant will calculate some time and then be knocked away root password .
So what vulnerabilities can it scan ?
Thanks to his plug-in , Some plug-ins are listed above , At present, the total is 71 Modules for penetration testing , And can customize the module and test script cattle X Well !
In addition to the above scanning method, you can also directly click the name of the plug-in to scan .
After the test, there are various statistical reports !
Can collect information at one time , It can also be scanned regularly !
So smart students will ask , On what basis did he break the code ?
ha-ha , That's it !
you 're right ! Weak password dictionary ! But the initial value is only a few dozen ! How could Bogor just shoot people without bullets ? Bogor's ready for you 1 Ten thousand weak password dictionaries ! Just copy and paste in , Then click Update !
边栏推荐
- Svn installation configuration
- [deep learning theory] (7) long and short term memory network LSTM
- FasterRCNN
- Redis的最佳实践?看完不心动,算我输!!
- PC QQ hall upload update modify VersionInfo
- Fabric. JS upper dash, middle dash (strikethrough), underline
- Measures to support the development of cultural and creative industries in Futian District, Shenzhen
- Laravel admin login add graphic verification code
- 【北邮果园微处理器设计】10 Serial Communication 串口通信笔记
- Splicing full paths and uploading multiple pictures of laravel admin when laravel uses OSS
猜你喜欢

APICloud 实现文档下载和预览功能

深度学习中的FLOPs和Params如何计算

Excel operation of manual moving average method and exponential smoothing method for time series prediction

机器学习聚类——实验报告

即构「畅直播」上线!提供全链路升级的一站式直播服务

Re recognized! Know that Chuangyu has been selected as one of the first member units of the "business security promotion plan"
女性科学家的流失

Code specification & explain in detail the functions and uses of husky, prettier, eslint and lint staged

.net中,日志组件 Nlog,SerialLog, Log4Net的用法
![LeetCode 710 黑名单中的随机数[随机数] HERODING的LeetCode之路](/img/58/2a56c5c9165295c830082f8b05dd98.png)
LeetCode 710 黑名单中的随机数[随机数] HERODING的LeetCode之路
随机推荐
loggie 编码以及换行符测试
Is it safe to open an account in the top ten securities app rankings in China
Redux related usage
Will updating a large amount of data in Oracle cause the undo space to explode
LeetCode 710 黑名单中的随机数[随机数] HERODING的LeetCode之路
Prospering customs through science and technology, Ronglian and Tianjin Customs jointly build a genomic database and analysis platform
机器学习LDA——实验报告
How to prevent weight loss under Gao Bingfa?
Sqli labs range 1-5
express在nodejs中的基本使用
SolidWorks rendering tips how not to display edges -- display style settings
Ctfshow web getting started command execution web75-77
Using the methods in the repository to solve practical problems
PC QQ大厅 上传更新 修改versionInfo
PC QQ hall upload update modify VersionInfo
MOS管基本原理,单片机重要知识点
SVN 安装配置
9、 Beautify tables, forms, and hyperlinks
Loggie encoding and newline character test
机器学习深度神经网络——实验报告