日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 编程资源 > 编程问答 >内容正文

编程问答

Nmap 基础用法

發布時間:2024/1/23 编程问答 54 豆豆
生活随笔 收集整理的這篇文章主要介紹了 Nmap 基础用法 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

來自Vic___:http://blog.csdn.NET/vic___

Nmap 又叫做Network Mapper(網絡映射器)是一個開源并且為了Linux系統管理員或者網絡管理員的萬能的工具。Nmap用于瀏覽網絡,執行安全掃描,網絡審計以及在遠程機器找到開放端口。它可以掃描在線主機,操作系統,濾包器和遠程主機打開的端口。

Nmap 命令 Nmap 命令和例子

我用兩個不同的方面,去覆蓋所有NMAP的使用方法,第一部分是正經的Nmap。順便提一下設備,我會使用兩個沒有防火墻的服務器,來測試Nmap命令。

192.168.0.100 – server1.tecmint.com 192.168.0.101 – server2.tecmint.com

Nmap 命令 用法

nmap [掃描類型] [選項] {目標說明}

怎么在Linux安裝NMAP

如今大多數的Linux發行版,像 Red Hat, CentOS, Fedoro, Debian 和 Ubuntu 已經在默認安裝包管理庫Yum或APT中包含Nmap. 這兩個工具是用來安裝和管理軟件包和升級的工具.為了安裝Nmap可以使用下列命令。

yum install nmap [基于Red Hat系統]

$ sudo apt-get install nmap [基于Debian系統]

一旦你安裝完成最新的nmap應用程序,你可以使用下列來自這篇文章的例子命令。
1. 使用Hostname和IP地址來掃描系統

Nmap工具提供豐富的方法來掃描一個系統。在這個例子中,我將演示一個掃描,用“server2.tecmint.com”的主機名掃描出他的系統所有開放端口,服務和MAC地址。
使用主機名掃描

[root@server1 ~]# nmap server2.tecmint.com

Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 15:42 EST
Interesting ports on server2.tecmint.com (192.168.0.101):
Not shown: 1674 closed ports
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
111/tcp open rpcbind
957/tcp open unknown
3306/tcp open mysql
8888/tcp open sun-answerbook
MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

Nmap finished: 1 IP address (1 host up) scanned in 0.415 seconds
You have new mail in /var/spool/mail/root

使用IP地址掃描

[root@server1 ~]# nmap 192.168.0.101

Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-18 11:04 EST
Interesting ports on server2.tecmint.com (192.168.0.101):
Not shown: 1674 closed ports
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
111/tcp open rpcbind
958/tcp open unknown
3306/tcp open mysql
8888/tcp open sun-answerbook
MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

Nmap finished: 1 IP address (1 host up) scanned in 0.465 seconds
You have new mail in /var/spool/mail/root

  • 使用 “-v” 選項
  • 你可以看見下面命令使用了“-v”選項,此選項個給了更多的遠程設備的細節。

    [root@server1 ~]# nmap -v server2.tecmint.com

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 15:43 EST
    Initiating ARP Ping Scan against 192.168.0.101 [1 port] at 15:43
    The ARP Ping Scan took 0.01s to scan 1 total hosts.
    Initiating SYN Stealth Scan against server2.tecmint.com (192.168.0.101) [1680 ports] at 15:43
    Discovered open port 22/tcp on 192.168.0.101
    Discovered open port 80/tcp on 192.168.0.101
    Discovered open port 8888/tcp on 192.168.0.101
    Discovered open port 111/tcp on 192.168.0.101
    Discovered open port 3306/tcp on 192.168.0.101
    Discovered open port 957/tcp on 192.168.0.101
    The SYN Stealth Scan took 0.30s to scan 1680 total ports.
    Host server2.tecmint.com (192.168.0.101) appears to be up … good.
    Interesting ports on server2.tecmint.com (192.168.0.101):
    Not shown: 1674 closed ports
    PORT STATE SERVICE
    22/tcp open ssh
    80/tcp open http
    111/tcp open rpcbind
    957/tcp open unknown
    3306/tcp open mysql
    8888/tcp open sun-answerbook
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 1 IP address (1 host up) scanned in 0.485 seconds
    Raw packets sent: 1681 (73.962KB) | Rcvd: 1681 (77.322KB)

    掃描多個主機

    掃描多個主機只需要簡單地以空格隔開輸入他們IP地址或者主機名即可

    [root@server1 ~]# nmap 192.168.0.101 192.168.0.102 192.168.0.103

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:06 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    Not shown: 1674 closed ports
    PORT STATE SERVICE
    22/tcp open ssh
    80/tcp open http
    111/tcp open rpcbind
    957/tcp open unknown
    3306/tcp open mysql
    8888/tcp open sun-answerbook
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)
    Nmap finished: 3 IP addresses (1 host up) scanned in 0.580 seconds

  • 掃描整個子網
  • 通過使用通配符,你可以掃描整個子網或者IP段。

    [root@server1 ~]# nmap 192.168.0.*

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:11 EST
    Interesting ports on server1.tecmint.com (192.168.0.100):
    Not shown: 1677 closed ports
    PORT STATE SERVICE
    22/tcp open ssh
    111/tcp open rpcbind
    851/tcp open unknown

    Interesting ports on server2.tecmint.com (192.168.0.101):
    Not shown: 1674 closed ports
    PORT STATE SERVICE
    22/tcp open ssh
    80/tcp open http
    111/tcp open rpcbind
    957/tcp open unknown
    3306/tcp open mysql
    8888/tcp open sun-answerbook
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 256 IP addresses (2 hosts up) scanned in 5.550 seconds
    You have new mail in /var/spool/mail/root

    在上面的輸出你可以看見nmap掃描整個子網并且提供了那些主機在這個網絡是上線狀態的信息。
    5. 使用IP地址最后8字節,掃描多個服務器

    你可以通過簡單的使用IP地址的最后8字節,執行掃描多個IP地址。例如,這里我演示了掃描IP地址192.168.0.101, 192.168.0.102 和 192.168.0.103.

    [root@server1 ~]# nmap 192.168.0.101,102,103

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:09 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    Not shown: 1674 closed ports
    PORT STATE SERVICE
    22/tcp open ssh
    80/tcp open http
    111/tcp open rpcbind
    957/tcp open unknown
    3306/tcp open mysql
    8888/tcp open sun-answerbook
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 3 IP addresses (1 host up) scanned in 0.552 seconds
    You have new mail in /var/spool/mail/root

  • 掃描來自文件的主機列表
  • 如果你有很多的主機需要掃描并且所有主機細節都是寫在文件里,你可以直接地告訴NMAP去讀這個文件然后執行掃描。來看看怎么做:

    創建一個文本文件叫“nmaptest.txt”并且規定所有需要做掃描的IP地址和服務器的主機名。

    [root@server1 ~]# cat > nmaptest.txt

    localhost
    server2.tecmint.com
    192.168.0.101

    接下來,運行下面命令,使用“iL”選項的nmap命令去掃描所有在文件列出的IP地址。

    [root@server1 ~]# nmap -iL nmaptest.txt

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-18 10:58 EST
    Interesting ports on localhost.localdomain (127.0.0.1):
    Not shown: 1675 closed ports
    PORT STATE SERVICE
    22/tcp open ssh
    25/tcp open smtp
    111/tcp open rpcbind
    631/tcp open ipp
    857/tcp open unknown

    Interesting ports on server2.tecmint.com (192.168.0.101):
    Not shown: 1674 closed ports
    PORT STATE SERVICE
    22/tcp open ssh
    80/tcp open http
    111/tcp open rpcbind
    958/tcp open unknown
    3306/tcp open mysql
    8888/tcp open sun-answerbook
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Interesting ports on server2.tecmint.com (192.168.0.101):
    Not shown: 1674 closed ports
    PORT STATE SERVICE
    22/tcp open ssh
    80/tcp open http
    111/tcp open rpcbind
    958/tcp open unknown
    3306/tcp open mysql
    8888/tcp open sun-answerbook
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 3 IP addresses (3 hosts up) scanned in 2.047 seconds

  • 掃描IP段
  • 你可以用Nmap執行掃描指定的IP段。

    [root@server1 ~]# nmap 192.168.0.101-110

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:09 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    Not shown: 1674 closed ports
    PORT STATE SERVICE
    22/tcp open ssh
    80/tcp open http
    111/tcp open rpcbind
    957/tcp open unknown
    3306/tcp open mysql
    8888/tcp open sun-answerbook
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 10 IP addresses (1 host up) scanned in 0.542 seconds

  • 掃描除開某IP的網段
  • You can exclude some hosts while performing a full network scan or when you are scanning with wildcards with “–exclude” option. 當你使用Nmap的通配符掃描整個網絡的時候想要排除某幾個IP地址,可以使用“–exclude”選項。

    [root@server1 ~]# nmap 192.168.0.* –exclude 192.168.0.100

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:16 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    Not shown: 1674 closed ports
    PORT STATE SERVICE
    22/tcp open ssh
    80/tcp open http
    111/tcp open rpcbind
    957/tcp open unknown
    3306/tcp open mysql
    8888/tcp open sun-answerbook
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 255 IP addresses (1 host up) scanned in 5.313 seconds
    You have new mail in /var/spool/mail/root

  • 掃描系統信息和路由追蹤
  • 通過Nmap,你可以探測在遠程主機的操作系統以及版本信息。為了可以探測操作系統和版本,腳本掃描和路由追蹤,我們可以使用“-A”選項。

    [root@server1 ~]# nmap -A 192.168.0.101

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:25 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    Not shown: 1674 closed ports
    PORT STATE SERVICE VERSION
    22/tcp open ssh OpenSSH 4.3 (protocol 2.0)
    80/tcp open http Apache httpd 2.2.3 ((CentOS))
    111/tcp open rpcbind 2 (rpc #100000)
    957/tcp open status 1 (rpc #100024)
    3306/tcp open mysql MySQL (unauthorized)
    8888/tcp open http lighttpd 1.4.32
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)
    No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).
    TCP/IP fingerprint:
    SInfo(V=4.11%P=i686-redhat-linux-gnu%D=11/11%Tm=52814B66%O=22%C=1%M=080027)
    TSeq(Class=TR%IPID=Z%TS=1000HZ)
    T1(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW)
    T2(Resp=N)
    T3(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW)
    T4(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=)
    T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=)
    T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=)
    T7(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=)
    PU(Resp=Y%DF=N%TOS=C0%IPLEN=164%RIPTL=148%RID=E%RIPCK=E%UCK=E%ULEN=134%DAT=E)

    Uptime 0.169 days (since Mon Nov 11 12:22:15 2013)

    Nmap finished: 1 IP address (1 host up) scanned in 22.271 seconds
    You have new mail in /var/spool/mail/root

    在上面的輸出,你可以看見NMAP提供了遠程主機正在運行的操作系統的TCP/IP指紋信息、更多的端口細節信息和運行在遠程主機的服務。
    10. 使用Nmap啟動操作系統檢測

    使用“-O”選項和“-osscan-guess”都可以幫助發現操作系統。

    [root@server1 ~]# nmap -O server2.tecmint.com

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:40 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    Not shown: 1674 closed ports
    PORT STATE SERVICE
    22/tcp open ssh
    80/tcp open http
    111/tcp open rpcbind
    957/tcp open unknown
    3306/tcp open mysql
    8888/tcp open sun-answerbook
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)
    No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).
    TCP/IP fingerprint:
    SInfo(V=4.11%P=i686-redhat-linux-gnu%D=11/11%Tm=52815CF4%O=22%C=1%M=080027)
    TSeq(Class=TR%IPID=Z%TS=1000HZ)
    T1(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW)
    T2(Resp=N)
    T3(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW)
    T4(Resp=Y%DF=Y%W=0%ACK=O%Flags=Option -O and -osscan-guess also helps to discover OSR%Ops=)
    T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=)
    T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=)
    T7(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=)
    PU(Resp=Y%DF=N%TOS=C0%IPLEN=164%RIPTL=148%RID=E%RIPCK=E%UCK=E%ULEN=134%DAT=E)

    Uptime 0.221 days (since Mon Nov 11 12:22:16 2013)

    Nmap finished: 1 IP address (1 host up) scanned in 11.064 seconds
    You have new mail in /var/spool/mail/root

  • 掃描主機來檢測防火墻
  • 下列命令演示一次掃描,遠程機器是否使用任何的濾包器和防火墻。

    [root@server1 ~]# nmap -sA 192.168.0.101

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:27 EST
    All 1680 scanned ports on server2.tecmint.com (192.168.0.101) are UNfiltered
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 1 IP address (1 host up) scanned in 0.382 seconds
    You have new mail in /var/spool/mail/root

  • 掃描主機來檢查它的是否收到防火墻保護
  • 可以掃描主機是否受到任何的濾包器和防火墻的保護。

    [root@server1 ~]# nmap -PN 192.168.0.101

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:30 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    Not shown: 1674 closed ports
    PORT STATE SERVICE
    22/tcp open ssh
    80/tcp open http
    111/tcp open rpcbind
    957/tcp open unknown
    3306/tcp open mysql
    8888/tcp open sun-answerbook
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 1 IP address (1 host up) scanned in 0.399 seconds

  • 找出網絡中在線的主機
  • 隨著“-sP”選項的幫助,我們可以輕松地檢查出在網絡哪個主機是在線,有這個選項支持的nmap跳過端口探測和其他檢測。

    [root@server1 ~]# nmap -sP 192.168.0.*

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-18 11:01 EST
    Host server1.tecmint.com (192.168.0.100) appears to be up.
    Host server2.tecmint.com (192.168.0.101) appears to be up.
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)
    Nmap finished: 256 IP addresses (2 hosts up) scanned in 5.109 seconds

  • 執行快速掃描
  • 使用“-F”選項可以執行快速掃描去掃描nmap-services文件列出的端口,但不會掃描其他的端口。

    [root@server1 ~]# nmap -F 192.168.0.101

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:47 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    Not shown: 1234 closed ports
    PORT STATE SERVICE
    22/tcp open ssh
    80/tcp open http
    111/tcp open rpcbind
    3306/tcp open mysql
    8888/tcp open sun-answerbook
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 1 IP address (1 host up) scanned in 0.322 seconds

  • 查詢Nmap版本
  • 使用“-V”選項可以查詢在你的機器上運行的nmap命令的版本。

    [root@server1 ~]# nmap -V

    Nmap version 4.11 ( http://www.insecure.org/nmap/ )
    You have new mail in /var/spool/mail/root

  • 連續地掃描端口
  • 使用“-r”標記替代隨機掃描

    [root@server1 ~]# nmap -r 192.168.0.101

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:52 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    Not shown: 1674 closed ports
    PORT STATE SERVICE
    22/tcp open ssh
    80/tcp open http
    111/tcp open rpcbind
    957/tcp open unknown
    3306/tcp open mysql
    8888/tcp open sun-answerbook
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 1 IP address (1 host up) scanned in 0.363 seconds

  • 打印主機接口和路由
  • 使用“–iflist”選項你可以找出主機的接口和路由信息

    [root@server1 ~]# nmap –iflist

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:07 EST
    *******************INTERFACES*******************
    DEV (SHORT) IP/MASK TYPE UP MAC
    lo (lo) 127.0.0.1/8 loopback up
    eth0 (eth0) 192.168.0.100/24 ethernet up 08:00:27:11:C7:89

    *********************ROUTES*********************
    DST/MASK DEV GATEWAY
    192.168.0.0/0 eth0
    169.254.0.0/0 eth0

    在上面的輸出,你可以看見上面的示意圖列出了你的系統的接口和他們各自的路由。
    18. 掃描特定的端口

    Nmap有多種多樣的選項去發現遠程機器的端口。通過“-p”選項,你可以指定你想要掃描的端口,默認情況下Nmap掃描只掃描TCP端口。

    [root@server1 ~]# nmap -p 80 server2.tecmint.com

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:12 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    PORT STATE SERVICE
    80/tcp open http
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 1 IP address (1 host up) sca

  • 掃描一個TCP端口
  • 你也可以指定特別的端口類型和標號來掃描。

    [root@server1 ~]# nmap -p T:8888,80 server2.tecmint.com

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:15 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    PORT STATE SERVICE
    80/tcp open http
    8888/tcp open sun-answerbook
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 1 IP address (1 host up) scanned in 0.157 seconds

  • 掃描一個UDP端口
  • [root@server1 ~]# nmap -sU 53 server2.tecmint.com

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:15 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    PORT STATE SERVICE
    53/udp open http
    8888/udp open sun-answerbook
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 1 IP address (1 host up) scanned in 0.157 seconds

  • 掃描多個指定端口
  • 使用“-p”選項,你也可以指定多個端口掃描。

    [root@server1 ~]# nmap -p 80,443 192.168.0.101

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-18 10:56 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    PORT STATE SERVICE
    80/tcp open http
    443/tcp closed https
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 1 IP address (1 host up) scanned in 0.190 seconds

  • 掃描一段的端口
  • 你可以掃描一段范圍表達的端口。

    [root@server1 ~]# nmap -p 80-160 192.168.0.101

  • 找到主機服務版本號
  • 使用“-sV”選項,我們可以查詢出在遠程服務器的服務版本。

    [root@server1 ~]# nmap -sV 192.168.0.101

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:48 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    Not shown: 1674 closed ports
    PORT STATE SERVICE VERSION
    22/tcp open ssh OpenSSH 4.3 (protocol 2.0)
    80/tcp open http Apache httpd 2.2.3 ((CentOS))
    111/tcp open rpcbind 2 (rpc #100000)
    957/tcp open status 1 (rpc #100024)
    3306/tcp open mysql MySQL (unauthorized)
    8888/tcp open http lighttpd 1.4.32
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 1 IP address (1 host up) scanned in 12.624 seconds

  • 掃描遠程主機是使用TCP ACK還是TCP Syn
  • 有時,濾包器防火墻阻止 ICMP的ping請求,在那種情況下,我們可以使用 TCP ACK和TCP Syn方法來掃描遠程主機。

    [root@server1 ~]# nmap -PS 192.168.0.101

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:51 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    Not shown: 1674 closed ports
    PORT STATE SERVICE
    22/tcp open ssh
    80/tcp open http
    111/tcp open rpcbind
    957/tcp open unknown
    3306/tcp open mysql
    8888/tcp open sun-answerbook
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 1 IP address (1 host up) scanned in 0.360 seconds
    You have new mail in /var/spool/mail/root

  • 用TCP ACK掃描遠程主機掃描特定端口
  • [root@server1 ~]# nmap -PA -p 22,80 192.168.0.101

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 18:02 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    PORT STATE SERVICE
    22/tcp open ssh
    80/tcp open http
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 1 IP address (1 host up) scanned in 0.166 seconds
    You have new mail in /var/spool/mail/root

  • 用TCP Syn掃描遠程主機掃描特定端口
  • [root@server1 ~]# nmap -PS -p 22,80 192.168.0.101

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 18:08 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    PORT STATE SERVICE
    22/tcp open ssh
    80/tcp open http
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 1 IP address (1 host up) scanned in 0.165 seconds
    You have new mail in /var/spool/mail/root

  • 執行一個秘密的掃描
  • [root@server1 ~]# nmap -sS 192.168.0.101

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 18:10 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    Not shown: 1674 closed ports
    PORT STATE SERVICE
    22/tcp open ssh
    80/tcp open http
    111/tcp open rpcbind
    957/tcp open unknown
    3306/tcp open mysql
    8888/tcp open sun-answerbook
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 1 IP address (1 host up) scanned in 0.383 seconds
    You have new mail in /var/spool/mail/root

  • 用TCP Syn檢查所有通用的端口
  • [root@server1 ~]# nmap -sT 192.168.0.101

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 18:12 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    Not shown: 1674 closed ports
    PORT STATE SERVICE
    22/tcp open ssh
    80/tcp open http
    111/tcp open rpcbind
    957/tcp open unknown
    3306/tcp open mysql
    8888/tcp open sun-answerbook
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 1 IP address (1 host up) scanned in 0.406 seconds
    You have new mail in /var/spool/mail/root

  • 執行一個TCP 空掃描來欺騙防火墻
  • [root@server1 ~]# nmap -sN 192.168.0.101

    Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 19:01 EST
    Interesting ports on server2.tecmint.com (192.168.0.101):
    Not shown: 1674 closed ports
    PORT STATE SERVICE
    22/tcp open|filtered ssh
    80/tcp open|filtered http
    111/tcp open|filtered rpcbind
    957/tcp open|filtered unknown
    3306/tcp open|filtered mysql
    8888/tcp open|filtered sun-answerbook
    MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems)

    Nmap finished: 1 IP address (1 host up) scanned in 1.584 seconds
    You have new mail in /var/spool/mail/root

    這就是現在的NMAP,我將會在這一系列的第二部分提出更多創造性的NMAP選項.直到那時,請繼續關注我們,別忘了分享你的寶貴的評價。

    via: http://www.tecmint.com/nmap-command-examples/

    譯者:Vic___

    本文由 LCTT 原創翻譯,Linux中國 榮譽推出

    總結

    以上是生活随笔為你收集整理的Nmap 基础用法的全部內容,希望文章能夠幫你解決所遇到的問題。

    如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。