- Kali Linux Cookbook(Second Edition)
- Corey P. Schultz Bob Perciaccante
- 80字
- 2021-07-02 18:27:22
Identifying network hosts
There are various methods we can use to scan for hosts on internal or external networks. We will explore some of these in detail. We will use nmap for several examples in this section. TCP port scans are default within nmap as most of our well-known servers running using TCP. However, from a penetration standpoint, there are some very useful UDP ports that might be open that could provide us with attack vectors such as SNMP.
推薦閱讀
- Google Flutter Mobile Development Quick Start Guide
- Java系統分析與架構設計
- Interactive Data Visualization with Python
- 從學徒到高手:汽車電路識圖、故障檢測與維修技能全圖解
- 深入理解Elasticsearch(原書第3版)
- Learning AngularJS for .NET Developers
- Frank Kane's Taming Big Data with Apache Spark and Python
- Node學習指南(第2版)
- 編程可以很簡單
- Mastering Android Studio 3
- WCF技術剖析(卷1)
- PostgreSQL 12 High Availability Cookbook
- Cloud Development andDeployment with CloudBees
- Java程序性能優化實戰
- 零基礎入門學習C語言:帶你學C帶你飛