Network Security Technology Lab 2

Source: Internet
Author: User

Experiment 2 network scanning Experiment

Lab Objectives

L use network scanning software to understand the opening of the target host port and service, so as to further obtain information and identify system security vulnerabilities. Capture sensitive data (such as passwords) by using the packet capture software ). Through this experiment, we can learn about the risks of port and service opening, and enhance our awareness of network security protection. The lab requirements are as follows:

1. Familiar with the use of scanning programs (vulnerabilities and ports;

2. Ability to use the packet capture tool to analyze the principle of the scanning program;

3. Master the usage of superscan, Nmap, and xscan;

4. Learn how to view and manage ports;


Technical Principles

1. Introduction and usage of superscan:

A powerful port scanning tool. 1) ping the IP address to check whether the IP address is online; 2) IP address and domain name are converted to each other; 3) Check the service category provided by the target computer; 4) check whether the target computer is online and port in a certain range; 5) check whether the target computer is online and port in the custom list; 6) define the port to be checked, it can also be saved as a port list file ;.

2. Introduction and usage of xscan:

Xscan uses multiple threads to detect security vulnerabilities in a specified IP address segment (or a single machine). It supports plug-in functions and provides graphic interface and command line operations. The scan content includes: remote service type, operating system type and version, various types of weak password vulnerabilities, backdoors, application service vulnerabilities, network device vulnerabilities, and denial of service vulnerabilities.

3. Introduction and usage of NMAP:

NMAP is a network scanning and sniffing tool package for Linux, FreeBSD, UNIX, and windows. It has three basic functions: one is to detect whether a group of hosts are online, and the other is to scan host ports, network Service provided by sniffing; the operating system used by the host can also be inferred. NMAP can be used to scan networks with only two nodes and more than 500 nodes. NMAP also allows you to customize scan techniques. Generally, a simple ping operation using ICMP can meet General requirements. You can also thoroughly test the UDP or TCP port until the operating system used by the host; all test results can also be recorded in logs of various formats for further analysis.

4. netstat command

Tutorial steps:

L use superscan to scan open ports and vulnerabilities on hosts and LAN

L use xscan to scan open ports and vulnerabilities on hosts and LAN

L use NMAP to scan open ports and vulnerabilities on hosts and LAN

L View Management ports

Lab Device

2 pcs; vswitches; Network cables;


This article is from the network blog, please be sure to keep this source http://zznetwork.blog.51cto.com/9398550/1555415

Network Security Technology Lab 2

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.