網路安全測試軟體internet scanner學習筆記(二) (轉)
網路安全測試軟體internet scanner學習筆記(二) (轉)[@more@]重點:
1. 策略編輯器中策略的公共設定:
Common Settings
The Common Settings folder contains global settings that can be enabled for a policy. Some of these settings may apply to a group of vulnerability checks, decreasing the amount of time needed to enable all the checks that use the setting.
公共設定夾包括為策略設定能夠被啟用的全域性設定。這些也許適用一組弱點檢查,使用這個設定來減少大量的所有允許的這些設定所花費的時間。
公共設定:
1. Brute force lists 強制力列表
Miscellaneous Default 多項預設 VAX/VMS Defaults 虛擬地址擴充/虎擬
VAX/VMS Defaults NIS linux 資訊服務
Use Default Login File 使用預設的登入檔案(default.login)
2.Brute Force Options 強制力選項
This common setting attempts pass checks on names derived from Finger or checks.
從Finger 或 NetBIOS的命名來源來個企圖進行口令檢查。三種方式:A、反向命名做為口令
B、真名做為口令 C、帳號做為口令
3.E- Options E-Mail選項 發現弱點後接收人
4.Host er
兩項設定:A。每次掃描PING的次數B。每PING一次的間隔時間(毫秒)
5.HTTP Ports A、HTTP埠 預設(80和8080) B、HTTP埠(443)
6.Internal Network A、Addresses format: xx-yy,zz,bb-cc B、Include Key IP Range(s) C、ains D、Use Whois E、Whois Server whois是一個關於誰在哪裡的
7.IP Spoofing IP欺騙 A、Spoof Lists (Don’t use ) B、Spoof Source ()
C、Spoof User(預設為)使用名進行欺騙測試
8.NFS Depth 子目錄的深度
9.NT Logon Sessions
10.Phase Limit 進行秘密掃描的段的數量,我理解段數值越大越好
11.RWhod Message 為後臺郵件傳送資訊,如果有弱點,PS (the process status command)顯示資訊
12.Smtp Session
This common setting manages all active connections to SMTP servers running on any target hosts.
這個公共設定管理所有在任何一臺目標主機上執行的SMTP服務的活動的連線
A、 Connection timeout (in seconds) 超時時間(秒) B、Reuse connections 重新邊接
B、 Reuse the same SMTP connections when perfong multiple security checks 當多安全檢查時再次執行相同的SMTP連線
13.SNMP Community File SNMP組檔案
Filename: The name of a file that contains additional names to use when accessing the community name. Default: community.snmp 檔名:檔名包括當訪問組名時所使用的附加名字
14.SOCKS Host
SOCKS Target Host: The target host to the IP address of a host on the other s of the SOCKS server. The host you specify should be running at least one , , SMTP, HTTP, POP3, or finger service.
Note: For this setting to function proy, you must enter an IP address in the box provided. If you do not have an actual SOCKS host, use the IP address 127.0.0.1 rather than leaving the box blank.
目標地址:在其它SOCK的主機IP地址是目標主機,你所指定的主機就至少執行FTP, telnet, SMTP, HTTP, POP3, or finger 一種服務。
15.TCP Scan
A、Source Port: Set the port to use as the source during a port scan. Note: If you set the source port to 0, your operating system will specify the source port.
源埠:設定一個所使用埠直到一個埠被掃描。注意:如果你的埠被設定為0,你的將被指定為源埠。
B、Enable Hard Close: Close all active connections to a port after you have received information about the service running on that port. To check the state and the status of an active connection to a port, open a command prompt and type netstat -a.
允許硬關閉:在你接收到服務已在埠執行的信處後關閉所有活動的連結埠。要檢查狀態或活動連線埠狀態,在命令提示符下輸入: netstat –a
以C Hard Close Port Range: The port or port range Internet Scanner uses to close any active connections to ports that you have received service information about.
硬關閉埠限制:用於活動連線埠到埠的限制範圍。
16.Telnet Banners
Grab Banners: Determines if a telnet server generates banner data in response to a request. Internet Scanner uses this method to determine operating system type.
白搶奪標題:如果TELNET服務為一個需求響應決定搶奪標題。ISS使用這個方法來決定作業系統型別。
17.UDP Port Scanner
This common setting controls how the UDP port scanner probes each target host.
設定每一個目標主機有多少個UDP埠掃描
Internet Scanner sends a collection of UDP packets to each UDP port to check if it is active, and then listens for a response. The type of response (or the lack of a particular type of response) indicates if the port is active.
ISS傳送一個收集每一個UDP埠檢查它是否是活動狀態的包,並且偵聽響應。如果埠是活動的,由響應型別指定(或缺少響應型別)
When Internet Scanner performs a UDP port scan, it can generate large amounts of network traffic, which can flood networks with low bandwidth or throughput. To minimize this risk, Internet Scanner lets you tune your scans to meet your individual network needs.
當ISS執行UDP埠掃描時,它能夠產生大量的資料,它將佔用網路頻寬的吞吐量。這個風險最小,ISS讓你調整你適合的個人網路需求。
As the UDP port scanner uses the UDP and ICMP protocols, which are classified as unreliable protocols, results can vary between scans. To improve the accuracy of the scan, Internet Scanner lets you tune the scan to provide a higher degree of accuracy UDP埠掃描使用UDP和ICMP,掃描後結果被改變的被歸類為不可靠的協議。
A.Number of probes per scan 預設10
B.Interval between probes (in seconds)間隔時間(秒) 預設:5秒
18.Walk MIB 管理資訊庫通道
FlexChecks
A FlexCheck is a user-defined check that has been created to scan specific network environments for vulnerabilities or other conditions.
FlexCheck是使用者定義的檢查用來指定建立掃描網路環璄為弱點或其它網路條件。
1. 策略編輯器中策略的公共設定:
Common Settings
The Common Settings folder contains global settings that can be enabled for a policy. Some of these settings may apply to a group of vulnerability checks, decreasing the amount of time needed to enable all the checks that use the setting.
公共設定夾包括為策略設定能夠被啟用的全域性設定。這些也許適用一組弱點檢查,使用這個設定來減少大量的所有允許的這些設定所花費的時間。
公共設定:
1. Brute force lists 強制力列表
Miscellaneous Default 多項預設 VAX/VMS Defaults 虛擬地址擴充/虎擬
VAX/VMS Defaults NIS linux 資訊服務
Use Default Login File 使用預設的登入檔案(default.login)
2.Brute Force Options 強制力選項
This common setting attempts pass checks on names derived from Finger or checks.
從Finger 或 NetBIOS的命名來源來個企圖進行口令檢查。三種方式:A、反向命名做為口令
B、真名做為口令 C、帳號做為口令
3.E- Options E-Mail選項 發現弱點後接收人
4.Host er
兩項設定:A。每次掃描PING的次數B。每PING一次的間隔時間(毫秒)
5.HTTP Ports A、HTTP埠 預設(80和8080) B、HTTP埠(443)
6.Internal Network A、Addresses format: xx-yy,zz,bb-cc B、Include Key IP Range(s) C、ains D、Use Whois E、Whois Server whois是一個關於誰在哪裡的
7.IP Spoofing IP欺騙 A、Spoof Lists (Don’t use ) B、Spoof Source ()
C、Spoof User(預設為)使用名進行欺騙測試
8.NFS Depth 子目錄的深度
9.NT Logon Sessions
10.Phase Limit 進行秘密掃描的段的數量,我理解段數值越大越好
11.RWhod Message 為後臺郵件傳送資訊,如果有弱點,PS (the process status command)顯示資訊
12.Smtp Session
This common setting manages all active connections to SMTP servers running on any target hosts.
這個公共設定管理所有在任何一臺目標主機上執行的SMTP服務的活動的連線
A、 Connection timeout (in seconds) 超時時間(秒) B、Reuse connections 重新邊接
B、 Reuse the same SMTP connections when perfong multiple security checks 當多安全檢查時再次執行相同的SMTP連線
13.SNMP Community File SNMP組檔案
Filename: The name of a file that contains additional names to use when accessing the community name. Default: community.snmp 檔名:檔名包括當訪問組名時所使用的附加名字
14.SOCKS Host
SOCKS Target Host: The target host to the IP address of a host on the other s of the SOCKS server. The host you specify should be running at least one , , SMTP, HTTP, POP3, or finger service.
Note: For this setting to function proy, you must enter an IP address in the box provided. If you do not have an actual SOCKS host, use the IP address 127.0.0.1 rather than leaving the box blank.
目標地址:在其它SOCK的主機IP地址是目標主機,你所指定的主機就至少執行FTP, telnet, SMTP, HTTP, POP3, or finger 一種服務。
15.TCP Scan
A、Source Port: Set the port to use as the source during a port scan. Note: If you set the source port to 0, your operating system will specify the source port.
源埠:設定一個所使用埠直到一個埠被掃描。注意:如果你的埠被設定為0,你的將被指定為源埠。
B、Enable Hard Close: Close all active connections to a port after you have received information about the service running on that port. To check the state and the status of an active connection to a port, open a command prompt and type netstat -a.
允許硬關閉:在你接收到服務已在埠執行的信處後關閉所有活動的連結埠。要檢查狀態或活動連線埠狀態,在命令提示符下輸入: netstat –a
以C Hard Close Port Range: The port or port range Internet Scanner uses to close any active connections to ports that you have received service information about.
硬關閉埠限制:用於活動連線埠到埠的限制範圍。
16.Telnet Banners
Grab Banners: Determines if a telnet server generates banner data in response to a request. Internet Scanner uses this method to determine operating system type.
白搶奪標題:如果TELNET服務為一個需求響應決定搶奪標題。ISS使用這個方法來決定作業系統型別。
17.UDP Port Scanner
This common setting controls how the UDP port scanner probes each target host.
設定每一個目標主機有多少個UDP埠掃描
Internet Scanner sends a collection of UDP packets to each UDP port to check if it is active, and then listens for a response. The type of response (or the lack of a particular type of response) indicates if the port is active.
ISS傳送一個收集每一個UDP埠檢查它是否是活動狀態的包,並且偵聽響應。如果埠是活動的,由響應型別指定(或缺少響應型別)
When Internet Scanner performs a UDP port scan, it can generate large amounts of network traffic, which can flood networks with low bandwidth or throughput. To minimize this risk, Internet Scanner lets you tune your scans to meet your individual network needs.
當ISS執行UDP埠掃描時,它能夠產生大量的資料,它將佔用網路頻寬的吞吐量。這個風險最小,ISS讓你調整你適合的個人網路需求。
As the UDP port scanner uses the UDP and ICMP protocols, which are classified as unreliable protocols, results can vary between scans. To improve the accuracy of the scan, Internet Scanner lets you tune the scan to provide a higher degree of accuracy UDP埠掃描使用UDP和ICMP,掃描後結果被改變的被歸類為不可靠的協議。
A.Number of probes per scan 預設10
B.Interval between probes (in seconds)間隔時間(秒) 預設:5秒
18.Walk MIB 管理資訊庫通道
FlexChecks
A FlexCheck is a user-defined check that has been created to scan specific network environments for vulnerabilities or other conditions.
FlexCheck是使用者定義的檢查用來指定建立掃描網路環璄為弱點或其它網路條件。
來自 “ ITPUB部落格 ” ,連結:http://blog.itpub.net/10752043/viewspace-989393/,如需轉載,請註明出處,否則將追究法律責任。
相關文章
- 【軟體測試】學習筆記筆記
- 軟體測試學習筆記:測試點總結筆記
- Internet安全協議 學習筆記協議筆記
- 軟體測試學習路線
- android學習筆記--ScannerAndroid筆記
- 軟體測試學習網站有哪些?怎麼學軟體測試呢?學習網站
- 軟體測試的具體學習路線
- <<軟體設計學習筆記>> (轉)筆記
- 軟體測試學習教程——WEB測試之JS記憶體WebJS記憶體
- 軟體測試——網路協議知識 (二)協議
- 軟體測試——網路協議知識(二)協議
- 軟體測試學習教程—軟體測試質量
- 軟體測試學習 ——五種軟體測試模型模型
- Hyperledger Fabric 2.2 學習筆記:測試網路test-network筆記
- 以太坊學習筆記————12、搭建測試網路和私有鏈筆記
- 學習筆記之測試筆記
- TDD學習筆記【二】---單元測試簡介筆記
- 軟體測試學習教程—軟體測試基本知識
- 學習旅途(軟體測試)
- 軟體測試整理學習
- 軟體測試學習教程—Jmeter元件介紹(二)JMeter元件
- Networking && Internet 計網學習筆記一筆記
- 軟體測試最全的影片原始碼,最新軟體測試學習路線圖分享原始碼
- 【網路安全】軟體測試和滲透測試有什麼區別?
- elasticsearch學習筆記二:相關軟體安裝Elasticsearch筆記
- 軟體測試學習教程—迴歸測試
- 軟體測試培訓分享:學習能力差可以學習軟體測試嗎
- 網路包探測軟體 (轉)
- 【分享】—如何學習軟體測試
- 共享軟體 Internet 營銷隨筆 (轉)
- 網路學習筆記(二):TCP可靠傳輸原理筆記TCP
- 軟體測試學習教程—軟體測試基礎理論五
- 軟體測試學習教程—軟體測試基礎理論六
- 軟體測試學習教程—軟體測試基礎理論四
- 軟體測試學習教程—軟體測試基礎理論三
- linux安全學習筆記(轉)Linux筆記
- 【學習筆記】網路流筆記
- [網路]NIO學習筆記筆記