版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
1、11............................................................................................................................................11網絡聯(lián)通嗅探實驗....................................................................
2、..............................................111、Ping原理...........................................................................................................................112、Ping工作過程.............................
3、......................................................................................113、Ping命令詳解...................................................................................................................12網絡聯(lián)通嗅
4、探實驗..................................................................................................................13主機信息探測實驗.............................................................................................
5、.....................161、主機信息探測的原理........................................................................................................161.1基于ICMPecho掃描.................................................................
6、.....................................161.2基于高級ICMP的掃描...................................................................................................161.3全連接掃描(TCPconnectScan)..........................................
7、............................................172、Nmap掃描工具.................................................................................................................172.1Nmap簡介........................................
8、.................................................................................172.2命令詳解...........................................................................................................................183、對掃描
9、工具的防范............................................................................................................22主機信息探測實驗.................................................................................................
10、.................251、主機信息探測....................................................................................................................252、Ident掃描(IdentScanning)...................................................
11、.......................................29路由信息探測實驗..................................................................................................................30路由信息探測實驗...............................................
12、...................................................................33域名信息探測實驗..................................................................................................................361、域名信息探測原理介紹...............
13、.....................................................................................361.1域名................................................................................................................................
14、....362、nslookup實例詳解............................................................................................................392.1實例詳解:..................................................................................
15、......................................39域名信息探測實驗..................................................................................................................411、查詢域名信息................................................
16、....................................................................422、通過nslookup獲得子域名.............................................................................................43安全漏洞探測實驗..............................
17、....................................................................................451、實驗環(huán)境............................................................................................................................452、
18、Xscan使用.........................................................................................................................46安全漏洞探測實驗..................................................................................
19、................................511、安全漏洞信息探測原理....................................................................................................511.1端口掃描基礎...............................................................
20、....................................................511.2端口掃描技術分類.........................................................................................................522、xscan詳解.......................................
21、..................................................................................53Linux路由信息探測實驗.......................................................................................................561、路由信息探測原理介紹......
22、..............................................................................................561.1路由.......................................................................................................................
23、.............561.2traceroute原理...................................................................................................................562、traceroute命令詳解.........................................................
24、..................................................57Linux路由信息探測實驗.......................................................................................................59共享式網絡嗅探實驗.........................................
25、.....................................................................651、網絡嗅探基礎知識及原理................................................................................................653、導入SAM密碼文件...........................
26、............................................................................1253).選擇破解方式.................................................................................................................1274、開始破解..........
27、................................................................................................................129本地密碼直接查看實驗...............................................................................................
28、.........1311、密碼原理介紹............................................................................................................1312、防御技術和方案................................................................................
29、..............................131遠程密碼破解實驗................................................................................................................1321、遠程FTP密碼破解原理介紹.................................................
30、........................................1321.1什么是FTP......................................................................................................................1321.2FTP的口令......................................
31、.................................................................................1331.3破解FTP口令.................................................................................................................1332、防御技術和方案.
32、.............................................................................................................133遠程密碼破解實驗....................................................................................................
33、............1351、運行環(huán)境..........................................................................................................................1352、準備工作....................................................................
34、......................................................1361、安裝工具CainV2.5。....................................................................................................136應用軟件本地密碼破解實驗.................................
35、...............................................................1421、攻防原理介紹..................................................................................................................1422、防御技術和方案....................
36、..........................................................................................142應用軟件本地密碼破解實驗................................................................................................144Access手工注入實驗....
37、.......................................................................................................1461、SQL注入原理介紹.......................................................................................................
38、..1461.1什么是SQL注入............................................................................................................1461.2注入原理概述....................................................................................
39、..............................1461.3Access數(shù)據(jù)庫的注入原理..............................................................................................1471.4SQLServer注入原理.........................................................
40、.............................................1481.5PHP注入原理..................................................................................................................1482、防御技術.......................................
41、...................................................................................150Access手工注入實驗...........................................................................................................1501、找到有注入漏洞的目標
42、網站..........................................................................................1512、猜測表名.......................................................................................................................
43、...1523、猜測字段名......................................................................................................................1534、字段內容的獲取。............................................................................
44、..............................1542、獲取權限,以管理員用戶身份登陸..............................................................................155Access工具注入實驗.............................................................................
45、..............................1571、SQL注入原理介紹.........................................................................................................1571.1什么是SQL注入.........................................................
46、..................................................1571.2注入原理概述.................................................................................................................1571.3Access數(shù)據(jù)庫的注入原理.........................
47、....................................................................1571.4SQLServer注入原理......................................................................................................1581.5PHP注入原理..................
48、...............................................................................................1592、防御技術....................................................................................................................
49、......160PHP手動注入實驗...............................................................................................................1621、點擊目標網站:222.18.158.139index.phpid=1....................................................
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
- 5. 眾賞文庫僅提供信息存儲空間,僅對用戶上傳內容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
評論
0/150
提交評論