1、NetDiscover you performe layer 2

the comand  : netdiscover -r 192.168.2.0/24   or use   netdiscover  -l  iplist.txt

2、in fact we use ARP  to request the system get the replay  is Poor concealment, because we use the Broadcasting ARP request for every IP address in an entire subnet can sometimes trigger alerts or resopnses from security devices such as Intrusion Detection Systems(IDS )  or other devices Intrusion Prevention System(IPS)

A stealthier approach is to listen for the ARP traffic as the scanner system naturally interacts with other system on the network ,and then record the data collected from the ARP response ,this passive scanning techinque can be performed usign the -p option . the command as follow  ,but  we  the rate of scanning is slower .we ofter use it to scanning the wireless network .

netdiscover -p   [ip ]

3、use the  auxiliary in the Metasploit

the  start command is  :msfconsole  and the use the  auxiliary :

use  auxiliary/Scanner/discover/arp_sweep   and use  to show what need configuration

4 、As   with the ARPing request, the bytes  from unique sting is only present in the ouput associated with live ip address ,and it is also on a line that contains this address ,in the same fashion  ,we can extract the ip address from any successful ping request using a combination of grep and cut ,the command :

ping 192.168.1.1 -c 3 | gerp   "butes from "

ping  192.168.1.1 -c 3 | gerp " byte from" | cut -d " "  -f 4

ping 192.168.1.1 -c 3 | grep " bytes from " | cut -d " " -f 4 | -d ":" -f 1

5、using Nmap to perform layer3 discovery

IPCM   scan    command :   nmap -sn [ip]     ,besides ,we can use the comand :  (nmap -iL iplist.txt  -sn [ip] )

6、 fping and hping3

unlike the standard ping utility ,fping will stop sending ICMP echo requests after it receives a single replay ,but if a response is not received from the address ,fping will make four attempts to contact the system prior to determining that the host is unreachable .

using the -g option to dynamically generate a list of ip address .to specify a range to scan ,pass this argument to both the first and last ip address in the  desird sequential range  ,,the command is :   fping -g 192.168.1.0 192.168.1.11   of course   it can write this :  fping -g 192.168.1.0/24   ,fping  can also used a series of address as specified by the contents of an input text file ,to use an input file ,use the -f file option and supply the filename or path of the input file; thec command is :   fping -f iplist.txt

the other tool is hping3  ,  it is  canable of performing discovery at both layer 3 and layer 4, the comman is : hping3 192.168.1.0 --icmp , in the linux  use the -c option appoint should be include with an integer value that indicates the desired number of attempts .

the command :    hping3  192.168.1.1 --icmp  -c  2

7、 using Scapy  to perform layer 4 discovery

an ACK packet  sent to live host on any port ,regardless of the port status ,will return an RST packet ,but on response will be received from an IP if no live host is associzted with it , so we can perform a discovery scan on a large number of system by only interacting with a single port on the each system, using Scapy in conjuction with the python , we can use the brief command , through send ACK packet to  only the one the TCP port on the each system ,by  eveulating the response   returned by each host , so , we can easily output a list the ip address .

eg :  #/usr/bin/python

import loging

logging.getLogger("Scapy.runtime).setLevel(logging.ERROR)

from scapy.all import *

if len(sys.argv)!=2:

print(" Usage -./ACK_Ping.py[/24 network address]")

print(" Example -/ACK_Ping.py 192.168.1.2")

print(" Example will perform a TCP ACK ping scan of the 192.168.1.0/24 range")

sys.exit()

address=src(sys.arvg[1])

prefix=address.split( '.')[0]+ ' .' +address.split('.')[1]+ ' .' +address.split('.')[2]+ ' .'

for addr in range(1,254):

response=srl(IP(dst(prefix+str(addr))/TCP(dport=80,flag='A'),timeout=1,verbose=0)

try:

if int (response[TCP].flags)==4:

print(" "192.168.1.2"+str(addr) ")

except:

pass

end the code  ,we can use ./ACK_Ping.py   perform

8、using  the nmap to perform layer 4 dissovery

to perform  a discovery scan with UDP ,use the -PU in the conjuction with the port to test like with :   nmap 192.168.2.1 -PU53 -sn   besides we can use the command  to perform  scan  use  ip address list  .like the command : nmap -il iplist.txt  -sn -PU53     (designated port  53)

using  -PA option  means use the ACK packets to identify live hosts .  the command  :  nmap 192.168.1.2  -PA80 -sn     ,of couse we can  performed on a range os host using dash notation ,the command is : nmap 192.168.1.2 -192.168.1.255 -PA80 -sn  or  use  0/24

9、Using hping3 to perform layer 4 discovery

by specifying the UDP mode with the  --udp option ,UDP probes can  transmisted in attempts to trigger replies from live hosts:

the command like this :    hping3 --udp 192.168.1.2    we can use the -c option indicated the desired number of attempts

eg: nmap  --udp 192.168.1.2 -c 2

we know the hping3 does not support the scanning of mulltiple system by default,  but we can use the bush scripting.like this :

hping3 --upd 192.168.1.2 -c 2 ;hping3 --upd 192.168.2.3 -c 2 | gerp  " Unreachable " Hping 192.168.1.2 (eth1 192.168.1.2):udp mode set 28 headers +0 data bytes  ICMP port Unreachable from ip=192.168.1.2 name=unknow status=0 port 2836 seq=0

Discovery Scanning的更多相关文章

  1. JavaPersistenceWithHibernate第二版笔记Getting started with ORM-001用JPA和Hibernate实现HellowWorld(JTA、Bitronix)

    一.结构 二.model层 1. package org.jpwh.model.helloworld; import javax.persistence.Entity; import javax.pe ...

  2. 启动elasticsearch的时候报出Exception in thread "main" SettingsException[Failed to load settings from /usr/local/elasticsearch/config/elasticsearch.yml]; nested: MarkedYAMLException[while scanning a simple ke

    故障现象: [elasticsearch@tiantianml- ~]$ /usr/local/elasticsearch/bin/elasticsearch Exception in thread ...

  3. 论文笔记(1)——《Where's Wally?Precise User Discovery Attacks in Location Proximity Services》

    Abstract: 位置相近服务在社交和移动网络的广泛使用是基于可用性和用户隐私的平衡,但引发了三角定位攻击的风险.文章系统化地讨论了此类攻击的防范,包括问题在不同临近模型下的形式化,针对不同模型的有 ...

  4. 使用discovery板上的st-link给别的板子下载

    discovery板上的6pin swd接口 20pin 的jtag 接线: 6 20 def 1 1 目标vdd 2 9  swclk(PA14) 3 20 gnd 4 7  swdio(PA13) ...

  5. XCode一直显示"scanning for working copies"的解决办法

    一个SVN上的项目,在本地重新CheckOut打开后,一直提示"scanning for working copies"且不能使用SVN的更新.提交等功能,当时想着晾它一晚上,看能 ...

  6. Zabbix low-level discovery

    Version: zabbix 3.0.1 概述 Low-Level discovery 可以自动创建items,triggers,graphs为不同的实体对象. 例如:zabbix能自动监控服务器上 ...

  7. False Discovery Rate, a intuitive explanation

    [转载请注明出处]http://www.cnblogs.com/mashiqi Today let's talk about a intuitive explanation of Benjamini- ...

  8. 专注docker安全:Security Scanning

    导读 Docker毫无疑问是近期运维同学们的热点话题,Docker安全也由此倍受重视,Docker Security Scanning 是一款Docker镜像扫描的安全工具,目前已经在Docker C ...

  9. Service Discovery with Apache Curator

    Curator的介绍 Curator就是Zookeeper的一个客户端工具(不知道Zookeeper的同学可以到http://www.ibm.com/developerworks/cn/opensou ...

随机推荐

  1. dubbo 使用zookeeper 出现 Dubbo客户端调用报错NullPointerException

    现在将网上的方法总结一下 方法一:.https://blog.csdn.net/u011294519/article/details/81810631 dubbo-provider.xml:提供者先扫 ...

  2. 23个Python爬虫开源项目代码,让你一次学个够

    今天为大家整理了23个Python爬虫项目.整理的原因是,爬虫入门简单快速,也非常适合新入门的小伙伴培养信心.所有链接指向GitHub,祝大家玩的愉快 1.WechatSogou [1]– 微信公众号 ...

  3. SVD/SVD++实现推荐算法

    奇异值分解(Singular Value Decomposition,以下简称SVD)是在机器学习领域广泛应用的算法,它不仅可以用于降维算法中的特征分解,还可以用于推荐系统,以及自然语言处理等领域. ...

  4. Vue子组件与父组件之间的通信

    1.环境搭建 下载 vue-cli:npm install -g vue-cli 初始化项目:vue init webpack vue-demo 进入vue-demo文件夹:cd vue-demo 下 ...

  5. jsp篇 之 指令元素和动作元素

    Jsp指令元素分类与书写格式: 书写格式: <%@ 指令类型  属性="值" ..  %> 分类: [page include taglib]三种. 1,page指令: ...

  6. [ffmpeg] 音频样本

    不仅限于ffmpeg,音频采样所得的PCM都含有三个要素:声道(channel).采样率(sample rate).样本格式(sample format). 声道 当人听到声音时,能对声源进行定位,那 ...

  7. kubernetes-kubeadm自动生成的证书过期的解决方法

    拉取kubernetes的源码: git clone https://github.com/kubernetes/kubernetes.git 切换版本: cd kubernetes &&am ...

  8. 用Pytorch训练MNIST分类模型

    本次分类问题使用的数据集是MNIST,每个图像的大小为\(28*28\). 编写代码的步骤如下 载入数据集,分别为训练集和测试集 让数据集可以迭代 定义模型,定义损失函数,训练模型 代码 import ...

  9. Logstash替换字符串,解析json数据,修改数据类型,获取日志时间

    在某些情况下,有些日志文本文件类json,但它的是单引号,具体格式如下,我们需要根据下列日志数据,获取正确的字段和字段类型 {'usdCnyRate': '6.728', 'futureIndex': ...

  10. 题解-洛谷P1184 高手之在一起

    https://www.luogu.org/problemnew/show/P1184 (题目出处) 见到地名,自然就想到字符串了.可以从第一天开始,将她的位置与高手方便取得地方一一比较,(char字 ...