首页 > Web开发 > 详细

kali linux networking scanning Cookbok (第三章结尾笔记)

时间:2019-02-07 21:34:48      阅读:838      评论:0      收藏:0      [点我收藏+]

1、Zombie Scanning with Nmap

    Zombie scans can also be performed with an option in Namp ,  we can findly viable zombie candidates by sweeping an entire address range and assessing the IpID  sequence pattern with metasploit  :    we can use the metasploit  with the auxiliary :  the command as follows :

     use  the   auxiliary     :    auxiliary/ scanner/ip/ipidseq

     once an incremental idle host hab been identifited , we can perform the zombie scan in nmap using  the -sI  option an by passing it  the ip address of the zombie host that needs to be used for scanning :    nmap 192.168.142.182 -sI 192.168.142.183 -Pn -p  0-100

技术分享图片

 

kali linux networking scanning Cookbok (第三章结尾笔记)

原文:https://www.cnblogs.com/xinxianquan/p/10354001.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!