The port is the current computer and outside the channel, so once the hacker locks the target computer, it will scan the computer is already open port, so as to get more useful information. Scan destination computer ports generally use Superscan, X-scan, and so on.First, the
First, TCP
Commonly used port scanning methods are the following three: 1.connect scanning
We know that the common TCP socket implementation process is
The more essential connection and end process is the following:
From the above two figures we can see that the target host of a port if the monitoring state (listening or linsten), then when I connect the target host can be successful, otherwise the
port is successful, it means that the port is open, otherwise it is closed.The most common feature of this technology is simplicity, and it does not require any permissions.The code is as follows:#include #include#pragmaComment (lib, "Ws2_32")#defineSTART 80//Start Port#defineEND 1024//terminating PortintMainintargcChar*argv[]) { inti; Wsadata ws; //WS used to
I have been working for half a year on part-time security. I would like to share with you how I am doing security here. of course, as a part-time employee, I am not very thorough and I am not a reference for attacking. The following describes port security, which is mainly used to enable ports for all ip segments in the IDC of the company. for example, for a server, only the ssh port is required by default.
A few days ago, I started to learn socket. I wrote a single-threaded single-host port scanner for one of the great help of yunshu. Today I want to change it to multi-host scanning, (The thread is still single and slow, but it can be used for learning. It doesn't matter if it is slow), but it won't be changed. Please give me some advice.
/*Name: netxportCopyright: netxflyAuthor: netxflyDate: 12-10-04Description: A simple
Port Security Scan script
I have been working for half a year on part-time security. I would like to share with you how I am doing security here. Of course, as a part-time employee, I am not very thorough and I am not a reference for attacking.
The following describes port security, which is mainly used to enable ports for all ip segments in the IDC of the compan
Port scan
Using System;Using System.Drawing;Using System.Collections;Using System.ComponentModel;Using System.Windows.Forms;Add the following.Using System.Data;Using System.Net.Sockets;Using System.Net;Using System.IO;Using System.Text;Using System.Threading;
Namespace Iportscan{Summary description for Form1.public class Form1:System.Windows.Forms.Form{This is where the public variables that the program is
socket, time, threadSocket.setdefaulttimeout (3) def socket_port (Ip,port):"""Enter IP and port number, scan to determine if port is open"""TryIf port>=65535:Print U ' Port scan end 'S
This article introduces Pyhton port scan script code
#-*-Coding: utf8 -*-#! /Usr/bin/python # Program: port scan import socket, time, threadsocket. setdefatimetimeout (3) def socket_port (ip, port): "Enter the IP address and port
In addition to reconnaissance IP, there is also one-port scan in the hacker's detection mode. "Port scans" allow you to know which services, ports are open and not used (which you can understand to find the channel to the computer) that is being scanned.
first, port scanning
Easy to find remote
Pyhton Scan Port Script code
#-*-Coding:utf8-*-#!/usr/bin/python# Program: Port scan import socket, time, Threadsocket.setdefaulttimeout (3) def Soc Ket_port (Ip,port): "" "Enter IP and port number,
I,
TCP scan technology
There are many common port scanning technologies, such as TCP connect () scanning, tcp syn scanning, and tcp fin scanning. There are also many articles on the network, such: the most basic scanning technology used by my program is described on the http://www.antai-genecon.com/suml/zhishiyy/jingong/duankougj.htm: TCP scanning.The CONNECT () System Call provided by the operating system
ArticleDirectory
I. Overview
Ii. NMAP implementation
Iii. Python implementation (using Python-NMAP)
Due to work requirements, I used UDP port scanning knowledge during this time. Here I will summarize it for my convenience. I. Overview
Task Description:Develop oneProgramUsed to obtain the list of Host IP addresses that enable the SNMP service in the LAN, and write the corresponding files for other programs to use.Background:SNMP
Reprinted: you can scan segment B and crack some service passwords According to the dictionary, such as FTP, SSH, MySQL, MSSQL, and Oracle. The system will automatically try to empty and weak passwords, for example, ftp Anonymous logon, mssql sa blank password, and oracle default password. Is it recommended to scan about 50 IP addresses due to php timeout? Php # ClassBPHPportscannerby
Reprinted: you can
IntroducedPython-nmap is a port scanning tool based on the system Nmap command, which is simple and convenient to use.Recently, in order to enhance server security and supervision, it is necessary to keep the company server open port scan records every day, once there is an increase in the decrease can be found.Previously wrote a https://github.com/bashhu/monitor
I. Overview
Task Description:
Develop a program to obtain a list of host IP addresses for the SNMP service on the LAN and write the corresponding files for use by other programs.
Background knowledge:
SNMP is UDP-based, and the standard SNMP service uses 161 and 162 ports.
Ideas:
1, get the local area online host list;
2, get the SNMP port of each host (for example, 161) to open the State;
3. Write specific files in a specific format.
Only the first t
I. OverviewTask Description:Develop a program to obtain a list of host IP addresses in the LAN on which the SNMP service is opened, and write the corresponding files for use by other programs.Background knowledge:SNMP is based on UDP, and the standard SNMP service uses ports 161 and 162.Ideas:1, access to the local domain online host list;2, to obtain the SNMP port of each host (such as 161) open condition;3. Write specific files in a specific format.
Nmap, Port Scan, get the IP address of the ssh server, nmapssh
Arp-a // the same network segment. ifconfig-a // old ip addr // ip a: iproute2 suitesudo nmap-sS 192.168.1. * // or sudo nmap-sS-p 22 192.168.1.0/24; if you ip address is in 192.168.1.1-255. -sP determines which hosts on the current network are online after penetrating the Intranet;-p 22 port number,
Bulk scan IP Port, the result of exporting IP-named files based on scanned IP.Assume that the contents of the 1.txt file are127.0.0.1192.168.1.1Then we get the file content IP to scanwindow. bat version
: 1.txt for file name, modify according to requirement: C:\nmap\nmap-6.46\nmap.exe is the path of Namp, modify according to requirement: put 1.txt together with the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.