(Port scanner: superscan3.0 Chinese version
usage method
Open the main interface, which defaults to the scan menu, allowing you to enter one or more host names or IP ranges. You can also select the input address list under file. Enter the host name or IP range and start scanning. Click PlayButton and superscan to start scanning the address
After the scanning process is completed, superscan will provide a host list with information about the open ports discovered by each scanned host. Superscan also has the option to display information in HTML format.
About host and server scan settings (hostandservicediscovery)
So far, from the above examples, you have been able to perform simple scanning from a group of hosts. However, many times, you need to customize the scanning. The hostandservicediscovery option allows you to see more information when scanning.
At the top of the menu is the hostdiscovery item. By default, the host is discovered through echorequests. You can also discover hosts by using timestamp, addressmaskrequests, and informationrequests by selecting and canceling various optional scan mode options. Remember, the more options you choose, the longer the scan will take. If you are trying to collect as much information about a specific host as possible, it is recommended that you first perform a regular scan to find the host, and then use the optional request option to scan.
At the bottom of the menu, there are UDP port scan and TCP port scan items. Through the screenshot of the screen, you can notice that the most common ports that superscan initially started scanning are just those. The reason is that there are more than 65000 TCP and UDP ports. If more than 130000 port scans are performed on the IP address of each possible open port, how long will it take. Therefore, superscan initially starts scanning the most common ports, but gives you the option to scan additional ports.
----
Two X-Scan and fluxay (streamer) are recommended for novices. They are both in Chinese. There are many online tutorials
In addition to scanning many vulnerabilities and weak passwords like X-Scan, streamer also integrates common intrusion tools, such as dictionary tools and nt/iis tools. It also creates a "streamer sensor tool" that can control "broiler" to scan and a "grower" tool that installs services for "broiler".
Compared with X-Scan, streamer has more functions, but the operation is inevitably complicated. Due to the powerful function of streamer and the continuous expansion of its functions, the author Xiaorong of streamer has limited the IP range that streamer can scan and does not allow streamer to scan domestic IP addresses. In addition, the streamer beta version also has certain functional limitations. However, in order to maximize the use of streamer, intruders need to use special cracking programs to crack streamer before using streamer to remove the restrictions on IP range and function. This document contains the following attachments:
scanner. exe
scanner. hlp
scanner. ini
scanner. cnt
scanner. lst
trojans. lst
ws2check. exe
hensss. lst....)