当前位置:网站首页>Information collection port scanning tool nmap instructions
Information collection port scanning tool nmap instructions
2022-07-27 02:47:00 【Xu Jirong】
Catalog
0x01 install
0x02 Scan command
0x01 install
Mac os:
brew install nmap
Centos:
yum install nmap
Ubuntu:
apt-get install nmap
0x02 Scan command
grammar
nmap [scan type] [option] [target]
command
| command | describe |
|---|---|
| -sT | TCP, Basic TCP Scanning mode . This kind of scanning is very Easy to detect To , A large number of connection requests and error messages will be recorded in the log of the target host |
| -sS | SYN, Synchronous scanning , Send only SYN package , So this technology is called semi open scanning , The advantage is , Not easy to detect , Few systems can record this into the log system , But I need root Permission customization SYN package |
| -sU | UDP, What scanning has opened UDP port |
| -sP | ICMP,ping scanning , Detect which hosts are online |
| -P0 | Before scanning , No ping host |
| -PT | Before scanning , Use TCP ping Determine which hosts are running |
| -PI | Set this option , Give Way namp Use the real ping(ICMP echo request ) To scan whether the target host is running |
| -p T:n1,n2… | What scanning has opened TCP port |
| -PS | TCP ACK scanning |
| -PA | TCP SYN scanning |
| -sR | RPC scanning , Combined with other different port scanning methods |
| -sn | Disable Port Scan |
| -sA | ACK scanning , Detect firewalls , This advanced scanning method usually It can be used to pass through the firewall |
| -PB | This is the default ping Scanning options , It USES ACK(-PT) and ICMP(-PI) The two scan types are scanned in parallel . If the firewall can filter one of the packets , Using this method , You can go through the firewall |
| -sW | Swipe window scan , Very similar to ACK scanning |
| -sN | TCP Empty scan spoofing firewall |
| -PN | Detect firewalls |
| -b | FTP Rebound attack , Connect to one behind the firewall FTP The server acts as an agent , Then we do a port scan |
| -A | Scan the operating system and route tracking |
| -O | Detect the operating system |
| -iflist | Display interface and routing information |
| -sV | Check the version of the service |
| -p | Specified port scan |
| -v | Enhanced scanning , give Details of the scanning process |
| -F | Quick scan |
| -r | Scan... In order |
| -I | open nmap The reverse flag scanning function of |
| -f | Use debris IP Data packets send out SYN、FIN、XMAS、NULL. Packet filter is added to the packet filter 、 The difficulty of intrusion detection system , Make it impossible to know what you're trying to do . |
| -S | Set source IP |
| -g port | Set source port , If the attacker modifies the source port to 20 perhaps 53, You can destroy the firewall protection |
| -M count | TCP When the scan , How many sockets can be used for parallel scanning at most |
| -T4 | Specify the timing used in the scanning process , There is always 6 A level (0-5), The higher the level , The faster the scan , But it's also easy to be firewall or IDS Detect and screen out , When the network communication is in good condition Recommended T4 |
| -iR number | Yes Random generation number Scan addresses |
Set the time
| Parameters | describe |
|---|---|
| --host_timeout | Time to scan a host , millisecond In units of , Usually selected value :18000 |
| --scan-delay | Message interval , millisecond In units of , Usually selected value :1000 |
| --max_rtt_timeout | Set each probe Waiting time , millisecond In units of , If it exceeds, it will be retransmitted |
| --min_rtt_timeout | Every time we probe At least the waiting time , With millisecond In units of |
File export
| Parameters | describe |
|---|---|
| -oN | Will result in Export to A readable file logfilename |
| -oX test.xml | The scan results Generate test.xml file , If interrupted , The result is not to open |
| -oA test.xml | The scan results Generate test.xml file , After interruption , The results can also be saved |
| -oG test.txt | The scan results Generate test.txt file |
Multiple scans
| command | describe |
|---|---|
| namp IP1 IP2… | Scan multiple IP |
| namp 192.168.0.1,3,5,7… | Scan multiple IP |
| namp 192.168.0.* | Scan the entire subnet |
| namp 192.168.1-10.* | Scan multiple subnets |
| nmap -iL xxx.txt | Scan multiple according to the file IP |
| namp 192.168.0.10-100 | Scanning range IP |
边栏推荐
- Heisei thousand words (Heisei, September 10, 2012) (Shidu Mingzuo) the universe is far away, the Milky way is permanent, the sun and moon are running disorderly, the earth is open, the seasons shift,
- 使用注解方式实现 Redis 分布式锁
- 听说你们面试都跪在了接口测试上?
- JMeter下载安装
- It has been established for 3 years, and now goose factory has an annual income of millions +. As some suggestions of software testing predecessors
- Okaleido tiger logged into binance NFT on July 27, and has achieved good results in the first round
- F8 catch traffic, F9 catch rabbits, f10turttle
- Witness that the "decoding 2022 strong star of China's network security" is about to set sail
- NAT network address translation protocol topology experiment
- [Fibonacci sequence and spiral are based on C language]
猜你喜欢

膜拜,阿里内部都在强推的321页互联网创业核心技术pdf,真的跪了

I was fired at the age of 30. I want to understand a few things

OSPF总结(思维导图)

文章摘要智能提取【基于BERT技术】

How does the whole network display IP ownership?

Hcip first day

创业3年,现在鹅厂,年收入百万+,作为软件测试前辈的一些建议....

If you want to thoroughly optimize the performance, you must first understand the underlying logic~

I wish you a happy Chinese Valentine's day and invite you to read the source code together

C language: deep learning recursion
随机推荐
TCP three handshakes and four disconnects
LabelImg标注的xml格式转yolov5
PPOCRLabel格式的数据集操作总结。
聊聊自动化测试的度量指标
想要彻底搞的性能优化,得先从底层逻辑开始了解~
聊聊连接池和线程
BigDecimal 的 4 个坑,你踩过几个?
[brother Yang takes you to play with the linear table (4) - chain queue]
贪心——376. 摆动序列
JMeter下载安装
平成千字文(へいせいせんじもん) (平成12年9月10日 石渡 明 作) 宇宙広遠 銀河永久 日月運行 不乱無休 地球公転 季節変移 黄道星座 太陽年周 故郷群島 南熱北冷 海洋温暖 気候順良 青空飛雲 諸野深緑 湖泉静息 谷川清流 春桜一面 新芽
测试工作十年,想对还在迷茫的朋友说:一点要做好个人规划...
Risc-v tool chain compilation notes
JS 数组去重(含简单数组去重、对象数组去重)
[dimension reduction blow, take you to learn CPU in depth (Part 1)]
As for the pit saved by serialized variables, the data added with indexer cannot be serialized
Hcip day 5 OSPF extended configuration experiment
F8 catch traffic, F9 catch rabbits, f10turttle
膜拜,阿里内部都在强推的321页互联网创业核心技术pdf,真的跪了
系统安全测试要怎么做,详细来说说