NETSCOUT Onetouch AT G2(1TG2-3000)端口掃描功能詳解
在 Internet上,各主機間通過TCP/TP協(xié)議發(fā)送和接收數(shù)據(jù)報,各個數(shù)據(jù)報根據(jù)其目的主機的ip地址來進行互聯(lián)網(wǎng)絡(luò)中的路由選擇。可見,把數(shù)據(jù)報順 利的傳送到目的主機是沒有問題的。問題出在哪里呢?我們知道大多數(shù)操作系統(tǒng)都支持多程序(進程)同時運行,那么目的主機應(yīng)該把接收到的數(shù)據(jù)報傳送給眾多同 時運行的進程中的哪一個呢?顯然這個問題有待解決,端口機制便由此被引入進來。
本地操作系統(tǒng)會給那些有需求的進程分配協(xié)議端口 (protocal port,即我們常說的端口),每個協(xié)議端口由一個正整數(shù)標識,如:80,139,445,等等。當目的主機接收到數(shù)據(jù)報后,將根據(jù)報文首部的目的端口 號,把數(shù)據(jù)發(fā)送到相應(yīng)端口,而與此端口相對應(yīng)的那個進程將會領(lǐng)取數(shù)據(jù)并等待下一組數(shù)據(jù)的到來。說到這里,端口的概念似乎仍然抽象,那么繼續(xù)跟我來,別走 開。
端口其實就是隊,操作系統(tǒng)為各個進程分配了不同的隊,數(shù)據(jù)報按照目的端口被推入相應(yīng)的隊中,等待被進程取用,在極特殊的情況下,這個隊也是有可能溢出的,不過操作系統(tǒng)允許各進程指定和調(diào)整自己的隊的大小。
不光接受數(shù)據(jù)報的進程需要開啟它自己的端口,發(fā)送數(shù)據(jù)報的進程也需要開啟端口,這樣,數(shù)據(jù)報中將會標識有源端口,以便接受方能順利的回傳數(shù)據(jù)報到這個端口。
Network ports are the entry points to a server or workstation that is connected to the Internet. A service that listens on a port is able to receive data from a client, process it and send a response back. Malicious clients can sometimes exploit vulnerabilities in the server code so they gain access to sensitive data or execute malicious code on the machine remotely.
The Port Scan feature scans the target device for many commonly used open ports. Results are reported on the device’s button on?the WIRED ANALYSIS screen. The device’s button must be expanded to view the port scan results.
To use the Port Scan?feature:
- Run AutoTest
- Tap the Wired Analysis icon on the HOME screen
- Tap a device’s button to expand it
- Tap the wired TOOLS button
- Tap the Port Scan button
What ports are scanned?
OneTouch AT G2scans the following ports during the “PortScan” process.? OneTouch AT does not scan all ports in order to prevent tripping an IDS/IPS system.
7 | echo | 554 | rtsp | |
9 | discard | 556 | remotefs | |
11 | systat | 585 | imap | |
13 | daytime | 634 | ginad | |
17 | qotd | 636 | ldaps | |
18 | msp | 666 | doom | |
19 | chargen | 749 | kerberos-adm | |
20 | ftp-data | 762 | quotad | |
21 | ftp | 892 | ||
22 | ssh | 901 | snmpnameres | |
23 | telnet | 902 | vmware-console | |
25 | smtp | ………… | 912 | apex-mesh |
37 | time | 993 | imaps | |
38 | rap | 995 | pop3s | |
39 | rlp | 1025 | microsoft-adl | |
43 | nicname | 1080 | socks | |
49 | tacacs | 1155 | nfa | |
53 | domain | 1366 | netware-csp | |
66 | sql-net | 1417 | timbuktu-srv1 | |
67 | bootps | 1433 | ms-sql-s | |
68 | bootpc | 1434 | ms-sql-m | |
70 | gopher | 1498 | sybase-sqlany | |
79 | finger | 1521 | oracle-db | |
80 | http | 1524 | ingreslock | |
88 | kerberos | 1525 | orasrv | |
107 | rtelnet | 1720 | h323hostcall | |
110 | pop3 | 1723 | pptp | |
111 | sunrpc | 1812 | radius | |
113 | ident | 1813 | radius-acct | |
118 | sqlserv | 2000-2002 | cisco-sccp | |
123 | ntp | 2049 | nfs | |
135 | epmap | 3128 | ndl-aas | |
137 | netbios-ns | 3268 | msft-gc | |
138 | netbios-dgm | 3269 | msft-gc-ssl | |
139 | netbios-ssn | 3306 | mysql | |
143 | imap | 3389 | ms-wbt-server | |
156 | sqlsrv | 4400 | ds-srv | |
161 | snmp | 4488 | awacs-ice | |
162 | snmptrap | 4672 | rfa | |
204 | at-echo | 4899 | radmin-port | |
379 | ldap | 5190 | aol | |
389 | ldap | 5432 | postgresql | |
390 | ldap | 6000-6004 | ms-exchange | |
427 | svrloc | 6005 | x11 | |
443 | https | 8001 | http-alt | |
445 | microsoft-ds | 8080 | http-alt | |
465 | urd | 8443 | pcsync-https | |
512 | exec | 12345 | italk | |
513 | login | 50000 | db2-server-old | |
514 | shell | 60000 | db2-server | |
515 | printer | 62078 | iphone-sync | |
519 | utime |
本文關(guān)鍵字: 1TG2-3000, Fluke, NETSCOUT
原創(chuàng)標題:NETSCOUT Onetouch AT G2(1TG2-3000)端口掃描功能詳解
原文鏈接:http://m.qqmmqq.cn/archives/1tg2-port-scan.html
版權(quán)說明:本文為深圳市連訊達電子技術(shù)開發(fā)有限公司官網(wǎng)(m.qqmmqq.cn)版權(quán)所有。如果您需要轉(zhuǎn)載,請注明出處并保留原文鏈接!如為轉(zhuǎn)載文章會注明文章出處,轉(zhuǎn)載文章不代表本公司觀點。對于某些同行無恥惡意抄襲剽竊連訊客戶案例的違法行為,連訊將追究法律責任!
詳情請致電連訊公司:0755-83999818