Tags: Linux nmap port scan network segmentLinux generally does not automatically install NMAP commands using the Yum-y install nmap installation nmap command, provided that you have configured the Yum source.Nmap Features:Host detectionPort scanVersion detectionSystem detectionSupports the authoring of probe scripts
scan, check the host online or not, do not send any message to the destination host, want to know whether the target host is running, and do not want to do other scans, this scanning method is very common)2,-SL (only in the network segment out of the host State, port and other information, query port words with-p port,port1 ...) )3,-ps/pa/pu [Portlist] (based on a given port with TCP or UDP message detection: For the root user, this option allows Nmap
Mac uses masscan to scan ports. I think the scanning effect is between nmap and zmap.
Download, decompress, cd, and make. Then, copy the executable file masscan in the bin to/usr/local/bin for convenient calling.
Root permission execution
Masscan-p 80 8/16 ..-oX mas. log
The scan results are satisfactory. It takes about half an hour and it is faster than nmap
In Kali, you can directly enter Nmap to view the corresponding parameter information. The explanations for each parameter are directly below.Target Specification Goal Description:
-il
-ir
--exclude
--excludefile Host Discovery hosts Discovery:
-SL: Simply list the target of the scan
-SN: Do not do port scan, only host discovery
-PN: All hosts are default to online, skip host discovery
-ps/pa/pu/py[portli
input 2Delete the rule with INPUT Chain number 2.
Click iptables-L-n to check whether it has been cleared.5. Filter invalid data packetsAssume that someone enters the server or has a virus Trojan program, it can transmit data outside the server through port.This method is different from the normal access to port 22 and 80. The data it sends to the external server is not sent by visiting the webpage.The response packet.
We will disable all the packets
From:http://www.myhack58.com/article/sort099/sort0102/2011/31781.htm1. Close all INPUT FORWARD OUTPUT only for certain ports.Here is the command implementation:Iptables-p INPUT DROPIptables-p FORWARD DROPIptables-p OUTPUT DROPThen use the command iptables-l-N to see if it's set up, good-looking to all DROPSuch a setup, we are only temporary, restart the server or will restore the original not set the statea
Step one, Windows view all portsClick Start in the lower left corner of the computer, then select the Run option, and then in the popup window, enter the "cmd" command to make the command prompt. Then we enter "Netstat-ano" in the window and press ENTER, which will show all the port usage. :Step two, query the specified port occupancyIn the window, continue to enter the "Netstat-aon|findstr" Prompt Port "",
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/46/4F/wKiom1PxtLuT8uDNAA7b5gUf4EM726.bmp "title=" Three layer switch different VLAN interworking. bmp "alt=" Wkiom1pxtlut8udnaa7b5guf4em726.bmp "/> Purpose: Two three-layer switches hang different VLANs for interoperability, all ports are access portsAfter the configuration is complete, 10.86.3.50 can ping any networked IP that resides on the device
1. Check if the server port is occupied>lsof-i:80812. View all ports on the server>netstat-ntlp3. Check if the server is open for a portTCP port: >NETSTAT-NTPLUDP port: >NETSTAT-NUPLCommon parameters:-A (All) displays all options and does not show listen related by default-T (TCP) displays only TCP-related options-U (U
Execute shell commands in the program to automatically obtain all online IP addresses and open ports in the LAN (Linux)Preface
The question is a bit long. It is actually the following: first, let the Shell command be executed in the program, and then pass the execution result to the variable, so that subsequent transactions can be processed, the second is to use the nma
Execute shell commands in the program to automatically obtain all the online IP addresses and open ports in the LAN (Linux), shelllinuxPreface
The question is a bit long. It is actually the following: first, let the Shell command be executed in the program, and then pass the execution result to the variable, so that subsequent transactions can be processed, the second is to use the
ObjectiveThe topic said a bit long, in fact, is the following several things, the first is that the shell command can be executed within the program, and then pass the execution results to the variable, so that the subsequent transaction processing, the second is to use the Nmap command to get all the online IP and open ports in the current LAN, Finally, the resu
GE switches are still commonly used. So I have studied the full performance solution of the mainstream L2 switches with all-optical ports. I would like to share this with you and hope it will be useful to you. Recently, the F-engine S2200F series all-optical ports, 10-Gigabit L2 switches and F-engine S2200G series
Open a DOS window in Win2000 and then execute
For/L % A in (1, 1, 254) do start/MIN/low Telnet 192.168.0.% A 3389
In this way, all open ports 3389 in the 192.168.0.x segment will be exposed to hosts.
After this command is executed
254 small windows will be opened in the taskbar
Then, the window that fails the Telnet link will automatically exit in about 5 seconds.
The remaining window is the host with
,managed 0 0/dev/hdc/media/cdrom1 Auto pamconsole,exec,noauto,managed 0 0This is automatically created when the system is automatically restored, does not load the PTS file system, and some other systems are not mounted. Refer to the normal system's Fstab file and modify it as follows:/dev/mapper/volgroup00-logvol00/ext3 RW 0 0label=/boot/boot ext3 defaults 1 2/dev/devpts/dev/pts devpts gid=5,mode=620 0 0/dev/shm/dev/shm tmpfs defaults 0 0/dev/proc/proc proc Defaults 0 0/dev/sys/sys Sysfs defaul
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.