New Linux User Guide: Advanced Nmap Usage Guide

Source: Internet
Author: User

When using Nmap, we found that Nmap prompts Happy 10th Birthday to Nmap, and may it live to be 110! (It is now 10 years old, maybe it can live to 110 years old) I did not expect that September 1 was the day of its birth, 10 years a sword ah.

In order to commemorate this great king of port scanners, several versions of tutorials on the Internet were posted several years ago. I took out some of my usage experiences. The Nmap King is not a white name. It has several of the most powerful features in the industry, some of these functions are irreplaceable by other commercial and free scanners, such as system/application version TCP stack detection. However, many users simply use the-O-sV parameter for detection, let me talk about my probe method.

Nmap-P0-sT-vv-n-p80 -- script =./showSMTPVersion. Neuron-iL c: \ smtp.txt-oN c: \ Vulnerable.txt

-SV -- version-all

Detects application versions with the highest intensity of Detection

-O -- osscan-guess

Test the operating system version in the most active mode

-P0

Most hosts reject ICMP and cannot scan without this parameter.

-ST

Some people may wonder why we don't need to get faster-sS? There are two reasons: First, many firewalls use the syn scan function-sS to scan nothing,

The second half-connection during scanning is less accurate and reliable than the TCP connection of three connections.

-Vv

Let you understand the detailed scanning process. If you find out which processes are unnecessary, You can adjust them immediately,

-N

This parameter was not used to cause nmap to be abnormal and slow when the IP address was scanned in a large range. I don't know why when it got stuck for half a day. I added the-vv parameter and found that, it turns out that dns resolution is performed for each ip address. If-n is added, dns resolution is not performed.

-P80

Scan TCP port 80

-- Script =./showSMTPVersion. Neuron

Nmap is added to the script scanning engine, which can scan website directories and remote overflow and weak passwords. This function seems to be available only in recent months.

-IL c: \ smtp.txt

Ip address used to read the host list file of c: \ smtp.txt

-ON c: \ Vulnerable.txt

Save the test result in c: \ Vulnerable.txt

Related Articles]

  • Description of Nmap network security scanner in linux
  • Nmap version 3.50 in windows
  • Nmap Application

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.