1、connect scanning with Scapy,   Tools that perform  Tcp scans operate by performing a full there-way handshake to establish a connection with all od the scanned ports on the remote targets system ,a ports status is determined based on  whether a comnection was establish or not ,if a connection was established ,the port is determined to be open ,if a connection could not be established the port is determined to be closed .

import logging

logging.getlogger("scapy.runtime").setLevel(logging.ERROR)

from scapy.all import *;

SYN=IP(dst="192.168.142.170")/TCP(dport=80,flags='S')

print "-----SENT-----"

pritn "\n\n----RECEIVER---"

response=sr1(SYN,timeout=1,verbose=0)

response.display()

if int(response[TCP].flags)==18;

print " \n\n --SENT---"

ACK=IP(dst="192.168.142.170")/TCP(dport=80,flags='A',ack=(response[TCP].seq+1))

response2=sr1(ACK,timeout=1,verbose=0)

ACK.disply()

print " \n\n----RECEIVED ---"

response2.display()

else:

print  " SYN ACK not returned"

2、Connnect scanning with nmap

to perform a TCP connect  scans with nmap the -sT option should be used with the ip address of the host to be scanned :

nmap -sT 192.168.142.170 -p 80

of course  we can use nmap to perform scans on multiple sepcified ports by passing a comma-delimited list of the ports numbers as follows:

nmap -sT 192.168.142.170 -p 21,80,443

or use Nmap to scan a sequential series of the hosts by indicating the first and last port numbers to be scanned ,separated by the dash natation :

nmap -sT 192.168.142.170 -p 20-25

if we not desifnated port, Nmap perconfigured list ports  form 1 to 1000.

3 、Connect scanning with  Metasploit

Metasploit has an  auxiliary module that can be used to perform TCP connect scans on specified TCP ports ,to open up Metasploit in kali linux ,use the command msfconsole

4、Connect scanning with Dmitry

dmitry  is a multipurpose tool that be used to perform a TCP scan on the target system ,its capabilities are showwhat limited .

6、TCP port scanning with Netcat

performing a scan against an open port will return the ip address ,port address ,and port status ,performing the scan against a closed port on a live indicate that the connection  we refused ,we can automate this  in a loop as shown in the following command .

A  sequential series of the port numbers can be passed through a loop ,and all of thr ports can be scanned easily and quickly,

7、Zombie scanning with Scapy

Connet Scanning More articles about

  1. XCode Always show "scanning for working copies" Solutions for

    One SVN Project on , In the local re CheckOut After opening , Always hint "scanning for working copies" And can't use SVN Update . Submit and other functions , I wanted to hang it all night , Look at it ...

  2. focus docker Security :Security Scanning

    Reading guide Docker There is no doubt that it is a hot topic for students in recent years ,Docker Safety is also attached great importance to ,Docker Security Scanning Is a Docker Security tools for image scanning , At present, it has Docker C ...

  3. The method of remote linking another server's database on the server how to connet the database from the other host

    iwangzheng.com 16:57 [root@a02.cmsapi]$ mysql -u<username> -p<password> -h10.103.xx.xx W ...

  4. Spring Filter components in auto scanning

    In this Spring auto component scanning tutorial, you learn about how to make Spring auto scan your c ...

  5. Spring Auto scanning components

    Normally you declare all the beans or components in XML bean configuration file, so that Spring cont ...

  6. h.264 scanning process for transform coefficients

    Macroblocks are being transformed . After quantification , The magnitude is 4x4 perhaps 8x8 Matrix , The data in the matrix is called transform coefficient levels. these level It's going to be used for entropy coding later , So we need to put the matrix in a certain order ...

  7. wlan0 Interface doesn&#39;t support scanning : Device or resource busy

    Problem: wlan0 Interface doesn't support scanning : Device or resource busy. Solved Way: sudo ifcong ...

  8. 【 Smart home 】wifi The principle of network access ( On )—— scanning Scanning

    Reprint please indicate the source :http://blog.csdn.net/Righthek  thank you ! For the bow party , In the use of WIFI When the function , The most common operation is to turn on the phone WIFI equipment , Search for hot spots in your mind , Input passwor ...

  9. [Error]EOL while scanning string literal

    There is a regular work project . Need a day's table data to the external interface , But it's always been abnormal lately . The reason for today's inspection . First, there is no problem with the test program in the local and test environment , In a network environment, only one exception will be thrown in the log . The main exception is the presumption of abnormal data . , ...

Random recommendation

  1. tornado and django Combined use of tornado Server for django WSGI APP

    #!/usr/bin/env python # Run this with # Serves by default at # http://localhost:8080/hello-tornado a ...

  2. Java Time and character exchange processing

    /** * * @param timeStr Time string * @param diff The difference from the starting value , The unit is millisecond * @throws ParseException */ public String de ...

  3. HTTPS The principle of protocol degradation attack

    0x00 HTTPS In traditional fashion web In service , because http The protocol doesn't encrypt packets , Lead to http The network packet under the protocol is plaintext transmission , So as long as the attacker intercepts http Packets under the protocol , You can directly peek at the data of these network packets . ...

  4. DML Data manipulation language

    1.INSERT( Insert ) Language structure INSERT INTO table( Table name )( Column name to insert ) VALUES( The specific value to insert ): table: The table name of the table to insert data into column[,column]: In the table ...

  5. Personal collection of iOS Open source animation ----- Keep up with the new for a long time

    1. KYAnimatedPageControl link :KYAnimatedPageControl KYAnimatedPageControl  Not only can you slide UIScrollView It's automatically animated when it's done ...

  6. install SQL SERVER PROFILER

    SQL SERVER 2008 R2 (10.50.40) edition , install SQL SERVER PROFILER: adopt command prompt, Use the following command :setup.exe /FEATURES ...

  7. python Cryptography programming

    I am reading a book recently . The name is python Cryptography programming . Make some notes here , At the same time, it also provides some reference for those in need . *************************************************** ...

  8. CRC-16 (Modbus)

    typedef unsigned char uint8_t; typedef unsigned short uint16_t; typedef unsigned int uint32_t; #defi ...

  9. MyBatis Batch insert data into the database

    Foreach label foreach: collection: Specify the collection to traverse ; Represents the data type of the parameter passed in . This parameter is required . Want to do foreach The object of , As an input parameter ,List Object defaults to list generation ...

  10. Native JS obtain url Summary

    stay WEB In development , Many developers prefer to use javascript To get the current url website , In this paper, we summarize the more commonly used access URL Of javascript Implementation code URL That is, the uniform resource locator (Uniform Re ...