--fluxay (streamer) password scanning of network information collection

Source: Internet
Author: User

"Experimental Purpose"

1) Mastering the principle of Fluxay (streamer) password scanning


"Experimental principle"

How the vulnerability scanner works:

The network vulnerability scanner logs the response to the target by remotely detecting the service of the destination host TCP/IP different ports. In this way, you can collect various information about the target host (for example, whether you can log on anonymously, if there is a writable FTP directory, whether you can use TELNET,HTTPD to run with root). After obtaining information about the destination host TCP/IP port and its corresponding network access Service, the vulnerability library provided by the Network vulnerability scanning system is matched, and if matching conditions are met, it is considered a vulnerability exists. In addition, by simulating the hacker's offensive tactics, the target host system to attack the security vulnerability scan, such as testing weak password, is also one of the implementation of the scanning module. If the impersonation attack succeeds, it is considered a vulnerability exists.

In the matching principle, the network vulnerability scanner uses rule-based matching technology, that is, according to security experts on Network system security vulnerability, hacker attack case analysis and system administrator on the network system security configuration of the actual experience, the formation of a set of standard system Vulnerability Library, and then on this basis to form the corresponding matching rules, The analysis of the System vulnerability scan is done automatically by the program.

The implementation of a rule-based matching system is essentially a knowledge engineering problem, and its function should be able to be exploited with the accumulation of experience, and its self-learning ability can be extended and modified by rules, which is the expansion and correction of the system vulnerability database. Of course, such ability is still needed under the guidance and participation of experts to achieve. However, it should also be seen that some system vulnerabilities may not trigger any rule that is not detected because of the limitations of the vulnerability library coverage.

The whole network scanner works: When the user through the control platform issued a scan command, the control platform to the scanning module issued a corresponding scan request, scan module immediately after receiving the request to start the corresponding sub-function module, scan the host scan. By analyzing and judging the information returned from the scanned host, the scanning module returns the scan results to the control platform, which is finally presented to the user by the control platform.


"Experimental Steps"

One, the use of Fluxay to the target Host account password scanning

    1. Open the Fluxay Password scanning Tool


650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/77/A4/wKioL1ZqfTygARPMAAElf4ZXgK8202.png "style=" float: none; "title=" 1111111.png "alt=" Wkiol1zqftygarpmaaelf4zxgk8202.png "/>


2. Select "File-Advanced Scan Wizard" to enter the start address, end the address tick the service that needs to be scanned


650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/77/A5/wKiom1ZqfUTDEUXNAAGCe2UiOFY069.png "style=" float: none; "title=" 2222222.png "alt=" Wkiom1zqfutdeuxnaagce2uiofy069.png "/>


3. Always "Next", click "Finish"


650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M01/77/A5/wKiom1ZqfUew_5W5AAFZFogLBuU064.png "style=" float: none; "title=" 3333333.png "alt=" Wkiom1zqfuew_5w5aafzfoglbuu064.png "/>


4. Click "Start" to scan


650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M02/77/A4/wKioL1ZqfUyDx6FxAAFE2S1dcS4850.png "style=" float: none; "title=" 4444444.png "alt=" Wkiol1zqfuydx6fxaafe2s1dcs4850.png "/>


5. When you are finished, review the build report



--fluxay (streamer) password scanning of network information collection

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.