1, Port scan
Port scans are often used by system administrators and hackers to discover ports that are open on some machines to help them identify vulnerabilities in the system.
NC-ZVN 172.16.160.111 21-25
Can be run in TCP or UDP mode, by default the Tcp,-u parameter is adjusted to UDP. # #udp测试 No matter what port is detected successed
The z parameter tells Netcat to use 0 IO, Close the connection immediately after the connection is successful, and no data exchange
The V parameter refers to the use of redundancy options
The n parameter tells Netcat not to use DNS to reverse-query the domain name of the IP address
This command prints 21 to 25 of all open ports. Banner is a text that banner is a text message sent to you by a service that you connect to. Banner information is useful when you are trying to identify a vulnerability or the type and version of a service. However, not all services will send banner.
Once you find the open ports, you can easily use the Netcat connection service to crawl their banner.
2. UDP port test
Nmap-su-p 5000 172.16.160.111
Netcat,nmap Common examples