1、connect scanning with Scapy, Tools that perform Tcp scans operate by performing a full there-way handshake to establish a connection with all od the scanned ports on the remote targets system ,a ports status is determined based on whether a comnection was establish or not ,if a connection was established ,the port is determined to be open ,if a connection could not be established the port is determined to be closed .
from scapy.all import *;
print " \n\n --SENT---"
print " \n\n----RECEIVED ---"
print " SYN ACK not returned"
2、Connnect scanning with nmap
to perform a TCP connect scans with nmap the -sT option should be used with the ip address of the host to be scanned :
nmap -sT 192.168.142.170 -p 80
of course we can use nmap to perform scans on multiple sepcified ports by passing a comma-delimited list of the ports numbers as follows:
nmap -sT 192.168.142.170 -p 21,80,443
or use Nmap to scan a sequential series of the hosts by indicating the first and last port numbers to be scanned ,separated by the dash natation :
nmap -sT 192.168.142.170 -p 20-25
if we not desifnated port, Nmap perconfigured list ports form 1 to 1000.
3 、Connect scanning with Metasploit
Metasploit has an auxiliary module that can be used to perform TCP connect scans on specified TCP ports ,to open up Metasploit in kali linux ,use the command msfconsole
4、Connect scanning with Dmitry
dmitry is a multipurpose tool that be used to perform a TCP scan on the target system ,its capabilities are showwhat limited .
6、TCP port scanning with Netcat
performing a scan against an open port will return the ip address ,port address ,and port status ,performing the scan against a closed port on a live indicate that the connection we refused ,we can automate this in a loop as shown in the following command .
A sequential series of the port numbers can be passed through a loop ,and all of thr ports can be scanned easily and quickly,
7、Zombie scanning with Scapy
- XCode Always show "scanning for working copies" Solutions for
One SVN Project on , In the local re CheckOut After opening , Always hint "scanning for working copies" And can't use SVN Update . Submit and other functions , I wanted to hang it all night , Look at it ...
- focus docker Security :Security Scanning
Reading guide Docker There is no doubt that it is a hot topic for students in recent years ,Docker Safety is also attached great importance to ,Docker Security Scanning Is a Docker Security tools for image scanning , At present, it has Docker C ...
- The method of remote linking another server's database on the server how to connet the database from the other host
iwangzheng.com 16:57 [email@example.com]$ mysql -u<username> -p<password> -h10.103.xx.xx W ...
- Spring Filter components in auto scanning
In this Spring auto component scanning tutorial, you learn about how to make Spring auto scan your c ...
- Spring Auto scanning components
Normally you declare all the beans or components in XML bean configuration file, so that Spring cont ...
- h.264 scanning process for transform coefficients
Macroblocks are being transformed . After quantification , The magnitude is 4x4 perhaps 8x8 Matrix , The data in the matrix is called transform coefficient levels. these level It's going to be used for entropy coding later , So we need to put the matrix in a certain order ...
- wlan0 Interface doesn't support scanning : Device or resource busy
Problem: wlan0 Interface doesn't support scanning : Device or resource busy. Solved Way: sudo ifcong ...
- 【 Smart home 】wifi The principle of network access （ On ）—— scanning Scanning
Reprint please indicate the source :http://blog.csdn.net/Righthek thank you ! For the bow party , In the use of WIFI When the function , The most common operation is to turn on the phone WIFI equipment , Search for hot spots in your mind , Input passwor ...
- [Error]EOL while scanning string literal
There is a regular work project . Need a day's table data to the external interface , But it's always been abnormal lately . The reason for today's inspection . First, there is no problem with the test program in the local and test environment , In a network environment, only one exception will be thrown in the log . The main exception is the presumption of abnormal data . , ...
- tornado and django Combined use of tornado Server for django WSGI APP
#!/usr/bin/env python # Run this with # Serves by default at # http://localhost:8080/hello-tornado a ...
- Java Time and character exchange processing
/** * * @param timeStr Time string * @param diff The difference from the starting value , The unit is millisecond * @throws ParseException */ public String de ...
- HTTPS The principle of protocol degradation attack
0x00 HTTPS In traditional fashion web In service , because http The protocol doesn't encrypt packets , Lead to http The network packet under the protocol is plaintext transmission , So as long as the attacker intercepts http Packets under the protocol , You can directly peek at the data of these network packets . ...
- DML Data manipulation language
1.INSERT( Insert ) Language structure INSERT INTO table( Table name )( Column name to insert ) VALUES( The specific value to insert ): table: The table name of the table to insert data into column[,column]: In the table ...
- Personal collection of iOS Open source animation ----- Keep up with the new for a long time
1. KYAnimatedPageControl link :KYAnimatedPageControl KYAnimatedPageControl Not only can you slide UIScrollView It's automatically animated when it's done ...
- install SQL SERVER PROFILER
SQL SERVER 2008 R2 (10.50.40) edition , install SQL SERVER PROFILER: adopt command prompt, Use the following command :setup.exe /FEATURES ...
- python Cryptography programming
I am reading a book recently . The name is python Cryptography programming . Make some notes here , At the same time, it also provides some reference for those in need . *************************************************** ...
- CRC-16 (Modbus)
typedef unsigned char uint8_t; typedef unsigned short uint16_t; typedef unsigned int uint32_t; #defi ...
- MyBatis Batch insert data into the database
Foreach label foreach: collection: Specify the collection to traverse ; Represents the data type of the parameter passed in . This parameter is required . Want to do foreach The object of , As an input parameter ,List Object defaults to list generation ...
- Native JS obtain url Summary