"Experimental Purpose"
1) Mastering the principle of Fluxay (streamer) password scanning
"Experimental principle"
How the vulnerability scanner works:
The network vulnerability scanner logs the response to the target by remotely detecting the service of the destination host TCP/IP different ports. In this way, you can collect various information about the target host (for example, whether you can log on anonymously, if there is a writable FTP directory, whether you can use TELNET,HTTPD to run with root). After obtaining information about the destination host TCP/IP port and its corresponding network access Service, the vulnerability library provided by the Network vulnerability scanning system is matched, and if matching conditions are met, it is considered a vulnerability exists. In addition, by simulating the hacker's offensive tactics, the target host system to attack the security vulnerability scan, such as testing weak password, is also one of the implementation of the scanning module. If the impersonation attack succeeds, it is considered a vulnerability exists.
In the matching principle, the network vulnerability scanner uses rule-based matching technology, that is, according to security experts on Network system security vulnerability, hacker attack case analysis and system administrator on the network system security configuration of the actual experience, the formation of a set of standard system Vulnerability Library, and then on this basis to form the corresponding matching rules, The analysis of the System vulnerability scan is done automatically by the program.
The implementation of a rule-based matching system is essentially a knowledge engineering problem, and its function should be able to be exploited with the accumulation of experience, and its self-learning ability can be extended and modified by rules, which is the expansion and correction of the system vulnerability database. Of course, such ability is still needed under the guidance and participation of experts to achieve. However, it should also be seen that some system vulnerabilities may not trigger any rule that is not detected because of the limitations of the vulnerability library coverage.
The whole network scanner works: When the user through the control platform issued a scan command, the control platform to the scanning module issued a corresponding scan request, scan module immediately after receiving the request to start the corresponding sub-function module, scan the host scan. By analyzing and judging the information returned from the scanned host, the scanning module returns the scan results to the control platform, which is finally presented to the user by the control platform.
"Experimental Steps"
One, the use of Fluxay to the target Host account password scanning
Open the Fluxay Password scanning Tool
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/77/A4/wKioL1ZqfTygARPMAAElf4ZXgK8202.png "style=" float: none; "title=" 1111111.png "alt=" Wkiol1zqftygarpmaaelf4zxgk8202.png "/>
2. Select "File-Advanced Scan Wizard" to enter the start address, end the address tick the service that needs to be scanned
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/77/A5/wKiom1ZqfUTDEUXNAAGCe2UiOFY069.png "style=" float: none; "title=" 2222222.png "alt=" Wkiom1zqfutdeuxnaagce2uiofy069.png "/>
3. Always "Next", click "Finish"
650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M01/77/A5/wKiom1ZqfUew_5W5AAFZFogLBuU064.png "style=" float: none; "title=" 3333333.png "alt=" Wkiom1zqfuew_5w5aafzfoglbuu064.png "/>
4. Click "Start" to scan
650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M02/77/A4/wKioL1ZqfUyDx6FxAAFE2S1dcS4850.png "style=" float: none; "title=" 4444444.png "alt=" Wkiol1zqfuydx6fxaafe2s1dcs4850.png "/>
5. When you are finished, review the build report
--fluxay (streamer) password scanning of network information collection