Home Operation and Maintenance Linux Operation and Maintenance Linux enterprise port scanning practice

Linux enterprise port scanning practice

Aug 10, 2017 am 11:51 AM
linux Actual combat scanning

[Introduction] As the saying goes: A thousand-mile embankment is destroyed by an ant nest. Once a small vulnerability is discovered by an attacker, the final consequence may be the paralysis of the entire network. And how to discover security vulnerabilities in corporate networks? What key technologies need to be mastered and adopted? Is there any more popular and efficient tool that can

As the saying goes: "A thousand-mile dike is destroyed by an ant nest." Once a small vulnerability is discovered by an attacker, the final consequences may be to the entire network. of paralysis. And how to discover security vulnerabilities in corporate networks? What key technologies need to be mastered and adopted? Are there any popular and efficient tools that can be used to assist system administrators in scanning and discovering vulnerabilities?

Enterprise port scanning strategy

1. The purpose of port scanning

For those located in the network For a computer system, a port is a potential communication channel, that is, an intrusion channel. Performing port scanning on the target computer can obtain a lot of useful information to discover system security vulnerabilities. Through it, system users can understand what services the system currently provides to the outside world, thereby providing a reference method for system users to manage the network.

In terms of technical principles, port scanning sends detection packets to the TCP/UDP service port of the target host and records the response of the target host. By analyzing the response to determine whether the service port is open or closed, you can learn the services or information provided by the port. Port scanning can also monitor the operation of the local host by capturing the incoming and outgoing IP packets of the local host or server. It can not only analyze the received data, but also help users discover some inherent weaknesses of the target host without Detailed steps for entering a system will be provided. Generally speaking, the purpose of port scanning is usually one or more of the following:

1. Discover open ports: discover open TCP or UDP ports on the target system;

2. Understand Host operating system information: Port scanning can use the "fingerprint" of the operating system to infer information such as the version of the scanned operating system or application;

3. Understand the software or service version: The software or service version can be determined by " "Flag acquisition" or application fingerprint to identify and obtain;

4. Discover vulnerable software versions: Identify flaws in software and services, thereby helping to launch attacks against vulnerabilities.

Port scanning mainly includes classic scanners (full connection) and so-called SYN (semi-connection) scanners. There are also indirect scans and secret scans. The TCP scanning method establishes a standard TCP connection with the scanned host, so this method is the most accurate and rarely misses or false positives, but is easily detected and recorded by the target host. The SYN method establishes a semi-open connection with the target host, so that it is not easily recorded by the target host. However, the scanning results will cause false negatives. This false negative is serious when the network condition is not good.

2. Quickly install nmap for enterprise port scanning

nmap is a network detection and security scanning program that can be used by system administrators and individuals This software scans large networks to obtain information such as which hosts are running and what services are provided. nmap supports many scanning technologies, such as: UDP, TCP connect(), TCP SYN (half-open scanning), ftp proxy (bounce attack), reverse flag, ICMP, FIN, ACK scanning, Xmas Tree (Xmas Tree), SYN scanning and null scan. nmap also provides some advanced features, such as: detection of operating system type through TCP/IP protocol stack characteristics, secret scanning, dynamic delay and retransmission calculation, parallel scanning, detection of down hosts through parallel ping scanning, decoy scanning, avoidance Open port filtering detection, direct RPC scanning (no port mapping required), fragment scanning, and flexible target and port settings.

In order to improve the performance of nmap in the non-root state, the designers of the software have put in a lot of effort. Unfortunately, some kernel interfaces (such as raw sockets) need to be used in root state. So nmap should be used at root whenever possible.

Running nmap will usually get a list of scanned host ports. nmap will always give the service name of the well known port (if possible), port number, status and protocol information. The status of each port is: open, filtered, unfiltered.

  • The open status means that the target host can accept the connection using the accept() system call on this port;

  • The filtered status indicates firewall and packet filtering and other network security software mask this port, preventing nmap from detecting whether it is open.

  • unfiltered means that the port is closed and there is no firewall/packet filtering software to isolate nmap detection attempts. Normally, the status of a port is basically unfiltered. Only when most of the scanned ports are in the filtered state, the port in the unfiltered state will be displayed.

Depending on the feature options used, nmap can also report the following characteristics of the remote host: operating system used, TCP sequence, user name running the application bound to each port , DNS name, whether the host address is a spoofed address, and other things.

Before using it, we need to download the source code package of the software and install it.

The above is the detailed content of Linux enterprise port scanning practice. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Linux Architecture: Unveiling the 5 Basic Components Linux Architecture: Unveiling the 5 Basic Components Apr 20, 2025 am 12:04 AM

The five basic components of the Linux system are: 1. Kernel, 2. System library, 3. System utilities, 4. Graphical user interface, 5. Applications. The kernel manages hardware resources, the system library provides precompiled functions, system utilities are used for system management, the GUI provides visual interaction, and applications use these components to implement functions.

What computer configuration is required for vscode What computer configuration is required for vscode Apr 15, 2025 pm 09:48 PM

VS Code system requirements: Operating system: Windows 10 and above, macOS 10.12 and above, Linux distribution processor: minimum 1.6 GHz, recommended 2.0 GHz and above memory: minimum 512 MB, recommended 4 GB and above storage space: minimum 250 MB, recommended 1 GB and above other requirements: stable network connection, Xorg/Wayland (Linux)

How to run java code in notepad How to run java code in notepad Apr 16, 2025 pm 07:39 PM

Although Notepad cannot run Java code directly, it can be achieved by using other tools: using the command line compiler (javac) to generate a bytecode file (filename.class). Use the Java interpreter (java) to interpret bytecode, execute the code, and output the result.

vscode terminal usage tutorial vscode terminal usage tutorial Apr 15, 2025 pm 10:09 PM

vscode built-in terminal is a development tool that allows running commands and scripts within the editor to simplify the development process. How to use vscode terminal: Open the terminal with the shortcut key (Ctrl/Cmd). Enter a command or run the script. Use hotkeys (such as Ctrl L to clear the terminal). Change the working directory (such as the cd command). Advanced features include debug mode, automatic code snippet completion, and interactive command history.

How to check the warehouse address of git How to check the warehouse address of git Apr 17, 2025 pm 01:54 PM

To view the Git repository address, perform the following steps: 1. Open the command line and navigate to the repository directory; 2. Run the "git remote -v" command; 3. View the repository name in the output and its corresponding address.

Where to write code in vscode Where to write code in vscode Apr 15, 2025 pm 09:54 PM

Writing code in Visual Studio Code (VSCode) is simple and easy to use. Just install VSCode, create a project, select a language, create a file, write code, save and run it. The advantages of VSCode include cross-platform, free and open source, powerful features, rich extensions, and lightweight and fast.

What is the main purpose of Linux? What is the main purpose of Linux? Apr 16, 2025 am 12:19 AM

The main uses of Linux include: 1. Server operating system, 2. Embedded system, 3. Desktop operating system, 4. Development and testing environment. Linux excels in these areas, providing stability, security and efficient development tools.

vscode terminal command cannot be used vscode terminal command cannot be used Apr 15, 2025 pm 10:03 PM

Causes and solutions for the VS Code terminal commands not available: The necessary tools are not installed (Windows: WSL; macOS: Xcode command line tools) Path configuration is wrong (add executable files to PATH environment variables) Permission issues (run VS Code as administrator) Firewall or proxy restrictions (check settings, unrestrictions) Terminal settings are incorrect (enable use of external terminals) VS Code installation is corrupt (reinstall or update) Terminal configuration is incompatible (try different terminal types or commands) Specific environment variables are missing (set necessary environment variables)

See all articles