Document directory
I. Software Packages
I. Software Packages
1. nmap-5.21.tar.bz2
Ii. Installation Steps
1. tar xvf nmap-5.21.tar.bz2
2. cd nmap-5.21
3../configure
4. make
5. su root
6. make install
7. nmap www.sina.com
Starting Nmap 5.21 (http://nmap.org) at 2010-07-15 CST
Nmap scan report for www.sina.com (202.108.33.89)
Host is up (0.0042 s latency ).
Hostname www.sina.com resolves to 16 IPs. Only scanned 202.108.33.89
Not shown: 999 filtered po
handshake.The code is as follows:The fin scan also does not create logs on the target host (one of the benefits of fin scanning). Each type of scan is differentiated, and a fin scan sends packets that contain only the fin identity, the null scan does not send any bytes on the packet, and the
the target host, but the result of the scan will be false and the omission is serious when the network condition is bad.
2, fast installation nmap for enterprise port scanning Nmap is a network detection and security scanner, system managers and individuals can use this software to scan a large network, to obtain the host is running and what services to provide
: 65533 closed portsPORT STATE SERVICE23/tcp open telnet80/tcp open httpMAC Address: xxxxxxxxxxxxxx (Digital China (Shanghai) Networks)Nmap done: 1 IP address (1 host up) scanned in 368.52 secondsWow, telnet is opened ....
3.3nmap execute XMAS scan
The RFC document describes the technical details of the system. Therefore, if you obtain the RFC document, you may find system vulnerabilities. The objecti
generate a connection log on the target system.
tcpfin Scan : The client first sends a FIN packet (end connection) to the destination port, and according to RFC793, if the target port is a closed port, then a RST packet will be returned and the request will be ignored if it is an open port.PS: Valid only for TCP/IP pr
! "Elseecho" is running successfully. operation failed! "Fi
Modify the IP address and contact_mail.
Structure:
12:55:17 # tree/root/nmap_scan // root/nmap_scan/| -- scan_diff_result # Structure of the scan today and yesterday | '-- # directory of the current day |' -- result. log # Comparison result content | -- scan_result # store the scan res
$ time. The project owner should promptly claim and confirm the port. \ n "$ work_dir/scan_diff_result/$ time/result. logcat $ work_dir/scan_diff_result/$ time/result. log | mail-s "[$ time] All IDC data center differential port scan results" $ contact_mailfirm-rf $ work_dir/scan_source/cp-a $ work_dir/scan_result/$ time $ work_dir/scan_sourceif [$? -Eq0]; thene
A few days ago to see an article about Metasploit and PowerShell, which mentioned a statement about the port scan, write very concise, very good idea, you can throw away the bulky nmap directly scan the specified IP port:
Copy Code code as follows:
1..1024 | %{Echo ((New-object Net.Sockets.TcpClient).
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.