|
扫描器---nmap
Usage: nmap [Scan Type(s)] [Options] <host or net list>
-sS TCP SYN stealth port scan (default if privileged (root))
-sT TCP connect() port scan (default for unprivileged users)
-sU UDP port scan
-sP ping scan (Find any reachable machines)
-P0 Don't ping hosts
-O Use TCP/IP fingerprinting to guess remote operating system
-v Verbose.
-o <logfile> Output scan logs to <logfile>
-p <range> ports to scan. Example range: 1-1024,1080,6666,31337
例子:# nmap -sS -p 21,23,53,80 -O -v www.yourserver.com
-------------------------------------------------------------------------
密码破解---John the Ripper
Usage: john-386 [OPTIONS] [PASSWORD-FILES]
--wordlist=FILE --stdin wordlist mode, read words from FILE or stdin
--restore[=NAME] restore an interrupted session [called NAME]
--show show cracked passwords
--test perform a benchmark
解密过程中可以使用Ctrl+C键中止,下次可以从断点继续,所有已破解的密码保存在john.pot文件中,进度文件名默认为restore。
-------------------------------------------------------------------------
嗅探器---tcpdump
tcpdump快速入门手册:http://tcpdump.anheng.com.cn/news/22/591.html
-------------------------------------------------------------------------
nmap参考指南:http://insecure.org/nmap/man/zh/index.html
John the Ripper文档:http://www.openwall.com/john/doc/
tcpdump手册:http://www.tcpdump.org/tcpdump_man.html |
|