找回密码
 立即注册
邮电通讯系统 2022-06-20 112 0star收藏 版权: . 保留作者信息 . 禁止商业使用 . 禁止修改作品
端口扫描器:SuperScan3.0中文版
使用方法
打开主界面,默认为扫描(Scan)菜单,允许你输入一个或多个主机名或IP范围。你也可以选文件下的输入地址列表。输入主机名或IP范围后开始扫描,点Playbutton,SuperScan开始扫描地址
扫描进程结束后,SuperScan将提供一个主机列表,关于每台扫描过的主机被发现的开放端口信息。SuperScan还有选择以HTML格式显示信息的功能。
关于主机和服务器扫描设置(HostandServiceDiscovery)
到目前为止,从以上的例子,你已经能够从一群主机中执行简单的扫描,然而,很多时候需要你定制扫描。HostandServiceDiscovery选项可以让你在扫描的时候看到的更多信息。
在菜单顶部是HostDiscovery项。默认的,发现主机的方法是通过重复请求(echorequests)。通过选择和取消各种可选的扫描方式选项,你也能够通过利用时间戳请求(timestamp),地址屏蔽请求(addressmaskrequests)和消息请求(informationrequests)来发现主机。紧记,你选择的选项越多,那么扫描用的时间就越长。如果你正在试图尽量多的收集一个明确的主机的信息,建议你首先执行一次常规的扫描以发现主机,然后再利用可选的请求选项来扫描。
在菜单的底部,包括UDP端口扫描和TCP端口扫描项。通过屏幕的截图,注意到SuperScan最初开始扫描的仅仅是那几个最普通的常用端口。原因是有超过65000个的TCP和UDP端口。若对每个可能开放端口的IP地址,进行超过130000次的端口扫描,那将需要多长的时间。因此SuperScan最初开始扫描的仅仅是那几个最普通的常用端口,但给你扫描额外端口的选项。
----
推荐2个新手用的X-Scan和Fluxay(流光),都是中文版的,网上教程很多
流光这款软件除了能够像X-Scan那样扫描众多漏洞、弱口令外,还集成了常用的入侵工具,如字典工具、NT/IIS工具等,还独创了能够控制“肉鸡”进行扫描的“流光Sensor工具”和为“肉鸡”安装服务的“种植者”工具。
与X-Scan相比,流光的功能多一些,但操作起来难免繁杂。由于流光的功能过于强大,而且功能还在不断扩充中,因此流光的作者小榕限制了流光所能扫描的IP范围,不允许流光扫描国内IP地址,而且流光测试版在功能上也有一定的限制。但是,入侵者为了能够最大限度地使用流光,在使用流光之前,都需要用专门的破解程序对流光进行破解,去除IP范围和功能上的限制。本资料共包含以下附件:
scanner.exe
scanner.hlp
scanner.ini
scanner.cnt
scanner.lst
trojans.lst
ws2check.exe
hensss.lst....

(Port scanner: superscan3.0 Chinese version
usage method
Open the main interface, which defaults to the scan menu, allowing you to enter one or more host names or IP ranges. You can also select the input address list under file. Enter the host name or IP range and start scanning. Click PlayButton and superscan to start scanning the address
After the scanning process is completed, superscan will provide a host list with information about the open ports discovered by each scanned host. Superscan also has the option to display information in HTML format.
About host and server scan settings (hostandservicediscovery)
So far, from the above examples, you have been able to perform simple scanning from a group of hosts. However, many times, you need to customize the scanning. The hostandservicediscovery option allows you to see more information when scanning.
At the top of the menu is the hostdiscovery item. By default, the host is discovered through echorequests. You can also discover hosts by using timestamp, addressmaskrequests, and informationrequests by selecting and canceling various optional scan mode options. Remember, the more options you choose, the longer the scan will take. If you are trying to collect as much information about a specific host as possible, it is recommended that you first perform a regular scan to find the host, and then use the optional request option to scan.
At the bottom of the menu, there are UDP port scan and TCP port scan items. Through the screenshot of the screen, you can notice that the most common ports that superscan initially started scanning are just those. The reason is that there are more than 65000 TCP and UDP ports. If more than 130000 port scans are performed on the IP address of each possible open port, how long will it take. Therefore, superscan initially starts scanning the most common ports, but gives you the option to scan additional ports.
----
Two X-Scan and fluxay (streamer) are recommended for novices. They are both in Chinese. There are many online tutorials
In addition to scanning many vulnerabilities and weak passwords like X-Scan, streamer also integrates common intrusion tools, such as dictionary tools and nt/iis tools. It also creates a "streamer sensor tool" that can control "broiler" to scan and a "grower" tool that installs services for "broiler".
Compared with X-Scan, streamer has more functions, but the operation is inevitably complicated. Due to the powerful function of streamer and the continuous expansion of its functions, the author Xiaorong of streamer has limited the IP range that streamer can scan and does not allow streamer to scan domestic IP addresses. In addition, the streamer beta version also has certain functional limitations. However, in order to maximize the use of streamer, intruders need to use special cracking programs to crack streamer before using streamer to remove the restrictions on IP range and function. This document contains the following attachments:
scanner. exe
scanner. hlp
scanner. ini
scanner. cnt
scanner. lst
trojans. lst
ws2check. exe
hensss. lst....)

[下载]14383335700.rar




上一篇:LoadRunner教程8.1
下一篇:ipTicker一款通过网络实时流量进行IP追踪诊断的工具