当前位置:网站首页>Vulnerability scanning and reverse osmosis of Internet anti artifact
Vulnerability scanning and reverse osmosis of Internet anti artifact
2022-06-26 11:29:00 【BOGO】
The Internet is a battlefield without gunpowder , A while ago, I went to the customer's site and found that the springboard machine of the customer was intruded , Then 20 Super simple password servers have been reduced to mining machines . The normal program cannot run and the business is disturbed !
So today I'd like to talk about leakage and reverse osmosis !!
In general, the bottom layer of the leakage products on the market is with the help of masscan and nmap To achieve ,masscan comparison nmap It's a lot faster ,masscan Asynchronous transmission mode is adopted , Stateless scanning mode .nmap Need record tcp/ip The state of ,os Can handle TCP/IP The maximum number of connections is 1500 about .
BOGO used it before nmap I wrote a missing script , Can generate execl A script that records a weak password and sends it to a specific mailbox . Wait until you have time ! Enrich it into a small full stack project and give you an analysis of the underlying principles of implementation .
Then before you can build weapons , I can't take a copy under the fire stick ! I'll give you a present today AK47 Use it first !
Start with login and configure :
Many of them choose default . We only configure this part
The server IP Address segment , If more than one paragraph can be filled in the next line . Support B Segment scan !
Then we go back to the home page :
Simple 、 Clean and tidy 、 Dark color magic weapon standard match ~
You can enter the protocol in the search box 、 port 、 service 、IP Wait a series of things for you to find the information you want . I won't list the question mark beside if it helps me !~
server:ssh It means finding all the open ssh Port server
give the result as follows ( My test environment is two virtual machines ):
Then we check all the result sets , Then add tasks :
Then choose... In turn
Then save the execution , There's a task
Then wait a moment , Wait for the little hole to become solid . We click on the task name and we will find that your weak password is exploded directly !
What about? ? God is not magical ? Li is not fierce ? Then there are more cows X Of !
In the same way we type server:mysql, And then choose mysql Weak password
According to the performance of your machine , Maybe the accountant will calculate some time and then be knocked away root password .
So what vulnerabilities can it scan ?
Thanks to his plug-in , Some plug-ins are listed above , At present, the total is 71 Modules for penetration testing , And can customize the module and test script cattle X Well !
In addition to the above scanning method, you can also directly click the name of the plug-in to scan .
After the test, there are various statistical reports !
Can collect information at one time , It can also be scanned regularly !
So smart students will ask , On what basis did he break the code ?
ha-ha , That's it !
you 're right ! Weak password dictionary ! But the initial value is only a few dozen ! How could Bogor just shoot people without bullets ? Bogor's ready for you 1 Ten thousand weak password dictionaries ! Just copy and paste in , Then click Update !
边栏推荐
猜你喜欢
机器学习LDA——实验报告
[redis series] redis learning 16. Redis Dictionary (map) and its core coding structure
TCP interview
[deep learning theory] (6) recurrent neural network RNN
机器学习PCA——实验报告
Compréhension approfondie de l'expérience de port série stm32 (registre) [Tutoriel de niveau nounou]
MQTT断开重连
18: Chapter 3: development of pass service: 1: SMS login & registration process, introduction; (SMS verification code is used here)
redux相关用法
TCP面试
随机推荐
[deep learning theory] (7) long and short term memory network LSTM
Ctfshow web getting started command execution web75-77
FasterRCNN
How to prevent weight loss under Gao Bingfa?
Redis best practices? If I don't feel excited after reading it, I will lose!!
手机注册股票开户 开户安全吗
Sqli-labs靶场1-5
机器学习聚类——实验报告
Apiccloud implements the document download and preview functions
Quantitative elementary -- akshare obtains stock code, the simplest strategy
19:第三章:开发通行证服务:2:在程序中,打通阿里云短信服务;(仅仅是打通阿里云短信服务器,不涉及具体的业务开发)
laravel-admin 用 原生JS实现声音提示,及自动播放
ctfshow web入门 命令执行web75-77
wangEditor 上传本地视频修改
Machine learning LDA - Experimental Report
利用 Repository 中的方法解决实际问题
再获认可!知道创宇入选“业务安全推进计划”首批成员单位
MOS管基本原理,单片机重要知识点
高并发下如何防重?
在Oracle中update大量数据会不会导致undo空间爆掉