The third work - practice two information-gathering network technology

20,199,125 2019-2020-2 "network attack and defense practice," the third week of work

1. Practice content

This week learning the network attack and defense technology and practice the third chapter, mainly talking about the process of information gathering phase of the network attack and defense, introduces some not related to the computer network class knowledge as well as some well-known network scanning tool, how to collect before the attack Useful information and how to detect network scanning and other defense knowledge.

2. Experimental procedure

1. The information search site in Google search engine universities some of the information below



Some students get a college information

2.dns and ip inquiry

Taobao get the following query whois information with owners of the home, the phone number has been blocked part of the information

3. Use the nslookup command to query Baidu ip, get two ip, ip addresses are public Beijing Mobile and Beijing Telecom to offer.

4.ip whosis query, home owners for a Baidu in Beijing Mobile's acquisition of ip query to obtain the following information

5. Use the ip address ip young secretary of the real physical location, as I check my vps host location

6. Detection using graphical tools routing topology tracert, as follows

7. Gets or micro-channel qq friends ip, and inquire about their true location


The yet do not know how to crawl friends ip, because there are a lot of micro-channel group, the people inside have been a message, do not know which friends are chatting ip, with wireshark caught a ip, Shanghai Mobile is checked

8. Use the ping command to ping my virtual machine as follows

9. Use nmap scanning tool for network

1. tcp port scan on the host

system running on the host 2. Scan

the service and the version running on the host 3. Scan

10. Use the net view command to query the host network group, was not successful

11. The search their footprints through a search engine

As follows, in addition to the blog park their own account, they found time to write a small essay of junior high school are sent to the blog, it does not involve too much private information

12. Using Nessus, vulnerability scanning drones, as follows, scanning a large number of vulnerabilities, but do not know how to use.

Guess you like

Origin www.cnblogs.com/jackpan-blog/p/12497105.html