Nmap Command for Penetration testing (II.)

Source: Internet
Author: User

In the "Nmap Command for penetration test (i)" In this blog post, has already introduced the NMAP command Common option has the basic use method, Next tells the Namp some other scans.

5. Other Scan 5.1 syn scan

Use the -sS option to launch a fully developed scan of our virtual machine Ubuntu (192.168.50.12). The results are as follows:
  
The results show that at least 192.168.50.12 hosts have at least 3 ports open, to ensure that the target network is scanned with different types of scans, otherwise the loss of important information may result in a significant difference in test results.

5.2 Null Scan

Select the null scan, and then look at the results:
  
As a result, we were disappointed that all the ports were in the open/filtered state. We can guess that the target host has a firewall installed, and from the results we are unable to obtain valid information.
  Note : Ubuntu can use UFW to manage host-based iptables firewalls. This firewall is easy to configure and very stable.
  $ sudo ufw enable #开启防火墙
   $ sudo ufw disable #关闭防火墙
  

If we turn off the firewall of the test target host, the result is as follows:
  
From the results, the null scan will also scan the results, only labeled open/filtered.

5.3 Ack Scan

In the case of a firewall, we do not get valid information from a NULL scan, and now we do an ACK scan.
  
Still not scanned for valid information, in order to test the ACK scan and null scan, we add a setting that configures the HTTPS service on the target host and adds a rule to the firewall, allowing HTTPS access, i.e. open 443 port. (commands can be executed on Ubuntu sudo ufw allow 443 .) )
The null scan remains the result, and no valid information is scanned. However, when you perform an ACK scan, the results are different.
  
From the scan results, there was a 443 port that was not filtered out.

Summary

Using different scan types may result in different results and should be taken into consideration. Ideally, you want to do the most discreet scanning, depending on the results and the information gathered to proceed to the next step.
  

Nmap Command for Penetration testing (II.)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.