当前位置:网站首页>【kali-信息收集】(1.6)服务的指纹识别:Nmap、Amap
【kali-信息收集】(1.6)服务的指纹识别:Nmap、Amap
2022-08-01 19:38:00 【黑色地带(崛起)】
目录
一、简介
1.1、概述:
为了确保有一个成功的渗透测试 , 必须需要知道目标系统中服务的指纹信息。 服务指 纹信息包括服务端口 、 服务名和版本等
二、工具
2.1、Nmap(识别服务指纹信息)
使用:
【端口扫描工具】nmap核心使用方法
https://blog.csdn.net/qq_53079406/article/details/125263917?ops_request_misc=%257B%2522request%255Fid%2522%253A%2522165932934416781432923359%2522%252C%2522scm%2522%253A%252220140713.130102334.pc%255Fblog.%2522%257D&request_id=165932934416781432923359&biz_id=0&utm_medium=distribute.pc_search_result.none-task-blog-2~blog~first_rank_ecpm_v1~rank_v31_ecpm-1-125263917-null-null.nonecase&utm_term=nmap&spm=1018.2226.3001.4450nmap“扫描基础”“端口扫描技术”“服务和版本探测”“操作系统探测”“时间和性能”“防火墙/IDS躲避和哄骗”相关参考指南
https://blog.csdn.net/qq_53079406/article/details/122759253?ops_request_misc=%257B%2522request%255Fid%2522%253A%2522165932934416781432923359%2522%252C%2522scm%2522%253A%252220140713.130102334.pc%255Fblog.%2522%257D&request_id=165932934416781432923359&biz_id=0&utm_medium=distribute.pc_search_result.none-task-blog-2~blog~first_rank_ecpm_v1~rank_v31_ecpm-4-122759253-null-null.nonecase&utm_term=nmap&spm=1018.2226.3001.4450
测试:
用Nmap工具查看39.106.226.142服务上正在运行的端口
nmap -sV 39.106.226.142
可以查看到目标服务器上运行的端口号、各个端口对应的服务及版本信息
2.2、Amap(服务枚举工具)
简介:
Amap是一个服务枚举工具。 使用该工具能识别正运行在 一 ·个指定端口或一个范围端
口上的应用程序安装:
sudo apt install amap
命令:
Syntax: amap [-A|-B|-P|-W] [-1buSRHUdqv] [[-m] -o <file>] [-D <file>] [-t/-T sec] [-c cons] [-C retries] [-p proto] [-i <file>] [target port [port] ...] Modes: -A Map applications: send triggers and analyse responses (default) -B Just grab banners, do not send triggers -P No banner or application stuff - be a (full connect) port scanner Options: -1 Only send triggers to a port until 1st identification. Speeeeed! -6 Use IPv6 instead of IPv4 -b Print ascii banner of responses -i FILE Nmap machine readable outputfile to read ports from -u Ports specified on commandline are UDP (default is TCP) -R Do NOT identify RPC service -H Do NOT send application triggers marked as potentially harmful -U Do NOT dump unrecognised responses (better for scripting) -d Dump all responses -v Verbose mode, use twice (or more!) for debug (not recommended :-) -q Do not report closed ports, and do not print them as unidentified -o FILE [-m] Write output to file FILE, -m creates machine readable output -c CONS Amount of parallel connections to make (default 32, max 256) -C RETRIES Number of reconnects on connect timeouts (see -T) (default 3) -T SEC Connect timeout on connection attempts in seconds (default 5) -t SEC Response wait timeout in seconds (default 5) -p PROTO Only send triggers for this protocol (e.g. ftp) TARGET PORT The target address and port(s) to scan (additional to -i) amap is a tool to identify application protocols on target ports. Note: this version was NOT compiled with SSL support! Usage hint: Options "-bqv" are recommended, add "-1" for fast/rush checks.使用:
用Amap 工具在指定的端口(或一段范围), 测试目标主机39.106.226.142上正在运行的应用程序
amap -bqv 39.106.226.142 80
边栏推荐
- 有点奇怪!访问目的网址,主机能容器却不行
- modbus bus module DAM-8082
- 数据库系统原理与应用教程(071)—— MySQL 练习题:操作题 110-120(十五):综合练习
- 网站建设流程
- 1个小时!从零制作一个! AI图片识别WEB应用!
- 58: Chapter 5: Develop admin management services: 11: Develop [admin face login, interface]; (not measured) (using Ali AI face recognition) (demonstrated, using RestTemplate to implement interface cal
- ssh & scp
- 手撸代码,Redis发布订阅机制实现
- Tencent Cloud Hosting Security x Lightweight Application Server | Powerful Joint Hosting Security Pratt & Whitney Version Released
- Database Plus 的云上之旅:SphereEx 正式开源 ShardingSphere on Cloud 解决方案
猜你喜欢

17. Load balancing

17、负载均衡

regular expression

LabVIEW 使用VISA Close真的关闭COM口了吗

MLX90640 Infrared Thermal Imager Temperature Measurement Module Development Notes (Complete)

安全作业7.25

Mobile Zero of Likou Brush Questions

手撸代码,Redis发布订阅机制实现

【周赛复盘】LeetCode第304场单周赛

Greenplum Database Source Code Analysis - Analysis of Standby Master Operation Tools
随机推荐
1个小时!从零制作一个! AI图片识别WEB应用!
【周赛复盘】LeetCode第304场单周赛
工作5年,测试用例都设计不好?来看看大神的用例设计总结
Shell script topic (07): file from cfs to bos
ThreadLocal讲义
经验共享|在线文档协作:企业文档处理的最佳选择
In the background of the GBase 8c database, what command is used to perform the master-slave switchover operation for the gtm and dn nodes?
开源视界 | StreamNative 盛宇帆:和浪漫的人一起做最浪漫的事
为什么限制了Oracle的SGA和PGA,OS仍然会用到SWAP?
为你的“架构”安排定期体检吧!
nacos安装与配置
Keras深度学习实战——交通标志识别
[Kapok] #Summer Challenge# Hongmeng mini game project - Sudoku (3)
不恰当Equatable协议==方法的实现对SwiftUI中@State修饰属性的影响
百度无人驾驶商业化已“上路”
17、负载均衡
mysql自增ID跳跃增长解决方案
重保特辑|拦截99%恶意流量,揭秘WAF攻防演练最佳实践
如何写一个vim插件?
【七夕特别篇】七夕已至,让爱闪耀
https://blog.csdn.net/qq_53079406/article/details/125263917?ops_request_misc=%257B%2522request%255Fid%2522%253A%2522165932934416781432923359%2522%252C%2522scm%2522%253A%252220140713.130102334.pc%255Fblog.%2522%257D&request_id=165932934416781432923359&biz_id=0&utm_medium=distribute.pc_search_result.none-task-blog-2~blog~first_rank_ecpm_v1~rank_v31_ecpm-1-125263917-null-null.nonecase&utm_term=nmap&spm=1018.2226.3001.4450

