Tags: Linux nmap port scan network segmentLinux generally does not automatically install NMAP commands using the Yum-y install nmap installation nmap command, provided that you have configured the Yum source.Nmap Features:Host detectionPort scanVersion detectionSystem detect
to the TCP connection. For example, after connecting to the HTTP service, you can run an ident scan to check whether the server is running as root .)
NMAP scan syntax
Nmap [scan type] [option]
Common scan types
-Ss, tcp syn
Mac uses masscan to scan ports. I think the scanning effect is between nmap and zmap.
Download, decompress, cd, and make. Then, copy the executable file masscan in the bin to/usr/local/bin for convenient calling.
Root permission execution
Masscan-p 80 8/16 ..-oX mas. log
The scan results are satisfactory. It takes
scan, check the host online or not, do not send any message to the destination host, want to know whether the target host is running, and do not want to do other scans, this scanning method is very common)2,-SL (only in the network segment out of the host State, port and other information, query port words with-p port,port1 ...) )3,-ps/pa/pu [Portlist] (based on a given port with TCP or UDP message detection: For the root user, this option allows
#!/usr/bin/python#-*-coding:utf-8-*-from libnmap.process import nmapprocessfrom libnmap.parser Import Nmapparserimport Requestsx=90while x Python realizes the use of Nmap and AI stations to scan open 80 port IP and reverse domain name resolution
Document directory
I. Software Packages
I. Software Packages
1. nmap-5.21.tar.bz2
Ii. Installation Steps
1. tar xvf nmap-5.21.tar.bz2
2. cd nmap-5.21
3../configure
4. make
5. su root
6. make install
7. nmap www.sina.com
Starting Nmap 5.21 (http://nmap.org) at 2010-07-15 C
Nmap Tutorial using the Nmap command example (Nmap use method)
Browse:8268
|
Updated: 2014-03-29 17:23
Nmap is a very useful tool for network scanning and host detection. Nmap is not limited to collecting information and enumerations, but can also be us
as much as possible by combining different scanning methods. When designing command-line parameters, you can refine the timing parameters in a comprehensive network environment to speed up scanning.SYN ScanFirst, the open state of its ports can be detected using a basic SYN scan method.Nmap-ss-t4 www.fakefirewall.com1. All 997
Basic ScanBefore I go into the detailed explanation, I will try a simple scan and have a basic understanding of nmap tools.1.1Scan OverviewNmap The main tools are host survival Scan, port scan, NSE. The scan is divided into a single target
default value can be changed during compilation.nmap.hThe DEFAULT-UDP-PROBE-PORT value in the file is configured. By default, such a strange port is used because such scanning on open ports is generally undesirable.
If the port of the target machine is disabled, UDP detection should immediately receive a response message that the ICMP port cannot reach. This means that the machine is running for
Basic ScanBefore I go into the detailed explanation, I will try a simple scan and have a basic understanding of nmap tools.1.1Scan OverviewNmap The main tools are host survival Scan, port scan, NSE. The scan is divided into a single target
A scanner is a program that can automatically detect the vulnerabilities of a host's security. The scanner collects all kinds of information about the target host by sending a specific network packet, recording the response message of the target host. At present, there are many scanning software on the network, more famous scanners have Sss,x-scan,superscan and so on, the function is most powerful of course is nma
Whenever I infiltrate the Intranet to face a large number of hosts and services, I am always accustomed to using automated methods to extract information from the NMAP scan results. This facilitates automated detection of different types of services, such as path blasting of Web services, testing of keys or protocols used by the SSL/TLS service, and other targeted testing.
I also often use Ipthon or *nix
) are executed on the open port ).The command in this article assumes that you are running in a Python REPL environment such as IPython and installing the libnmap module (which can be installed using easy_install or pip.Before starting, you need to set the corresponding environment. first, import the NmapParser module and read your xml scan result file (the instance name "up_hosts_all_ports_fullscan.xml" is
soon, or be discovered by the firewall-t5 #非常快速的发包, probably missing some open ports0x09 Common Dangerous portsFTP main see whether to support Anonymous, can also run weak passwordWeb common web vulnerabilities and whether it is some management background443 OpenSSL heart drops and some Web vulnerability tests873 Rsync mainly depends on whether to support Anonymous, can also run weak password2601,2604 Zebra Routing, default password zebra3128 Squid P
, execution nmap-v will output the current version numberNow you can perform one of the simplest commands to scan a host, for example: nmap 192.168. 0.42 What parameters do not add the default equivalent to the-SS parameter is the TCP SYN Scan, which does not need to have a full handshake with the server to return in
Network mapper (NMAP) is a powerful scanner that is often used in network security penetration testing. Below we will introduce several scanning parameters, mainly from the Internet:
1) obtain the system type and open port of the remote host
nmap-sS-P0-sV-O
-Ss tcp syn scan (also known as semi-
Using Nmap to scan the surviving hosts in batches
Knowledge Reserve: Grep,nmap
First, install Nmap1. Install the compilation environment[[emailprotected] nmap-7.01]# yum install gcc g++ gcc-c++ -y2. Download Nmap using wget[[emailprotected]
combinations (sudo nmap-sP-PS22-open 10.10.40.1/24), but remember to add sudo, otherwise, nmap may not be able to send raw package, but may not be able to detect the host. Generally, you must specify some specific ports (such as ssh 22 and http 80) for scanning. Otherwise, it will take a lot of time.
Several Common co
I often use it to detect the remote Windows Server IP address, because it is not a fixed IP address, the server's IP address will often change, but there is a rule, only within a network segment changes, so that the determination of IP address to bring convenience.1. If Nmap is not installed, installYum Install-y Nmap2. Scan the Remote Desktop Connection port for the specified network segmentnmap-st-p3389 2
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.