In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-06 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Experiment 2 Network scanning experiment
Experimental goal
L through the use of network scanning software to understand the opening of target host ports and services, so as to further obtain information and find out system security vulnerabilities. Through the use of package capture software, capture some sensitive data (such as passwords). Through this experiment, we can understand the risks of opening ports and services, and enhance the awareness of network security protection. The specific requirements of the experiment are as follows:
1. Familiar with the use of scanners (vulnerabilities, ports)
two。 Can use the package grabbing tool to analyze the specific principle of the scanning program.
3. Master the use of superscan, nmap and xscan
4. Master the method of viewing and managing ports
Technical principle
1. Brief introduction and use principle of superscan:
Powerful port scanning tool. 1) verify whether IP is online by Ping; 2) convert between IP and domain name; 3) verify the types of services provided by the target computer; 4) verify whether the target computer is online and port condition; 5) tool custom list to verify whether the target computer is online and port condition; 6) customize the port to be verified, and save it as a port list file.
2. Introduction and use principle of Xscan:
Xscan uses multithreading to detect security vulnerabilities in the specified IP address segment (or stand-alone), supports plug-in functions, and provides graphical interface and command line operation modes. The scanning contents include: remote service type, operating system type and version, various weak password vulnerabilities, backdoor, application service vulnerabilities, network equipment vulnerabilities, denial of service vulnerabilities and so on.
3. Introduction and use principle of nmap:
Nmap is a network scanning and sniffing tool package under Linux,FreeBSD,UNIX,Windows. It has three basic functions: one is to detect whether a group of hosts is online; the second is to scan the host port to sniff the network services provided; and it can also infer the operating system used by the host. Nmap can be used to scan LAN with only two nodes up to networks with more than 500nodes. Nmap also allows users to customize scanning techniques. Usually, a simple ping operation using the ICMP protocol can meet the general needs; it can also probe the UDP or TCP ports to the operating system used by the host; and all the detection results can be recorded in various formats of logs for further analysis.
4. Netstat command
The steps of the experiment:
Use superscan to scan for open ports and vulnerabilities in hosts and Lans
Use Xscan to scan for open ports and vulnerabilities in hosts and Lans
Use nmap to scan for open ports and vulnerabilities in hosts and Lans
L View management port
Experimental equipment
PC 2; switch; network cable
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.