Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Experiment 2 of Network Security Technology

2025-04-06 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Experiment 2 Network scanning experiment

Experimental goal

L through the use of network scanning software to understand the opening of target host ports and services, so as to further obtain information and find out system security vulnerabilities. Through the use of package capture software, capture some sensitive data (such as passwords). Through this experiment, we can understand the risks of opening ports and services, and enhance the awareness of network security protection. The specific requirements of the experiment are as follows:

1. Familiar with the use of scanners (vulnerabilities, ports)

two。 Can use the package grabbing tool to analyze the specific principle of the scanning program.

3. Master the use of superscan, nmap and xscan

4. Master the method of viewing and managing ports

Technical principle

1. Brief introduction and use principle of superscan:

Powerful port scanning tool. 1) verify whether IP is online by Ping; 2) convert between IP and domain name; 3) verify the types of services provided by the target computer; 4) verify whether the target computer is online and port condition; 5) tool custom list to verify whether the target computer is online and port condition; 6) customize the port to be verified, and save it as a port list file.

2. Introduction and use principle of Xscan:

Xscan uses multithreading to detect security vulnerabilities in the specified IP address segment (or stand-alone), supports plug-in functions, and provides graphical interface and command line operation modes. The scanning contents include: remote service type, operating system type and version, various weak password vulnerabilities, backdoor, application service vulnerabilities, network equipment vulnerabilities, denial of service vulnerabilities and so on.

3. Introduction and use principle of nmap:

Nmap is a network scanning and sniffing tool package under Linux,FreeBSD,UNIX,Windows. It has three basic functions: one is to detect whether a group of hosts is online; the second is to scan the host port to sniff the network services provided; and it can also infer the operating system used by the host. Nmap can be used to scan LAN with only two nodes up to networks with more than 500nodes. Nmap also allows users to customize scanning techniques. Usually, a simple ping operation using the ICMP protocol can meet the general needs; it can also probe the UDP or TCP ports to the operating system used by the host; and all the detection results can be recorded in various formats of logs for further analysis.

4. Netstat command

The steps of the experiment:

Use superscan to scan for open ports and vulnerabilities in hosts and Lans

Use Xscan to scan for open ports and vulnerabilities in hosts and Lans

Use nmap to scan for open ports and vulnerabilities in hosts and Lans

L View management port

Experimental equipment

PC 2; switch; network cable

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report