系统相关
首页 > 系统相关> > kali linux networking scanning Cookbok (第三章结尾笔记)

kali linux networking scanning Cookbok (第三章结尾笔记)

作者:互联网

1、Zombie Scanning with Nmap

    Zombie scans can also be performed with an option in Namp ,  we can findly viable zombie candidates by sweeping an entire address range and assessing the IpID  sequence pattern with metasploit  :    we can use the metasploit  with the auxiliary :  the command as follows :

     use  the   auxiliary     :    auxiliary/ scanner/ip/ipidseq

     once an incremental idle host hab been identifited , we can perform the zombie scan in nmap using  the -sI  option an by passing it  the ip address of the zombie host that needs to be used for scanning :    nmap 192.168.142.182 -sI 192.168.142.183 -Pn -p  0-100

 

标签:scanning,use,networking,auxiliary,nmap,kali,zombie,Zombie
来源: https://www.cnblogs.com/xinxianquan/p/10354001.html