当前位置:网站首页>Information Security Experiment 2: using x-scanner scanning tool
Information Security Experiment 2: using x-scanner scanning tool
2022-07-07 09:22:00 【Not enough to eat】
One 、 Purpose and requirements of the experiment
1. Be familiar with the principle of scanning the port of the computer ;
2. Skillfully use X-SCANNER The scanning tool scans the port of the computer .
3. Use port scanning to scan a host , And show the results ( Which ports are open on a host ). For a network segment IP scanning , Show the results ( Which hosts in a network segment are powered on ).
Two 、 Experimental content
1. Skillfully use X-SCANNER Interface of scanning tool
2. View port information
Open the scanning results to check whether there are machines with shared resources that can be invaded , Check common ports such as 21、23、139 Whether it is open .
3. Discover system vulnerabilities
Discover the of the target system CGI Loophole 、IIS Loophole 、RPC Loophole 、SQL Server Loopholes and FTP Weak password vulnerability .
3、 ... and 、 Experimental environment
function Windows XP/2000 The computer of the operating system .
Four 、 Experimental steps and result analysis
1. Install scan tool X-Scan , Click on the run
2. Set scanning parameters in settings , Perform a local scan
Select scan module in global settings , Include 、IIS Loophole 、RPC Loophole 、SQL Server Loopholes and FTP Weak password vulnerability
Set port related settings in plug-in settings
Click OK after configuration , Then click the run button
Scan complete , The report found 92 A loophole
3. For network segment 192.168.0.0-192.168.0.100 scan
Scan complete , There is no loophole
5、 ... and 、 Summarize and analyze
When installing software and using software for port scanning , Close the firewall and real-time protection of the system , Otherwise, it will be forcibly stopped as malware . Through this experiment , I got hold of X-Scan How to use , And how to configure and scan ports .
边栏推荐
- PMP certificate preparation experience sharing
- What is MD5
- Jenkins automated email
- 串口實驗——簡單數據收發
- PMP Exam details after the release of the new exam outline
- Count the number of words in the string c language
- JVM 内存结构 详细学习笔记(一)
- Leetcode daily questions (2316. count unreachable pairs of nodes in an undirected graph)
- JVM 垃圾回收 详细学习笔记(二)
- H3C vxlan configuration
猜你喜欢
Connecting mobile phone with ADB
Error: selenium common. exceptions. WebDriverException: Messag‘geckodriver‘ execute
Several stages of PMP preparation study
2020 year end summary
H3C vxlan configuration
Yapi test plug-in -- cross request
Unity shader (to achieve a simple material effect with adjustable color attributes only)
C语言指针(特别篇)
JVM 内存结构 详细学习笔记(一)
C language pointer (Part 1)
随机推荐
Postman interface test (I. installation and use)
Systick滴答定时器
信息安全实验一:DES加密算法的实现
Storage of data in memory
C语言指针(特别篇)
Systick tick timer
Entity of cesium data visualization (Part 1)
(3/8)枚举的不当用法 之 方法参数(二)
Data association between two interfaces of postman
Idea development environment installation
The use of recycling ideas
Jenkins automated email
JVM 内存结构 详细学习笔记(一)
MySql数据库-事务-学习笔记
C language pointer (special article)
Using JWT to realize login function
Leetcode刷题记录(数组)组合总和、组合总和 II
C language pointer (Part 2)
Add new item after the outbound delivery order of SAP mm sto document is created?
Jenkins+ant+jmeter use