Makavelii uto 23.9.2008 12:52

Zanima me dali postoji mozda za kupiti neka knjiga o backtracku 3??? tj. o programima i alatima koji se nalaze u njemu, dakle kako funkcioniraju i kako se koriste... i kada se koristi koji program....

ili da li postoji neka stranica gdje je sve objasnjeno... svaki program i sve ili jednostavno moram za svaki program googlat i googlat dok ne pronađem kaj mi treba...

4ndY uto 23.9.2008 13:51

Imaš man za svaki od alata. To je specijalizirana distribucija, ali se većina, ako ne i svi alati mogu nabaviti i za druge distre...

 

Utipkaš npr. man nmap i sve lijepo piše. Ili info nmap.

 

  NAME
  nmap - Network exploration tool and security / port scanner

SYNOPSIS
  nmap [Scan Type...] [Options] {target specification}

DESCRIPTION
  Nmap (“Network Mapper”) is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works
  fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and
  version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of
  other characteristics. While Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network
  inventory, managing service upgrade schedules, and monitoring host or service uptime.

  The output from Nmap is a list of scanned targets, with supplemental information on each depending on the options used. Key among that information is the
  “interesting ports table”. That table lists the port number and protocol, service name, and state. The state is either open, filtered, closed, or unfiltered.
  Open means that an application on the target machine is listening for connections/packets on that port. Filtered means that a firewall, filter, or other
  network obstacle is blocking the port so that Nmap cannot tell whether it is open or closed. Closed ports have no application listening on them, though they
  could open up at any time. Ports are classified as unfiltered when they are responsive to Nmap´s probes, but Nmap cannot determine whether they are open or
  closed. Nmap reports the state combinations open|filtered and closed|filtered when it cannot determine which of the two states describe a port. The port table
  may also include software version details when version detection has been requested. When an IP protocol scan is requested (-sO), Nmap provides information on
  supported IP protocols rather than listening ports.


devil uto 23.9.2008 16:44

ti si neki 'aker, a?

 

jos uvijek ne kuzim zakaj se svi tak pale na taj backtrack.

 

imas man pages i gugl, tam trazi, dobro ti reko kolega iznad.

da si reko za kakvu (sigurno ne legalnu) radnju ti treba bas iskljucivo backtrack onda bi ti mogli i mi tu pomoci.