Nmap, Port Scan, get the IP address of the ssh server, nmapssh
Arp-a // the same network segment. ifconfig-a // old ip addr // ip a: iproute2 suitesudo nmap-sS 192.168.1. * // or sudo nmap-sS-p 22 192.168.1.0/24; if you ip addres
Bulk scan IP Port, the result of exporting IP-named files based on scanned IP.Assume that the contents of the 1.txt file are127.0.0.1192.168.1.1Then we get the file content IP to scanwindow. bat version
: 1.txt for file name, modify according to requirement:
A few days ago to see an article about Metasploit and PowerShell, which mentioned a statement about the port scan, write very concise, very good idea, you can throw away the bulky nmap directly scan the specified IP port:
Copy Code code as follows:
1..1024 |
The Tag:smtplib exists loginmultipartlines formats streamatt accessories #!/usr/bin/env python3 #coding: Utf-8import timeimport commandsimport osimport smtplibimport email. Mimemultipartimport email. Mimetextimport email. Mimebaseimport mimetypesimport Email. Mimeimage#import mimeimage# function: Scan the host's port number 22nd is open and will be successful export log, if there is a
Suppose the 1.txt file content is127.0.0.1192.168.1.1Then we get the file content IP for scanningwindow. bat version
: 1.txt is the filename, modify according to the requirement: C:\nmap\nmap-6.46\nmap.exe as Namp path, modified according to requirements: Put the 1.txt together with the scan script
The code is as follows
Copy Code
@echo offFor/f "delims=,"%%i in (1.txt) do C:\n
Ask PHP swoole extended scan IP 65,535 ports whether the idea of opening
I've only recently learned about Swoole extensions, but I've learned about pthreads extensions before, but there's no idea.
Issues that need to be addressed:
11,000 IP concurrent Scan survival (own resolution using ping or FSOCKOPEN,NODEJS, but to
Automatically check the ip address used to scan the ssh port, and automatically disable command 01 for 100 scans #! /Bin/bash02 # sshd, failed03cd/var/bakwww.2cto. com04cat/var/log/secure | grepFailed | awk amp; #39; {print $13} amp; #39; | sort | uniq...
Automatically check the ip address used to
#!/usr/bin/python#-*-coding:utf-8-*-from libnmap.process import nmapprocessfrom libnmap.parser Import Nmapparserimport Requestsx=90while x Python realizes the use of Nmap and AI stations to scan open 80 port IP and reverse domain name resolution
Port Scan 234 Layer discovery is only to accurately discover all live host IP, identify attack surface, port scan to discover attack point, Discover open port. The port corresponds to t
host once discovered; by testing these services, the ability to discover vulnerabilities.Compiling a scanner requires a lot of TCP/IP programming and knowledge of C, Perl, and shell languages. It requires some background of socket programming, a method for developing customer/service applications. Developing a scanner is an ambitious project that usually satisfies programmers.The following describes common port
Example of the multi-threaded Port Scan function implemented by python: python Port Scan
This example describes the multi-threaded port scanning function implemented by python. We will share this with you for your reference. The details are as follows:
The following program
Concise Port Scan script and concise Port Scan script
Script Name: monitor_port.pl
Purpose: scan for a specific port.
Script:
123456789101112131415161718192021222324252627282930313233343536373839404142434445
#!/usr/bin
Document directory
I. Software Packages
I. Software Packages
1. nmap-5.21.tar.bz2
Ii. Installation Steps
1. tar xvf nmap-5.21.tar.bz2
2. cd nmap-5.21
3../configure
4. make
5. su root
6. make install
7. nmap www.sina.com
Starting Nmap 5.21 (http://nmap.org) at 2010-07-15 CST
Nmap scan report for www.sina.com (202.108.33.89)
Host is up (0.0042 s latency ).
Hostname www.sina.com resolves to 16 IPs. Only scanned 202.108.33.89
Not shown: 999 filtered po
The mac uses the masscan scan port. I think the scan effect is between nmap and zmap, And the masscannmap
Address: https://github.com/robertdavidgraham/masscan
Download, decompress, cd, and make. Then, copy the executable file masscan in the bin to/usr/local/bin for convenient calling.
Root permission execution
Masscan-p 80 8/16 ..-oX mas. log
The
is as follows:#nmap-SL 192.168.1.1/24Scan all subnet hosts except one IP, command:The code is as follows:#nmap192.168.1.1/24-exclude192.168.1.1Scan a subnet host command that is outside the IP in a fileThe code is as follows:#nmap192.168.1.1/24-excludefilexxx.txt (Files in the xxx.txt will be excluded from the scanned host)Scan the 80,21,23
I often use it to detect the remote Windows Server IP address, because it is not a fixed IP address, the server's IP address will often change, but there is a rule, only within a network segment changes, so that the determination of IP address to bring convenience.1. If Nmap is not installed, installYum Install-y Nmap2
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.