random port, you can use UDP on the 1433 port to query specifically which port is listening.Use auxiliary/scanner/mssql/mssql_ping
Ssh_version identifying the SSH software versionAuxiliary/scanner/ssh/ssh_version
Ftp_version looking for FTP server in Target network
Brute Force hack
Kali with a dictionary path/usr/share/metasploit-framework/data/wordlists
Auxiliary/scanner/mysql/mysql_loginAuxiliary/scanner/http/tomcat_mgr_log
Metasploit can not only use the third-party scanner nmap, etc., in its auxiliary module also contains several built-in port scanners.View the port scanning tools provided by the Metasploit framework:msf > Search portscanmatching modules================ Name Disclosure Date Rank Description----------- -----------------------auxiliary/scanner/http/wordpress_pingback_access normal WordPress PINGB Ack Locator auxiliary/scanner/natpmp/natpmp_portscan normal NAT-PMP External Port scanner A Uxiliary/sc
access to only certain network segments and 22/TCP ports of a Linux host. if the administrator's IP address changes frequently, in this case, iptables is difficult to apply to such an environment. You can use the following two rules to solve the problem by using the recent module:-A input-p tcp-m tcp -- dport 22-m state -- state NEW-m recent -- update -- seconds 60 -- hitcount 4 -- name SSH -- rsource-j DROP-A input-p tcp-m tcp -- dport 22-m state -- state NEW-m recent -- set -- name SSH -- rso
4 -- name SSH -- rsource-j DROP-A input-p tcp-m tcp -- dport 22-m state -- state NEW-m recent -- set -- name SSH -- rsource-j ACCEPTAfter this rule is applied, if an IP address initiates more than four new connections to the Linux host 22/TCP port within one minute, the newly initiated connections will be discarded.
2. The recent module prevents port scanning.-A input-m recent -- update -- seconds 60 -- hitcount 20 -- name PORTSCAN -- rsource-j DROP-
frequently, in this case, iptables is difficult to apply to such an environment. The following two rules can be used to solve the problem by using the recent module:
-A input-p tcp-m tcp -- dport 22-m state -- state NEW-m recent -- update -- seconds 60 -- hitcount 4 -- name SSH -- rsource-j DROP
-A input-p tcp-m tcp -- dport 22-m state -- state NEW-m recent -- set -- name SSH -- rsource-j ACCEPT
After this rule is applied, if an IP address initiates more than four new connections to the Linux h
, in this case, iptables is difficult to apply to such an environment. The following two rules can be used to solve the problem by using the recent module:
-A input-p tcp-m tcp -- dport 22-m state -- state NEW-m recent -- update -- seconds 60 -- hitcount 4 -- name SSH -- rsource-j DROP
-A input-p tcp-m tcp -- dport 22-m state -- state NEW-m recent -- set -- name SSH -- rsource-j ACCEPT
After this rule is applied, if an IP address initiates more than four new connections to the Linux host 22/TCP
packages: adodb452.tar.gz?phplot-5.0rc1.tar.gzand acid-0.9.6b23.tar.gz. The installation process is very simple. You only need to extract the three software packages and expand them under the Apache server's document root directory.
As follows: (the document directory of this server is/www/ids)
# Cd/www/ids/
# Gzip-d-c adodb452.tar.gz | tar xvf-
# Gzip-d-c phplot-5.0rc1.tar.gz | tar xvf-
# Gzip-d-c acid-0.9.6b23.tar.gz | tar xvf-
Then, start the configuration and go to the acid directory to
complex task. snort also provides powerful intrusion detection functions. here I will only make a brief introduction so that you can have a concept. if the real object is used as an NIDS. more complex actions are required. for example, set a better rules and regularly update snort. rules defined in conf (when a new attack method appears, it should be updated in time)First, you need to change/etc/snort. conf to your own machine.# Set the location where logs are storedConfig logdir:/var/log/snort
being a warrior is not a simple thing, it is an endless struggle that lasts until the last moment of our lives. No life down is a warrior, like no life down is doomed mediocre, is we let ourselves become such or that!--Natsume StoneDesign ideas:Call Optparse. Optionparse () method, build option parser, accept host name (or IP address), scan port list two parameters. Build two functions Portscan and Connscan,portsc
vulnerabilities, familiarize ourselves with intrusion techniques, and study defense policies. Therefore, intrusion data analysis seems fashionable.
Hit @ me ① the honeypot has been built for half a month and various attacks are tested in the experimental environment (because the intrusion behavior is a time process, in order to complete the test of the intrusion data, I invited two assistants to conduct various attack experiments on Honeypot in the experimental environment), and I collected a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.