当前位置:网站首页>【Try to Hack】nmap
【Try to Hack】nmap
2022-06-22 00:27:00 【Happy star】
Blog home page : Happy star The blog home page of
Series column :Try to Hack
Welcome to focus on the likes collection ️ Leaving a message.
Starting time :2022 year 6 month 21 Japan
The author's level is very limited , If an error is found , Please let me know , thank !
A lot of content comes from This article , Only for your own study
Navigation assistant
nmap summary
nmap Is a free and open network scanning and sniffing toolkit , Also called network mapper .
The main function :
1、 Detect live hosts
2、 Probe the system type and open port of the remote host
3、 Scan certain ports on a particular host
4、 Comprehensive scanning of specific hosts
5、 Scan the port of a protocol separately
nmap Command format nmap [ Scan type … ] [ General options ] { Scan target description }
Scan type
| command | function |
|---|---|
| -sT | TCP connect() scanning , This is the most basic TCP Scanning mode . This kind of scan is easy to detect , A large number of connection requests and error messages will be recorded in the log of the target host . Default scan type |
| -sS | TCP Synchronous scanning (TCP SYN), Because you don't have to open all of them TCP Connect , So this technique is often called half open scanning (half-open). The biggest advantage of this technology is , Very few systems can log this . however , You need root Permission to customize SYN Data packets . |
| -sF,-sX,-sN | Secret FIN Packet scanning 、 christmas tree (Xmas Tree)、 empty (Null) Scanning mode . The theory behind these scans is : The closed port needs to respond to your probe packet RST package , The open port must ignore the problem package |
| -sP | ping scanning , use ping How to check which hosts are running on the network . When the host is blocked ICMP echo The request package is ping The scan is invalid .nmap In any case ping scanning , Only the target host is running , For subsequent scans . |
| -sF | FIN Scan to detect the status of firewall , Used to identify whether the port is open |
| -sU | If you want to know what's available on a host UDP( User datagram protocol ,RFC768) service , You can use this option . |
| -sA | ACK scanning , This advanced scanning method can usually be used to go through firewalls . |
| -sW | Swipe window scan , Very similar to ACK Scan . |
| -sR | RPC scanning , Combined with other different port scanning methods . |
| -b | FTP Rebound attack (bounce attack), Connect to one behind the firewall FTP The server acts as an agent , Then we do a port scan . |
General options
| command | function |
|---|---|
| -P0 | Before scanning , No ping host . |
| -PT | Before scanning , Use TCP ping Determine which hosts are running . |
| -PS | about root user , This option makes nmap Use SYN Bag instead of ACK Package to scan the target host . |
| -PI | Set this option , Give Way nmap Use the real ping(ICMP echo request ) To scan whether the target host is running . |
| -PB | This is the default ping Scanning options . It USES ACK(-PT) and ICMP(-PI) The two scan types are scanned in parallel . If the firewall can filter one of the packets , Using this method , You can go through the firewall . |
| -O | This option activates the right TCP/IP Fingerprint features (fingerprinting) Scan , Get the flag of the remote host , That's the operating system type . |
| -v | Redundancy mode . This option is highly recommended , It gives the details of the scanning process . |
| -f | Using fragments IP Packet sending SYN、FIN、XMAS、NULL. Packet filter is added to the packet filter 、 The difficulty of intrusion detection system , Make it impossible to know what you're trying to do . |
| -T | Scanning speed 0~5;0 and 1 Slow scan , Can be used to avoid WAF and IDS;3 Is the default |
| -sV | Open services and service versions of the detection range |
| -A | Comprehensive system testing 、 Enable script detection 、 Scanning, etc , port ping scanning , Operating system scan , Script scan , Route tracking , Service detection |
| -SC | Scan with default script |
Scan target description
| command | function |
|---|---|
| -iL filename | from filename Read the scanned target in the file . |
| -iR | Give Way nmap I randomly select the host for scanning . |
| -p | port This option allows you to select the range of port numbers to scan . Such as :-p 20-30,139,60000. -p- Scan all ports , Equate to -p0-65535 |
| -exclude | Exclude the specified host . |
| -exclude filename | Exclude hosts from the specified file . |
| -F | Quick scan port ( Scan only the most commonly used 100 Ports ) |
--top-ports | Scan those with high openness 1000 Ports , The default option |
Script scan
| command | function |
|---|---|
| -sC | Use the default script to scan ,-A The default script scan will also be used |
--script=auth | Apply weak password detection to the target host |
--script==brute | To the database 、SMB、SNMP And so on |
--script==vuln | Scan for leaks , Whether there are common vulnerabilities |
Detect live hosts
nmap -sP 192.168.1.1/24
/24 representative 192.168.1.1-192.168.1.255
nmap -sP 192.168.1.1/16
/16 representative 192.168.11-192.168.255.255
nmap -sP 192.168.1.1-100
Means scan 192.168.1.1 At the beginning 100 Console host
Probe the system type and open port of the remote host
nmap -sS -P0 -sV -O -A -v The goal is nmap -sS -sV -O -p 1-65535 Japanese sign ·nmap -sS -sC -p -T4 1-65535 The goal is
-A ≈ -sV + -O
边栏推荐
- 8 种最坑SQL语法,工作中踩过吗?
- 以父之名活动攻略(可以薅羊毛啦)
- Buuctf misc weak password
- [wechat applet] some pitfalls and precautions of wechat applet using the form
- Detailed explanation of IDA static reverse analysis tool
- [安洵杯 2019]吹着贝斯扫二维码
- pytorch 界面编程相关
- JVM调优简要思想及简单案例-老年代空间分配担保机制
- 美国旅游签证面试须知,我来敲重点啦!
- Katalon framework test web (VIII) wait
猜你喜欢

【yarn】Name contains illegal characters

【next】nextjs打包出现组件定义缺少显示名称【Component definition is missing display name】

Npdp| how to do well in product life cycle management?

【设置静态路由】“内网专用外网用WIFi“

数据工程系列精讲(第三讲): Data-centric AI 之特征工程

JVM makes wheels

How does the system integration project management engineer (soft exam intermediate) prepare for the exam?

HMS core machine learning service ID card identification function to achieve efficient information entry

【yarn】Name contains illegal characters

Buuctf misc spy Apocalypse
随机推荐
[next] the component definition is missing display name in the next JS package
珂朵莉树 范围查询 chtholly tree Old driver tree
微服务测试效率治理
JVM调优简要思想及简单案例-老年代空间分配担保机制
pytorch可视化
What do technical people pursue?
Buuctf misc spy Apocalypse
Shenzhen Data Analyst Certification (CPDA) in the second half of 2022, [enter to view]
Mathematical knowledge: sum of divisors - divisors
All kinds of FPN in object detection
C. Helping the nature (CF) difference
数据魔术师告诉你整数规划COPT5.0离CPLEX还有多远?
Store API memo
【微信小程序】微信小程序使用弹出框多级联动(示例)
【next】nextjs打包后出现passHref is missing
Have you stepped on the 8 most common SQL grammars at work?
6月編程語言排行榜已出,這門語言要“封神”
【yarn】Name contains illegal characters
[taro] the solution of taro wechat applet input focusing the cursor incorrectly on the Apple phone
Cloud whale took the lead in arranging door-to-door services to see how it broke through the industry "blockade" with services