Hacker----Scan target computer port

Source: Internet
Author: User

The port is the current computer and outside the channel, so once the hacker locks the target computer, it will scan the computer is already open port, so as to get more useful information. Scan destination computer ports generally use Superscan, X-scan, and so on.

First, the principle of port scanning

Before scanning the port, the user must understand how the port scan works. Simply put, the principle is to use the data packet to analyze the response of the target computer, so as to get the port open information of the target computer and the weakness information in the system .

Port scanning refers to sending the same information on the local computer to all ports on the destination computer, and then determining which ports on the target computer are open and which ports can be used, based on the response status returned . The most common use of scanning software is to scan ports, which are known as "port scanners". The port scanner sends probe packets to the TCP/IP service port of the destination computer, noting the response of the target computer, collecting a lot of useful information about the target computer, including whether a port is listening, allowing anonymous logons, Whether there is a writable FTP directory and whether to use Telnet and so on.

Second, using Superscan scan port

Superscan is a free port scanning software developed by Foundstone, the software is very powerful, compared with similar software, the software is both an intrusion software, but also a network security software. The software allows you to randomly scan a specified port with a simple port information description.

There are two cases of using the Superscan scan port:

    • Scan the specified IP address in the range of the computer to the port;
    • Scan destination computer for port information

1, scan the designated IP address in the range of the computer to the port

The user scan port has no specific purpose, just to understand the destination computer in some cases, you can choose to scan the specified IP address range in the computer to the port. Select this mode to scan the port will have a certain impact on the computer, easy to arouse the other side alert.

1) Run Superscan as Administrator;

2) Add IP address range;

3) Start scanning;

4) View the scan results;

5) View the computer port information;

This result includes information such as the scanned computer's IP address, host name, and the open port in the computer.

2. Scan target computer port

Hackers generally prefer to use the scanning destination computer port to understand the open port in the target computer, through this kind of scanning method can obtain more multiport information, in order to choose the intrusion mode. Superscan provides the ability to scan target computers, note that the host and server scan settings need to be adjusted before the target computer is scanned .

1) Add the address masking request;

Switch to "host and Service scan settings" and select "Address Mask Request"

Note: This tab provides a way to find the target computer in Echo request, timestamp request, address mask request, and Information request 4.

2) tcp/udp port scan settings;

3) Add target computer;

Switch to the Scan tab and enter the destination computer IP address.

4) Start scanning;

5) View simple scan results;

6) view detailed scan results;

Click "View HTML Results"

Other common features of Tips:superscan

In addition to providing basic port scanning capabilities, Superscan provides the ability to exchange host names/IP addresses, ping commands, and more. Use these features to quickly get information about the target host and to see if the local computer is connected to the destination computer.

Switch to the Tools tab in the Superscan main interface, enter the IP address of the destination computer, click Find hostname/IP to see the hostname of the IP address, and click Ping to see if the local computer is connected to the destination computer.

Hacker----Scan target computer port

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.