当前位置:网站首页>Vulnerability scanning and reverse osmosis of Internet anti artifact
Vulnerability scanning and reverse osmosis of Internet anti artifact
2022-06-26 11:29:00 【BOGO】
The Internet is a battlefield without gunpowder , A while ago, I went to the customer's site and found that the springboard machine of the customer was intruded , Then 20 Super simple password servers have been reduced to mining machines . The normal program cannot run and the business is disturbed !
So today I'd like to talk about leakage and reverse osmosis !!
In general, the bottom layer of the leakage products on the market is with the help of masscan and nmap To achieve ,masscan comparison nmap It's a lot faster ,masscan Asynchronous transmission mode is adopted , Stateless scanning mode .nmap Need record tcp/ip The state of ,os Can handle TCP/IP The maximum number of connections is 1500 about .
BOGO used it before nmap I wrote a missing script , Can generate execl A script that records a weak password and sends it to a specific mailbox . Wait until you have time ! Enrich it into a small full stack project and give you an analysis of the underlying principles of implementation .
Then before you can build weapons , I can't take a copy under the fire stick ! I'll give you a present today AK47 Use it first !
Start with login and configure :
Many of them choose default . We only configure this part
The server IP Address segment , If more than one paragraph can be filled in the next line . Support B Segment scan !
Then we go back to the home page :
Simple 、 Clean and tidy 、 Dark color magic weapon standard match ~
You can enter the protocol in the search box 、 port 、 service 、IP Wait a series of things for you to find the information you want . I won't list the question mark beside if it helps me !~
server:ssh It means finding all the open ssh Port server
give the result as follows ( My test environment is two virtual machines ):
Then we check all the result sets , Then add tasks :
Then choose... In turn
Then save the execution , There's a task
Then wait a moment , Wait for the little hole to become solid . We click on the task name and we will find that your weak password is exploded directly !
What about? ? God is not magical ? Li is not fierce ? Then there are more cows X Of !
In the same way we type server:mysql, And then choose mysql Weak password
According to the performance of your machine , Maybe the accountant will calculate some time and then be knocked away root password .
So what vulnerabilities can it scan ?
Thanks to his plug-in , Some plug-ins are listed above , At present, the total is 71 Modules for penetration testing , And can customize the module and test script cattle X Well !
In addition to the above scanning method, you can also directly click the name of the plug-in to scan .
After the test, there are various statistical reports !
Can collect information at one time , It can also be scanned regularly !
So smart students will ask , On what basis did he break the code ?
ha-ha , That's it !
you 're right ! Weak password dictionary ! But the initial value is only a few dozen ! How could Bogor just shoot people without bullets ? Bogor's ready for you 1 Ten thousand weak password dictionaries ! Just copy and paste in , Then click Update !
边栏推荐
- 18: Chapter 3: development of pass service: 1: SMS login & registration process, introduction; (SMS verification code is used here)
- Splicing full paths and uploading multiple pictures of laravel admin when laravel uses OSS
- 基于slate构建文档编辑器
- laravel 写原生SQL语句
- . Net, the usage of log components NLog, seriallog, log4net
- TCP interview
- leetcode 715. Range 模块 (hard)
- 3、 Linked list exercise
- 手机注册股票开户 开户安全吗
- 动态规划解决股票问题(下)
猜你喜欢

哈希表的前置知识---二叉搜索树

FasterRCNN
![Compréhension approfondie de l'expérience de port série stm32 (registre) [Tutoriel de niveau nounou]](/img/b2/f09e220918a85b14a1993aa85f7720.png)
Compréhension approfondie de l'expérience de port série stm32 (registre) [Tutoriel de niveau nounou]

滑动窗口

机器学习SVM——实验报告

Code specification & explain in detail the functions and uses of husky, prettier, eslint and lint staged

FastRCNN
![[deep learning theory] (7) long and short term memory network LSTM](/img/fb/57781998390e0722df68e6c2e49098.gif)
[deep learning theory] (7) long and short term memory network LSTM

Easyx----- C language implementation 2048

高并发下如何防重?
随机推荐
即构「畅直播」上线!提供全链路升级的一站式直播服务
Notice on printing and Distributing Measures for supporting strategic emerging industries and future industrial cluster development in Futian District, Shenzhen
DD command tests the read and write speed of Huawei Kunpeng & Hongshan solid state storage disk
Using baijiafan to automatically generate API calls: progress in JS (II)
Laravel admin obtains non auto increment ID and submits hidden forms
Machine learning SVM - Experimental Report
MOS管基本原理,单片机重要知识点
开通证券账户需要注意事项 开户安全吗
Detailed explanation of MySQL fuzzy query
What does ack attack mean? How to defend against ack attacks?
Svn installation configuration
Apiccloud implements the document download and preview functions
机器学习聚类——实验报告
PC QQ hall upload update modify VersionInfo
MQTT断开重连
word中涂黑的方块
TCP interview
在Oracle中update大量数据会不会导致undo空间爆掉
基于slate构建文档编辑器
【Redis 系列】redis 学习十六,redis 字典(map) 及其核心编码结构