When using Nmap, we found that Nmap prompts Happy 10th Birthday to Nmap, and may it live to be 110! (It is now 10 years old, maybe it can live to 110 years old) I did not expect that September 1 was the day of its birth, 10 years a sword ah.
In order to commemorate this great king of port scanners, several versions of tutorials on the Internet were posted several years ago. I took out some of my usage experiences. The Nmap King is not a white name. It has several of the most powerful features in the industry, some of these functions are irreplaceable by other commercial and free scanners, such as system/application version TCP stack detection. However, many users simply use the-O-sV parameter for detection, let me talk about my probe method.
Nmap-P0-sT-vv-n-p80 -- script =./showSMTPVersion. Neuron-iL c: \ smtp.txt-oN c: \ Vulnerable.txt
-SV -- version-all
Detects application versions with the highest intensity of Detection
-O -- osscan-guess
Test the operating system version in the most active mode
-P0
Most hosts reject ICMP and cannot scan without this parameter.
-ST
Some people may wonder why we don't need to get faster-sS? There are two reasons: First, many firewalls use the syn scan function-sS to scan nothing,
The second half-connection during scanning is less accurate and reliable than the TCP connection of three connections.
-Vv
Let you understand the detailed scanning process. If you find out which processes are unnecessary, You can adjust them immediately,
-N
This parameter was not used to cause nmap to be abnormal and slow when the IP address was scanned in a large range. I don't know why when it got stuck for half a day. I added the-vv parameter and found that, it turns out that dns resolution is performed for each ip address. If-n is added, dns resolution is not performed.
-P80
Scan TCP port 80
-- Script =./showSMTPVersion. Neuron
Nmap is added to the script scanning engine, which can scan website directories and remote overflow and weak passwords. This function seems to be available only in recent months.
-IL c: \ smtp.txt
Ip address used to read the host list file of c: \ smtp.txt
-ON c: \ Vulnerable.txt
Save the test result in c: \ Vulnerable.txt
Related Articles]
- Description of Nmap network security scanner in linux
- Nmap version 3.50 in windows