售 价:¥
温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印
为你推荐
Title Page
Copyright
Credits
About the Author
Acknowledgments
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface
What this book covers
What you need for this book
Who this book is for
Sections
Getting ready
How to do it…
How it works…
There's more…
See also
Conventions
Reader feedback
Customer support
Downloading the color images of this book
Errata
Piracy
Questions
Nmap Fundamentals
Introduction
Building Nmap's source code
Getting ready
How to do it...
How it works...
There's more...
Experimental branches
Updating your local working copy
Customizing the building process
Precompiled packages
Finding live hosts in your network
How to do it...
How it works...
There's more...
Tracing routes
Running the Nmap Scripting Engine during host discovery
Exploring more ping scanning techniques
Listing open ports on a target host
How to do it...
How it works...
There's more...
Privileged versus unprivileged
Scanning specific port ranges
Selecting a network interface
More port scanning techniques
Fingerprinting OS and services running on a target host
How to do it...
How it works...
There's more...
Increasing version detection intensity
Aggressive detection mode
Configuring OS detection
OS detection in verbose mode
Submitting new OS and service fingerprints
Using NSE scripts against a target host
How to do it...
How it works...
There's more...
NSE script arguments
Script selection
Debugging NSE scripts
Adding new scripts
Reading targets from a file
How to do it...
How it works...
There's more...
Excluding a host list from your scans
Scanning an IP address ranges
How to do it...
How it works...
There's more...
CIDR notation
Scanning random targets on the Internet
How to do it...
How it works...
There's more...
Legal issues with port scanning
Collecting signatures of web servers
How to do it...
How it works...
There's more...
Monitoring servers remotely with Nmap and Ndiff
Getting ready
How to do it...
How it works...
There's more...
Monitoring specific services
Crafting ICMP echo replies with Nping
How to do it...
How it works...
There's more...
Managing multiple scanning profiles with Zenmap
How to do it...
How it works...
There's more...
Zenmap scanning profiles
Editing or deleting a scan profile
Running Lua scripts against a network connection with Ncat
How to do it...
How it works...
There's more...
Other ways of executing external commands with Ncat
Discovering systems with weak passwords with Ncrack
Getting ready
How to do it...
How it works...
There's more...
Configuring authentication options
Pausing and resuming attacks
Launching Nmap scans remotely from a web browser using Rainmap Lite
Getting ready
How to do it...
How it works...
There's more...
Custom arguments
Network Exploration
Introduction
Discovering hosts with TCP SYN ping scans
How to do it...
How it works...
There's more...
Privileged versus unprivileged TCP SYN ping scan
Firewalls and traffic filtering
Discovering hosts with TCP ACK ping scans
How to do it...
How it works...
There's more...
Privileged versus unprivileged TCP ACK ping scans
Selecting ports in TCP ACK ping scans
Discovering hosts with UDP ping scans
How to do it...
How it works...
There's more...
Selecting ports in UDP ping scans
Discovering hosts with ICMP ping scans
How to do it...
How it works...
There's more...
Local versus remote networks
ICMP types
Discovering hosts with SCTP INIT ping scans
How to do it...
How it works...
There's more...
Unprivileged SCTP INIT ping scans
Selecting ports in SCTP INIT ping scans
Discovering hosts with IP protocol ping scans
How to do it...
How it works...
There's more...
Setting alternate IP protocols
Generating random data for the IP packets
Supported IP protocols and their payloads
Discovering hosts with ARP ping scans
How to do it...
How it works...
There's more...
MAC address spoofing
IPv6 scanning
Performing advanced ping scans
How to do it...
How it works...
There's more...
Ping probe effectiveness
Discovering hosts with broadcast ping scans
How to do it...
How it works...
There's more...
Broadcast ping options
Target library
Scanning IPv6 addresses
How to do it...
How it works...
There's more...
IPv6 fingerprinting
Discovering new IPv6 targets
Gathering network information with broadcast scripts
How to do it...
How it works...
There's more...
Script selection
Target library
Scanning through proxies
How to do it...
How it works...
There's more...
Proxychains
Spoofing the origin IP of a scan
Getting ready
How to do it...
How it works...
There's more...
Choosing your zombie host wisely
The IP ID sequence number
Reconnaissance Tasks
Introduction
Performing IP address geolocation
Getting ready
How to do it...
How it works...
There's more...
Submitting a new geolocation provider
Getting information from WHOIS records
How to do it...
How it works...
There's more...
Selecting service providers
Ignoring referral records
Disabling cache
Obtaining traceroute geolocation information
How to do it...
How it works...
There's more...
Querying Shodan to obtain target information
Getting ready
How to do it...
How it works...
There's more...
Saving the results in CSV files
Specifying a single target
Checking whether a host is flagged by Google Safe Browsing for malicious activities
Getting ready
How to do it...
How it works...
There's more...
Collecting valid e-mail accounts and IP addresses from web servers
How to do it...
How it works...
There's more...
Discovering hostnames pointing to the same IP address
How to do it...
How it works...
There's more...
Discovering hostnames by brute forcing DNS records
How to do it...
How it works...
There's more...
Customizing the dictionary
Adjusting the number of threads
Specifying a DNS server
Using the NSE library target
Obtaining profile information from Google's People API
Getting ready
How to do it...
How it works...
There's more...
Matching services with public vulnerability advisories
Getting ready
How to do it...
How it works...
There's more...
Scanning Web Servers
Introduction
Listing supported HTTP methods
How to do it...
How it works...
There's more...
Interesting HTTP methods
Checking whethera web server is an open proxy
How to do it...
How it works...
There's more...
Discovering interesting files and folders in web servers
How to do it...
How it works...
There's more...
Using a Nikto database
Abusing mod_userdir to enumerate user accounts
How to do it...
How it works...
There's more...
Brute forcing HTTP authentication
How to do it...
How it works...
There's more...
Brute modes
Brute forcing web applications
How to do it...
How it works...
There's more...
Brute forcing WordPress installations
Brute forcing WordPress installations
Detecting web application firewalls
How to do it...
How it works...
There's more...
Detecting possible XST vulnerabilities
How to do it...
How it works...
There's more...
Detecting XSS vulnerabilities
How to do it...
How it works...
There's more...
Finding SQL injection vulnerabilities
How to do it...
How it works...
There's more...
Detecting web servers vulnerable to slowloris denial of service attacks
How to do it...
How it works...
There's more...
Finding web applications with default credentials
How to do it...
How it works...
There's more...
Detecting web applications vulnerable to Shellshock
How to do it...
How it works...
There's more...
Executing commands remotely
Spidering web servers to find vulnerable applications
Detecting insecure cross-domain policies
How to do it...
How it works...
There's more...
Finding attacking domains available for purchase
Detecting exposed source code control systems
How to do it...
How it works...
There's more...
Obtaining information from subversion source code control systems
Auditing the strength of cipher suites in SSL servers
How to do it...
How it works...
There's more...
Scrapping e-mail accounts from web servers
How to do it...
How it works...
There's more...
Scanning Databases
Introduction
Listing MySQL databases
How to do it...
How it works...
There's more...
Listing MySQL users
How to do it...
How it works...
There's more...
Listing MySQL variables
How to do it...
How it works...
There's more...
Brute forcing MySQL passwords
How to do it...
How it works...
There's more...
Finding root accounts with an empty password in MySQL servers
How to do it...
How it works...
There's more...
Detecting insecure configurations in MySQL servers
How to do it...
How it works...
There's more...
Brute forcing Oracle passwords
How to do it...
How it works...
There's more...
Brute forcing Oracle SID names
How to do it...
How it works...
There's more...
Retrieving information from MS SQL servers
How to do it...
How it works...
There's more...
Force-scanned ports only in NSE scripts for MS SQL
Brute forcing MS SQL passwords
How to do it...
How it works...
There's more...
Dumping password hashes of MS SQL servers
How to do it...
How it works...
There's more...
Running commands through xp_cmdshell in MS SQL servers
How to do it...
How it works...
There's more...
Finding system administrator accounts with empty passwords in MS SQL servers
How to do it...
How it works...
There's more...
Force-scanned ports only in MS SQL scripts
Obtaining information from MS SQL servers with NTLM enabled
How to do it...
How it works...
There's more...
Retrieving MongoDB server information
How to do it...
How it works...
There's more...
Detecting MongoDB instances with no authentication enabled
How to do it...
How it works...
There's more...
Listing MongoDB databases
How to do it...
How it works...
There's more...
Listing CouchDB databases
How to do it...
How it works...
There's more...
Retrieving CouchDB database statistics
How to do it...
How it works...
There's more...
Detecting Cassandra databases with no authentication enabled
How to do it...
How it works...
There's more...
Brute forcing Redis passwords
How to do it...
How it works...
There's more...
Scanning Mail Servers
Introduction
Detecting SMTP open relays
How to do it...
How it works...
There's more...
Brute forcing SMTP passwords
How to do it...
How it works...
There's more...
Detecting suspicious SMTP servers
How to do it...
How it works...
There's more...
Enumerating SMTP usernames
How to do it...
How it works...
There's more...
Brute forcing IMAP passwords
How to do it...
How it works...
There's more...
Retrieving the capabilities of an IMAP server
How to do it...
How it works...
There's more...
Brute forcing POP3 passwords
How to do it...
How it works...
There's more...
Retrieving the capabilities of a POP3 server
How to do it...
How it works...
There's more...
Retrieving information from SMTP servers with NTLM authentication
How to do it...
How it works...
There's more...
Scanning Windows Systems
Introduction
Obtaining system information from SMB
How to do it...
How it works...
There's more...
Detecting Windows clients with SMB signing disabled
How to do it...
How it works...
There's more...
Checking UDP when TCP traffic is blocked
Attacking hosts with message signing disabled
Detecting IIS web servers that disclose Windows 8.3 names
How to do it...
How it works...
There's more...
Bruteforcing Windows 8.3 names
Detecting Windows 8.3 names through different HTTP methods
Detecting Windows hosts vulnerable to MS08-067
How to do it...
How it works...
There's more...
Exploiting MS08-067
Detecting other SMB vulnerabilities
Retrieving the NetBIOS name and MAC address of a host
How to do it...
How it works...
There's more...
Enumerating user accounts of Windows hosts
How to do it...
How it works...
There's more...
Selecting LSA bruteforcing or SAMR enumeration exclusively
Checking UDP when TCP traffic is blocked
Enumerating shared folders
How to do it...
How it works...
There's more...
Enumerating SMB sessions
How to do it...
How it works...
Preparing a brute force password auditing attack
Checking UDP when TCP traffic is blocked
Finding domain controllers
How to do it...
How it works...
There's more...
Finding domain master browsers
Finding DNS servers
Detecting Shadow Brokers' DOUBLEPULSAR SMB implants
How to do it...
How it works...
There's more...
Scanning ICS SCADA Systems
Introduction
Finding common ports used in ICS SCADA systems
How to do it...
How it works...
There's more...
Finding HMI systems
How to do it...
How it works...
There's more...
Creating a database for HMI service ports
Enumerating Siemens SIMATIC S7 PLCs
How to do it...
How it works...
There's more...
Enumerating Modbus devices
How to do it...
How it works...
There's more...
Enumerating BACnet devices
How to do it...
How it works...
There's more...
Discovering the BACnet broadcast management device
Enumerating Ethernet/IP devices
How to do it...
How it works...
There's more...
Enumerating Niagara Fox devices
How to do it...
How it works...
There's more...
Enumerating ProConOS devices
How to do it...
How it works...
There's more...
Enumerating Omrom PLC devices
How to do it...
How it works...
There's more...
Enumerating PCWorx devices
How to do it...
How it works...
Optimizing Scans
Introduction
Skipping phases to speed up scans
How to do it...
How it works...
There's more...
Selecting the correct timing template
How to do it...
How it works...
There's more...
Adjusting timing parameters
How to do it...
How it works...
There's more...
Estimating round trip times with Nping
Displaying the timing settings
Adjusting performance parameters
How to do it...
How it works...
There's more...
Distributing a scan among several clients using Dnmap
Getting ready
How to do it...
How it works...
There's more...
Dnmap statistics
Internet-wide scanning
Generating Scan Reports
Introduction
Saving scan results in a normal format
How to do it...
How it works...
There's more...
Saving scan results in an XML format
How to do it...
How it works...
There's more...
Structured script output for NSE
Saving scan results to a SQLite database
Getting ready
How to do it...
How it works...
There's more...
Dumping the database in CSV format
Fixing outputpbnj
Saving scan results in a grepable format
How to do it...
How it works...
There's more...
Generating a network topology graph with Zenmap
How to do it...
How it works...
There's more...
Generating HTML scan reports
Getting ready
How to do it...
How it works...
There's more...
Reporting vulnerability checks
How to do it...
How it works...
There's more...
Generating PDF reports with fop
Getting ready
How to do it...
How it works...
There's more...
Generating reports in other formats
Saving NSE reports in ElasticSearch
Getting ready
How to do it...
How it works...
There's more...
Writing Your Own NSE Scripts
Introduction
Making HTTP requests to identify vulnerable supermicro IPMI/BMC controllers
How to do it...
How it works...
There's more...
Setting the user agent pragmatically
HTTP pipelining
Sending UDP payloads using NSE sockets
How to do it...
How it works...
There's more...
Generating vulnerability reports in NSE scripts
How to do it...
How it works...
There's more...
Vulnerability states of the library vulns
Exploiting a path traversal vulnerability with NSE
How to do it...
How it works...
There's more...
Setting the user agent pragmatically
HTTP pipelining
Writing brute force password auditing scripts
How to do it...
How it works...
There's more...
Crawling web servers to detect vulnerabilities
How to do it...
How it works...
There's more...
Working with NSE threads, condition variables, and mutexes in NSE
How to do it...
How it works...
There's more...
Writing a new NSE library in Lua
How to do it...
How it works...
There's more...
Writing a new NSE library in C/C++
How to do it...
How it works...
There's more...
Getting your scripts ready for submission
How to do it...
How it works...
There's more...
HTTP, HTTP Pipelining, and Web Crawling Configuration Options
HTTP user agent
HTTP pipelining
Configuring the NSE library httpspider
Brute Force Password Auditing Options
Brute modes
NSE Debugging
Debugging NSE scripts
Exception handling
Additional Output Options
Saving output in all formats
Appending Nmap output logs
Including debugging information in output logs
Including the reason for a port or host state
OS detection in verbose mode
Introduction to Lua
Flow control structures
Conditional statements - if, then, elseif
Loops - while
Loops - repeat
Loops - for
Data types
String handling
Character classes
Magic characters
Patterns
Captures
Repetition operators
Concatenation
Finding substrings
String repetition
String length
Formatting strings
Splitting and joining strings
Common data structures
Tables
Arrays
Linked lists
Sets
Queues
Custom data structures
I/O operations
Modes
Opening a file
Reading a file
Writing a file
Closing a file
Coroutines
Creating a coroutine
Executing a coroutine
Determining current coroutine
Getting the status of a coroutine
Yielding a coroutine
Metatables
Arithmetic methamethods
Relational methamethods
Things to remember when working with Lua
Comments
Dummy assignments
Indexes
Semantics
Coercion
Safe language
Booleans
References and Additional Reading
买过这本书的人还买过
读了这本书的人还在读
同类图书排行榜