Читать книгу Hacking of Computer Networks - Dr. Hidaia Mahmood Alassouli - Страница 16

Оглавление

ii. Network Scan Tools

 You can use the superscan windows tool

 You can use the advanced IP scanner


 In backtrack you can do scan using nmap

# nmap -sV 192.168.28.139

 You can use Znmap tool

 You can use the nmap command

# nmap –A –v –oA report 192.168.1.0/24 –p-

 If you want to make scan without showing the offline hosts, remove –v.

# nmap –A –oA report 192.168.1.0/24 –p-

 Use the program Dradis. Go backrack, reporting tools, evidence management, dradis. It works https. Go to the browser and write https//127.0.0.1:3004. Write the username admin and the password admin.


In dradis, click on import from file> Choose the xml file and make upload. You will get all destinations in the subnetwork.

 Scan by metasploit armtage


 Go to backtrack, exploitation tools, network exploitation tools, metasploit framework, armitage


 We can use Cobalt Strike tool. You must buy the tool as it is not free


iii. Vulnerability Scanning


 There are many programs for vulnerability scanning: Nessus, acunetix, w3af, armitage, netsparker, cobalt strike.

 Nmap scripting engines.


 You can check using nmap on the version detection and operating system detection, traceroute. You can scan your host using a script in your computer


 Nessus scan


 In backtrack write

# apt-get install nessus

 Go to Nessus in /opt/nessus

# cd /opt/Nessus

# cd sbin the add user with the command Nessus-adduser


To register in Nessus

# cd /opt/Nessus/bin


After you finish, go to applications, backtrack, vulnerability assessment, vulnerability scanners, nessus

In browser write htps:// 127.0.0.1:8834

add the network subnet to scan

 Use the Acunetix web vulnerability scanner


 W3af Web Vulnerability scanner


Go to Vulnerability Assessment, Web Application Assessment, Web Vulnerability Scanner, w3af gui

 Scan vulnerability using armitage and metasploit


Hacking of Computer Networks

Подняться наверх