官术网_书友最值得收藏!

Writing your own port scanner using netcat

While attackers utilize the proxying application and Tor network, it is also possible for them to write their own custom network port scanner. The following one-line command can be utilized during penetration testing to identify the list of open ports just by using netcat:

while read r; do nc -v -z $r 1-65535; done <iplist

The same script can be modified for more targeted attacks on a single IP as follows:

while read r; do nc -v -z target $r; done < ports

The chances of getting alerted in any intrusion detection system using custom port scanners is high.

主站蜘蛛池模板: 绥江县| 泾阳县| 沅陵县| 丽江市| 苍梧县| 钦州市| 梅州市| 平舆县| 北辰区| 贵德县| 福泉市| 遂川县| 锦州市| 裕民县| 汤阴县| 盐山县| 吉隆县| 绥宁县| 饶阳县| 渑池县| 隆化县| 锡林浩特市| 乐亭县| 乐山市| 南通市| 陇川县| 元氏县| 肥西县| 名山县| 荃湾区| 乐清市| 喀喇| 永吉县| 博客| 光泽县| 铜梁县| 昌平区| 福清市| 天全县| 醴陵市| 贡嘎县|