{"id":110215,"date":"2024-12-02T06:46:10","date_gmt":"2024-12-01T22:46:10","guid":{"rendered":"https:\/\/lrxjmw.cn\/?p=110215"},"modified":"2024-12-02T06:46:10","modified_gmt":"2024-12-01T22:46:10","slug":"network-security-toolkit","status":"publish","type":"post","link":"https:\/\/lrxjmw.cn\/network-security-toolkit.html","title":{"rendered":"Network Security Toolkit \u53d1\u5e03 28 \u7248"},"content":{"rendered":"
N<\/strong>etwork\u00a0S<\/strong>ecurity Tookit \u662f\u4e00\u4e2a\u57fa\u4e8e Fedora \u7684 live disc \u53d1\u884c\u7248\u3002\u6b63\u5982\u5176\u540d\u6240\u793a\uff0cNST \u914d\u5907\u4e86\u8bf8\u591a\u5f00\u6e90\u7684\u7f51\u7edc\u5b89\u5168\u76f8\u5173\u5de5\u5177\uff0c\u5e76\u63d0\u4f9b\u4e86\u4e00\u4e2a\u57fa\u4e8e Web \u7684\u7528\u6237\u754c\u9762\uff08\u4e0b\u6587\u7b80\u79f0\u300cWUI\u300d\uff09\u3002<\/p>\n \u8be5\u9879\u76ee\u4e8e\u65e5\u524d\u53d1\u5e03\u4e86 Network Security Toolkit 28 SVN:10234 \u7248\u3002\u8fd9\u4e00\u7248\u672c\u57fa\u4e8e Fedora 28\uff0cLinux \u5185\u6838\u7248\u672c\u4e3a 4.17.3\u3002\u90e8\u5206\u663e\u8457\u53d8\u5316\u53ca\u65b0\u5de5\u5177\u5982\u4e0b\uff1a<\/p>\n \u524d\u6587\u8bd1\u81ea\u5176\u53d1\u5e03\u901a\u544a<\/a>\u3002\u5176\u5b83\u4fe1\u606f\u4ea6\u8f7d\u4e8e\u5176\u8f6f\u4ef6\u5305\u5217\u8868<\/a>\u53ca\u53d8\u5316\u65e5\u5fd7<\/a>\u3002<\/p>\n <\/p>\n Network Security Toolkit \u65e8\u5728\u4e3a\u5b89\u5168\u4e13\u5bb6\u53ca\u7f51\u7edc\u7ba1\u7406\u5458\u63d0\u4f9b\u5168\u9762\u7684\u5f00\u6e90\u7f51\u7edc\u5b89\u5168\u5de5\u5177\u3002\u5176\u5305\u542b\u4e86Insecure.org \u8ba4\u5b9a\u7684\u524d 125 \u4e2a\u5b89\u5168\u5de5\u5177<\/a>\u3002NST \u8fd8\u63d0\u4f9b\u4e86\u53ef\u76f4\u63a5\u542f\u52a8\u7684 ISO \u955c\u50cf\u3002<\/p>\n NST \u63d0\u4f9b\u4e86\u4e00\u4e2a\u57fa\u4e8e Web \u7684\u7528\u6237\u754c\u9762\uff0c\u5176\u53ef\u7528\u4e8e\u7cfb\u7edf\/\u7f51\u7edc\u7ba1\u7406\u5bfc\u822a\u3001\u81ea\u52a8\u5316\u3001\u7f51\u7edc\u76d1\u63a7\u3001\u4e3b\u673a\u5730\u7406\u4f4d\u7f6e\u67e5\u8be2\u3001\u7f51\u7edc\u5206\u6790\u53ca\u5bf9\u8bb8\u591a\u7f51\u7edc\u548c\u5b89\u5168\u5de5\u5177\u7684\u914d\u7f6e\u3002\u5177\u4f53\u5730\uff0c\u8be5\u754c\u9762\u63d0\u4f9b\u7684\u529f\u80fd\u6709\uff1a\u5e26\u6709\u53ef\u89c6\u5316\u5de5\u5177 ZenMap \u7684 nmap\u3001ntop\u3001\u7f51\u7edc\u63a5\u53e3\u5e26\u5bbd\u76d1\u89c6\u5668\u3001\u7f51\u6bb5 ARP \u626b\u63cf\u5668\u3001VNC \u4f1a\u8bdd\u7ba1\u7406\u5668\u3001\u57fa\u4e8e minicom \u7684\u7ec8\u7aef\u670d\u52a1\u5668\u3001\u4e32\u53e3\u76d1\u63a7\u4ee5\u53ca WPA PSA \u7ba1\u7406\u3002<\/p>\n \u5176\u4ed6\u7279\u6027\u5305\u62ec ntopng\u3001ntop\u3001wireshark\u3001traceroute\u3001netflow \u548c kismet \u6570\u636e\u7684\u53ef\u89c6\u5316\uff0c\u901a\u8fc7\u5730\u7406\u5b9a\u4f4d\u4e3b\u673a\u5730\u5740\uff0cIPv4 \u5730\u5740\u5bf9\u8bdd\uff0ctraceroute \u6570\u636e\u548c\u65e0\u7ebf\u63a5\u5165\u70b9\uff0c\u5e76\u901a\u8fc7 Google Earth \u6216Mercator World Map \u4f4d\u56fe\u663e\u793a\u5b83\u4eec\uff0c\u57fa\u4e8e\u6d4f\u89c8\u5668\u7684\u6570\u636e\u5305\u6355\u83b7\u548c\u534f\u8bae\u5206\u6790\u7cfb\u7edf\uff0c\u80fd\u591f\u4f7f\u7528 Wireshark \u76d1\u63a7\u591a\u8fbe\u56db\u4e2a\u7f51\u7edc\u63a5\u53e3\uff0c\u4ee5\u53ca\u4e00\u4e2a\u57fa\u4e8eSnort\u7684\u5165\u4fb5\u68c0\u6d4b\u7cfb\u7edf\uff0c\u5176\u4e2d\u5305\u542b\u4e00\u4e2a\u300c\u6536\u96c6\u5668\u300d\u540e\u7aef\uff0c\u7528\u4e8e\u5728 MySQL \u6570\u636e\u5e93\u4e2d\u5b58\u50a8\u4e8b\u4ef6\u3002\u5bf9\u4e8e Web \u5f00\u53d1\u4eba\u5458\uff0c\u8fd8\u6709\u4e00\u4e2a\u5e26\u6709\u5185\u7f6e\u5bf9\u8c61\u5e93\u7684 JavaScript \u63a7\u5236\u53f0\uff0c\u5176\u4e2d\u5305\u542b\u6709\u52a9\u4e8e\u52a8\u6001\u7f51\u9875\u5f00\u53d1\u7684\u529f\u80fd\u3002<\/p>\n NST \u9879\u76ee\u4e3b\u9875\uff1a \u539f\u6587\u6765\u81ea\uff1ahttps:\/\/openingsource.org\/2873\/<\/a><\/p>\n\n
\nhttp:\/\/www.networksecuritytoolkit.org\/<\/a><\/p>\n\n