流光扫描器工作原理(the work principle of streamer scanner)

上传人:xins****2008 文档编号:117076789 上传时间:2019-11-18 格式:DOC 页数:10 大小:32.50KB
返回 下载 相关 举报
流光扫描器工作原理(the work principle of streamer scanner)_第1页
第1页 / 共10页
流光扫描器工作原理(the work principle of streamer scanner)_第2页
第2页 / 共10页
流光扫描器工作原理(the work principle of streamer scanner)_第3页
第3页 / 共10页
流光扫描器工作原理(the work principle of streamer scanner)_第4页
第4页 / 共10页
流光扫描器工作原理(the work principle of streamer scanner)_第5页
第5页 / 共10页
点击查看更多>>
资源描述

《流光扫描器工作原理(the work principle of streamer scanner)》由会员分享,可在线阅读,更多相关《流光扫描器工作原理(the work principle of streamer scanner)(10页珍藏版)》请在金锄头文库上搜索。

1、流光扫描器工作原理(The work principle of streamer scanner)First, lets comment on several scannersWhat? You dont know what a scanner is? I am dizzy scanner is scanning it, it can detect the hosts vulnerability!Common ports scanners and CGI vulnerability scanners, as well as large scanners such as streamer, ca

2、n sweep everything.Lets start with the scanner principle!Now suppose youre A, you want to sweep BThen, the usual process of building a 3 handshake isA-Syn-BABThis establishes the connection, scanning is to build a lot of this, so as to understand what port opened the other side, which servicesThe po

3、werful scanner will be further explored, but the TCP scan will leave lots of records if the B network manager is not an idiotThen hell start to pay attention to you!So well also use the semi open scan (SYN)that isA-Syn-BA BA-connected-? scan - simple scanning -nt/98-IPBegan sweeping, sweeping to

4、 a lot of 139 open hostThen the IPC host, right key remote detecting user detectionThen there will be a lot of users and sharing being swept out, which may include weak passwords (see the killers streamer tutorial)Here I tell you a secret, that is, there are a lot of guest for the admin permissions,

5、 these passwords are generally emptyThis is because this host has been compromised, someone left the back door, this is cheap, we have to use it!As we said earlier, I dont like to scan with streamer, so here we use xscan to scan NT weak passwords!In the scan options, select the NT weak password, and

6、 then a IP range, let him sweep,Then you can wait for the battle, generalItll be great. Every time I sweep it, its cool!The next thing to say is how to use it!As mentioned earlier, I like to attack with streamer. Now lets see how powerful he is!Streamer 4- tool, -nt/iis tool, -nt, remote pipe comman

7、dEnter IP, the user name that just swept, password (if empty) do not fillConnect!Ntcmdnet userLook, even on the bar !Lets add a user nameNtcmdnet user aaa 123 /addThe command was successfully completedAdd to group administratorsNtcmdnet localgroup administrators aaa /addT

8、he command was successfully completedAll right, so the chicken is ready. What? You want to make him a springboard?OK, lets move onStreamer 4- tools, -nt/iis tools, -ipc growersAdd IP, username, password and so onThen startNext, well connect with ntcmd and go to debug snakes sksockserverSpecific I do not say, and we refer to their own instructionsOf course, we ca

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 大杂烩/其它

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号