Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to realize Information Collection in linux Network Security

2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/01 Report--

This article mainly explains "how to realize information collection in linux network security". Interested friends may wish to have a look. The method introduced in this paper is simple, fast and practical. Let's let the editor take you to learn how to collect information in linux network security.

The protocol used by 1.whois to query the domain name IP and owner information, to query whether the domain name is registered, as well as the domain name owner and domain name registrant.

# whois zmkjedu.com

2.DNS parsing query nslookup

Installation commands:

[root@iZ2ze3ehyqn5xq1kxowj0iZ ~] # yum install*/nslookup

3. Port scan Nmap

Nmap has three basic functions:

1) detect whether a group of hosts are online

2) scan the host port to sniff out the network services provided

3) infer all operating systems of the host

Lists each host on the specified network without sending any messages to the target host

Determine which IP protocols nmap-sO the target host supports

4. Default 404 page leak

The 404 page is convenient for the webmaster to arrange errors, but if the webmaster does not replace the 404 page in time, it may be used by hackers for intelligence gathering.

So we usually set up 404 pages by ourselves, so how to set up a simple 404 page?

[root@iZ2ze3ehyqn5xq1kxowj0iZ html] # touch missing.html

[root@iZ2ze3ehyqn5xq1kxowj0iZ html] # echo "your page does not exist" > missing.html

[root@iZ2ze3ehyqn5xq1kxowj0iZ html] # systemctl restart httpd

View in the browser:

At this point, I believe you have a deeper understanding of "how to achieve information collection in linux network security". You might as well do it in practice. Here is the website, more related content can enter the relevant channels to inquire, follow us, continue to learn!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report