亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? readme

?? its a full portscan... it works for all type of scanning. here we use libcap
??
字號:
============================================================
               Dynamic Port Scanner [DPS] v1.1
  A port scanner based on ARP poisoning/spoofing technique
                      (c) 2006 - 2008
                 AR Samhuri <ar@securebits.org>
                  (http://www.securebits.org)
============================================================

 0x00  Introduction
 0x01  Features of DPS Tool
 0x02  Installation
 0x03  Running DPS Tool
 0x04  Copyright
 0x05  Disclaimer


0x00 Introduction
-----------------
     Dynamic Port Scanner [DPS] is a port scanner with a 
functionality that allows for dynamic spoofing of source IP 
addresses of scanning packets. The whole idea is based on 
integrating ARP poisoning technique into the scanning 
process. That is, for each TCP/UDP scan packet with a spoofed 
source IP address, the program will poison the ARP cache of 
the remote host/gateway in such a way that the scan reply 
packet (TCP, UDP, or ICMP) will be delivered to the scanning 
machine. Obviously, the spoofed IP must fall within the local 
network IP range of the scanning machine.

When starting scanning a host, DPS will first identify 
whether the target host is within the local network or not. 
If it is within the local network, that host will be the 
target of ARP poisoning as well as the scanning process. If 
it is NOT within the local network, DPS will identify the 
gateway as the ARP poisoning target. In the second case, the 
ARP cache of the gateway is poisoned so that scan replies 
coming from the target host will arrive to the local scanning 
machine.

     DPS supports 11 scanning methods: 10 methods for TCP scan 
and 1 method for UDP scan. The 10 TCP scan methods are: SYN, FIN, 
NULL, ACK, URG, PSH, XMAS, XMAS1, XMAS2, and XMAS3.

     The home page of DPS tool is:
     (http://www.securebits.org/dps.html)  

0x01  Features of DPS Tool
--------------------------
    0x00   DPS features 10 different TCP stealth scanning
           techniques. These are: SYN, FIN, NULL, ACK, URG, PSH,
           XMAS, XMAS1, XMAS2, XMAS3. (check sec. 0x03 for more
           information). Those 10 techniques can be grouped into
           three categories. The first category includes only the
           SYN scan. It is the most reliable among the others. It
           can identify the port as open of closed. The second
           group contains the ACK scan. This scan has one
           functionality, which is to determine if the port is
           filtered or not. The third group contains all the
           other 8 techniques. These techniques will identify
           if the port is closed or either open or filtered.
           One should note that scanning windows system with
           one of these techniques always shows a result of
           closed port.

    0x01   DPS differentiate between a scanned host withing the
           local net and a host outside the local net. If the
           scanned host is within the local net, it is the target
           of ARP poisoning. It not, the gateway/router will be
           the target of ARP poisoning.

    0x02   Generation of spoofed source IPs is random and based
           on PRNG functions of Libnet. However, those spoofed
           IPs are always adjusted to fall in the subnet IP range
           of the scanning machine. For instance, if the scanning
           machine is in class B subnet, the spoofed IPs range
           from x.x.0.1 to x.x.255.254.

    0x03   The spoofed source IP will never match the IP of the
           scanned machine if it is within the local net. The
           reason is that one cannot ARP-poison a host with fake
           info about the machine itself.

    0x04   With the use of -w option, the port status output will
           have two different values. One for systems that follow
           TCP/IP standards (i.e. Linux and UNIX-like) and one
           for systems that violates TCP/IP standards (i.e.
           Windows and Cisco Devices). One should note that the
           differences occure only when scanning using group III
           techniques (PSH, URG, FIN, NULL, XMAS, XMAS1, XMAS2,
           and XMAS3.)

    0x05   When generating the scan output. DPS shows the spoofed
           IP used when scanning each port. And this IP will be
           resolved to hostname as well. One should note that
           even if the spoofed IP is not used in the local net,
           it can be used without affecting the scan process at
           all.

0x02  Installation
------------------
NOTE: before installing DPS, make sure to have libpcap and libnet
      installed on your machine.
      get libnet from:  http://www.packetfactory.net/libnet
      get libpcap from: http://www.tcpdump.org

To install:

     #tar dps-xxx.tar.gz
     #cd dps-xxx
     #make && make install
To uninstall:
     # make uninstall

0x03  Running DPS Tool
----------------------
#./dps [options] host|ip
     [options]
     -t <type>   This will define the scan type.
                 S     SYN Scan (Default). Only the SYN bit is 
                       set in the TCP scan packet. If SYN/ACK 
                       is received, the port is open. If RST/ACK
                       is received, the port is closed.
                 N     NULL Scan. All flags are not set in the 
                       TCP scan packet. If RST/ACK is received, 
                       the port is closed. If no reply is 
                       received, the port is either open or 
                       filtered.
                 F     FIN Scan. Only the FIN bit is set in the 
                       TCP scan packet. If RST/ACK is received, 
                       the port is closed. If no reply is 
                       received, the port is either open or 
                       filtered.
                 P     PSH Scan. Only the PSH bit is set in the 
                       TCP scan packet. If RST/ACK is received, 
                       the port is closed. If no reply is 
                       received, the port is either open or 
                       filtered.
                 A     ACK Scan. Only the ACK bit is set in the 
                       TCP scan packet. If RST is received, the 
                       port is unfiltered. If no reply is 
                       received, the port is filtered.
                 U     URG Scan. Only the URG bit is set in the 
                       TCP scan packet. If RST/ACK is received, 
                       the port is closed. If no reply is 
                       received, the port is either open or 
                       filtered.
                 X     XMAS Scan. Bits PSH, URG, and FIN are set
                       in the TCP scan packet. If RST/ACK is 
                       received, the port is closed. If no 
                       reply is received, the port is either 
                       open or closed.
                 X1    XMAS1 Scan. Bits PSH and FIN are set in
                       the TCP scan packet. If RST/ACK is 
                       received, the port is closed. If no 
                       reply is received, the port is either 
                       open or closed.
                 X2    XMAS2 Scan. Bits URG and FIN are set in
                       the TCP scan packet. If RST/ACK is 
                       received, the port is closed. If no 
                       reply is received, the port is either 
                       open or closed.
                 X3    XMAS3 Scan. Bits URG and PSH are set in
                       the TCP scan packet. If RST/ACK is 
                       received, the port is closed. If no 
                       reply is received, the port is either 
                       open or closed.
                 UDP   UDP scan. UDP packet is sent. If ICMP
                       port unreachable packet is received. If
                       no reply is received, the port is
                       filtered or open. If UDP packet is
                       received, the port is open.

     -p <ports>  Ports to scan (Default: 1-1024)
                 port list should be in the format:
                 x-y,z (e.g. 1-100,5000 or 1-200,900-1024)

     -i <if>     Interface to use (Optional) (e.g. eth0)

     -T <secs>   Scan time-out in seconds. Waiting for scan
                 response will timeout after <secs> seconds.

     -P <no>     PING option (Default: 1)
                  0   DONT PING
                  1   PING
                 If the PING option is on and the target host is
                 unPINGable, the program will terminate.
     -d          Do NOT resolve hostname or lookup IP addresses
     -w          Show port status if the scanned host is Windows
     -h          Drop the help menu.
     -v[v]       Output verbosity.

0x04  Copyright
---------------
This tool is distributed under the GNU General Public Lisence.
Check the COPYING file for more details on the lisence.

0x05  Disclaimer
----------------
This tool was develped for legal uses only. These include, but
not not limited to, penetration testing, vulnerability 
assessment, security auditing, educational experiments, and
ethical hacking. The author hereby disclaims himself of any 
damage caused by any illegal or lame usage of such tool.

EOF

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲午夜久久久久久久久电影院 | 国产精品你懂的| 欧美性大战久久久久久久蜜臀 | 蜜桃一区二区三区在线观看| 麻豆精品一区二区三区| 欧美理论片在线| 日韩三级免费观看| 欧美精品乱人伦久久久久久| 日韩精品一级二级| 亚洲成人黄色小说| 激情综合色综合久久| 亚洲欧美乱综合| 日韩av一区二区三区| 成人av中文字幕| 一区二区三区成人在线视频| 国产精品日产欧美久久久久| 激情综合网av| 亚洲高清免费视频| 色欧美片视频在线观看| 国产区在线观看成人精品| 青娱乐精品在线视频| 美女网站色91| av电影在线观看一区| 一区二区中文视频| 欧美性大战久久| 久久精品国产99国产| 国产大片一区二区| 91日韩在线专区| 日韩欧美国产一二三区| 久久久不卡网国产精品一区| 日韩美女久久久| 青青草97国产精品免费观看无弹窗版| 国产又黄又大久久| 欧美专区日韩专区| 成人理论电影网| 日韩和欧美一区二区三区| 精品婷婷伊人一区三区三| 日韩电影一区二区三区| 欧美一区二区三区在| 国产精品福利影院| 日本女优在线视频一区二区| 麻豆91精品视频| 国产精品久久国产精麻豆99网站| 国产拍揄自揄精品视频麻豆| 亚洲免费成人av| 精品久久人人做人人爰| 欧美体内she精高潮| 久久亚洲二区三区| 亚洲综合区在线| 国产精品1区2区| 欧美人动与zoxxxx乱| 国产精品美日韩| 久久国产精品99久久久久久老狼 | 亚洲成人激情综合网| 国产成人免费在线观看| 欧美一区二区三区婷婷月色| 亚洲激情男女视频| 从欧美一区二区三区| 精品免费一区二区三区| 狠狠色丁香久久婷婷综合丁香| 在线影院国内精品| 欧美最猛黑人xxxxx猛交| 本田岬高潮一区二区三区| 亚洲黄色片在线观看| 亚洲精品视频免费观看| 亚洲制服丝袜在线| 亚洲视频一区在线观看| 亚洲大尺度视频在线观看| 国产中文字幕精品| 欧美精品久久99| 91精品国产综合久久香蕉麻豆| 久久久久久久久蜜桃| 激情五月婷婷综合网| 欧美激情一区在线观看| 国产精品99久久久久久有的能看 | 日韩黄色免费网站| 综合激情成人伊人| 亚洲精品成a人| 美女高潮久久久| 精品一区二区av| 日韩免费一区二区三区在线播放| 中文字幕精品三区| 成人高清视频在线观看| 国产精品12区| 欧美v日韩v国产v| 国产日韩影视精品| 精品久久久久99| 国产精品久线观看视频| 亚洲视频中文字幕| 日韩电影免费在线看| 美女精品一区二区| 91麻豆高清视频| 老司机精品视频线观看86 | 日韩成人精品视频| 国产一区欧美一区| 欧美日韩精品欧美日韩精品一| 欧美日产国产精品| 国产精品萝li| 国产大陆精品国产| 制服丝袜国产精品| 亚洲视频一区在线观看| 精品在线一区二区三区| 亚洲特黄一级片| 国产精品1024久久| 日韩一级片在线观看| 亚洲激情在线激情| 在线观看免费视频综合| 国产精品的网站| 成人午夜视频网站| 久久久噜噜噜久久中文字幕色伊伊 | 亚洲男同性视频| 99久久久久久| 亚洲综合清纯丝袜自拍| 色成年激情久久综合| 丁香婷婷综合五月| 欧美激情一区二区三区在线| 国产精品系列在线播放| 久久伊99综合婷婷久久伊| 91精品国产一区二区三区香蕉| 亚洲午夜免费电影| 日韩欧美中文字幕制服| 亚洲伊人色欲综合网| 欧美日韩mp4| 欧美精品一区二区三| 国产福利精品一区| 亚洲色图欧美偷拍| 欧美一区二区三区系列电影| 国产成人综合亚洲91猫咪| 国产美女精品一区二区三区| 亚洲三级免费观看| 欧美福利视频导航| 精品88久久久久88久久久| 亚洲天堂2014| 精品福利视频一区二区三区| 91亚洲男人天堂| 丝袜美腿亚洲一区| 亚洲女子a中天字幕| 国产日韩视频一区二区三区| 亚洲国产精品黑人久久久| 日韩一级大片在线观看| 在线亚洲免费视频| 成人免费av资源| 日韩欧美一区二区在线视频| 不卡一区在线观看| 国产成人亚洲综合色影视| 日韩一区欧美二区| 亚洲成人在线免费| 亚洲精品菠萝久久久久久久| 狠狠狠色丁香婷婷综合激情| 日韩—二三区免费观看av| 日韩女优电影在线观看| 欧美色男人天堂| 宅男噜噜噜66一区二区66| 欧美日韩的一区二区| 欧美色国产精品| 日韩欧美综合一区| 国产人久久人人人人爽| 国产乱码精品一品二品| 国产精品一二三在| 国产东北露脸精品视频| 成人午夜私人影院| 中文字幕欧美日韩一区| 国产精品99久久久久久宅男| 国产一区福利在线| 色综合久久久久综合体| 亚洲天堂久久久久久久| 一区二区三区在线视频观看58| 爽好多水快深点欧美视频| 国模一区二区三区白浆| 欧美日韩五月天| 亚洲黄一区二区三区| 国产在线国偷精品产拍免费yy| 欧美精品久久久久久久多人混战| 久久久精品国产99久久精品芒果| 丁香婷婷综合五月| 日韩一区二区三区精品视频| 欧美韩国日本不卡| 人人超碰91尤物精品国产| 成人av免费在线| 久久精品一区二区三区av| 亚洲品质自拍视频| 国产一区二区视频在线播放| 色婷婷国产精品| 国产乱子伦一区二区三区国色天香 | 91麻豆文化传媒在线观看| 日韩欧美国产精品| 精品一区中文字幕| 欧美一区二区三区视频在线观看| 亚洲一区在线看| 欧美日韩亚洲另类| 91丨九色porny丨蝌蚪| 亚洲婷婷综合色高清在线| 91久久奴性调教| 亚洲国产日韩在线一区模特| 欧美日韩一级片网站| 美日韩一级片在线观看| 日韩精品一区二区三区三区免费 | 韩国女主播成人在线| 久久色在线观看| 91老师片黄在线观看|