官术网_书友最值得收藏!

Writing your own port scanner using netcat

While attackers utilize the proxying application and Tor network, it is also possible for them to write their own custom network port scanner. The following one-line command can be utilized during penetration testing to identify the list of open ports just by using netcat:

while read r; do nc -v -z $r 1-65535; done <iplist

The same script can be modified for more targeted attacks on a single IP as follows:

while read r; do nc -v -z target $r; done < ports

The chances of getting alerted in any intrusion detection system using custom port scanners is high.

主站蜘蛛池模板: 镇雄县| 杭锦后旗| 新干县| 太仆寺旗| 蒙城县| 井陉县| 禹城市| 威远县| 奇台县| 丹寨县| 合肥市| 教育| 万全县| 北安市| 定日县| 昂仁县| 崇义县| 普安县| 天峻县| 百色市| 女性| 高唐县| 龙口市| 通城县| 廊坊市| 平遥县| 修武县| 繁峙县| 同心县| 临沭县| 峡江县| 长垣县| 逊克县| 广饶县| 宜川县| 循化| 红河县| 玉山县| 会宁县| 昌邑市| 建湖县|