The 1,nmap command is an open source network probing and security audit tool designed to quickly scan large networks.
2, grammar
Nmap (option) (parameter)
3, Options
-O: Activate operation detection;
-P0: The value is scanned, does not ping the host;
-PT: Is the ping with TCP;
-SV: Probe service version information;
-sp:ping Scan, only the target host is found to survive;
-ps: Send Synchronous (SYN) messages;
-PU: Send UDP ping;
-pe: Enforcement of direct icmpping;
-PB: Default mode, you can use icmpping and tcpping;
-6: Use IPV6 address;
-V: Get more options information;
-D: Add debug information to the output;
-on: Output in a format that people can read;
-ox: Output information to the specified file in XML format;
-om: Output in a machine-readable format;
-A: Use all advanced scanning options;
--resume: Continue the last scan performed;
-P: Specifies the port to be scanned, which can be a separate port, separated by commas, using "-" to denote the port range;
-e: In a multi-network interface Linux system, specify the network interface used by the scan;
-G: The specified port is scanned as the source port;
--ttl: Specifies the lifetime of the scanned message sent;
--packet-trace: Shows the statistics of sending and receiving messages during the scanning process;
--scanflags: The TCP flag that is set in the scan message.
4, Parameters
IP Address: Specifies the TCP address in the message to be scanned.
5, installation
Yum-y Install Nmap
6, example
Using Nmap to scan www.baidu.com open ports
7, share 29 Examples of users using Nmap
Refer to the following link address:
Https://www.cnblogs.com/MacoLee/articles/5714165.html
Linux nmap Command Detailed