当前位置:网站首页>【kali-信息收集】(1.6)服务的指纹识别:Nmap、Amap
【kali-信息收集】(1.6)服务的指纹识别:Nmap、Amap
2022-08-01 19:38:00 【黑色地带(崛起)】
目录
一、简介
1.1、概述:
为了确保有一个成功的渗透测试 , 必须需要知道目标系统中服务的指纹信息。 服务指 纹信息包括服务端口 、 服务名和版本等
二、工具
2.1、Nmap(识别服务指纹信息)
使用:
【端口扫描工具】nmap核心使用方法
https://blog.csdn.net/qq_53079406/article/details/125263917?ops_request_misc=%257B%2522request%255Fid%2522%253A%2522165932934416781432923359%2522%252C%2522scm%2522%253A%252220140713.130102334.pc%255Fblog.%2522%257D&request_id=165932934416781432923359&biz_id=0&utm_medium=distribute.pc_search_result.none-task-blog-2~blog~first_rank_ecpm_v1~rank_v31_ecpm-1-125263917-null-null.nonecase&utm_term=nmap&spm=1018.2226.3001.4450nmap“扫描基础”“端口扫描技术”“服务和版本探测”“操作系统探测”“时间和性能”“防火墙/IDS躲避和哄骗”相关参考指南
https://blog.csdn.net/qq_53079406/article/details/122759253?ops_request_misc=%257B%2522request%255Fid%2522%253A%2522165932934416781432923359%2522%252C%2522scm%2522%253A%252220140713.130102334.pc%255Fblog.%2522%257D&request_id=165932934416781432923359&biz_id=0&utm_medium=distribute.pc_search_result.none-task-blog-2~blog~first_rank_ecpm_v1~rank_v31_ecpm-4-122759253-null-null.nonecase&utm_term=nmap&spm=1018.2226.3001.4450
测试:
用Nmap工具查看39.106.226.142服务上正在运行的端口
nmap -sV 39.106.226.142
可以查看到目标服务器上运行的端口号、各个端口对应的服务及版本信息
2.2、Amap(服务枚举工具)
简介:
Amap是一个服务枚举工具。 使用该工具能识别正运行在 一 ·个指定端口或一个范围端
口上的应用程序安装:
sudo apt install amap
命令:
Syntax: amap [-A|-B|-P|-W] [-1buSRHUdqv] [[-m] -o <file>] [-D <file>] [-t/-T sec] [-c cons] [-C retries] [-p proto] [-i <file>] [target port [port] ...] Modes: -A Map applications: send triggers and analyse responses (default) -B Just grab banners, do not send triggers -P No banner or application stuff - be a (full connect) port scanner Options: -1 Only send triggers to a port until 1st identification. Speeeeed! -6 Use IPv6 instead of IPv4 -b Print ascii banner of responses -i FILE Nmap machine readable outputfile to read ports from -u Ports specified on commandline are UDP (default is TCP) -R Do NOT identify RPC service -H Do NOT send application triggers marked as potentially harmful -U Do NOT dump unrecognised responses (better for scripting) -d Dump all responses -v Verbose mode, use twice (or more!) for debug (not recommended :-) -q Do not report closed ports, and do not print them as unidentified -o FILE [-m] Write output to file FILE, -m creates machine readable output -c CONS Amount of parallel connections to make (default 32, max 256) -C RETRIES Number of reconnects on connect timeouts (see -T) (default 3) -T SEC Connect timeout on connection attempts in seconds (default 5) -t SEC Response wait timeout in seconds (default 5) -p PROTO Only send triggers for this protocol (e.g. ftp) TARGET PORT The target address and port(s) to scan (additional to -i) amap is a tool to identify application protocols on target ports. Note: this version was NOT compiled with SSL support! Usage hint: Options "-bqv" are recommended, add "-1" for fast/rush checks.使用:
用Amap 工具在指定的端口(或一段范围), 测试目标主机39.106.226.142上正在运行的应用程序
amap -bqv 39.106.226.142 80
边栏推荐
猜你喜欢

手撸代码,Redis发布订阅机制实现

58:第五章:开发admin管理服务:11:开发【管理员人脸登录,接口】;(未实测)(使用了阿里AI人脸识别)(演示了,使用RestTemplate实现接口调用接口;)
![58: Chapter 5: Develop admin management services: 11: Develop [admin face login, interface]; (not measured) (using Ali AI face recognition) (demonstrated, using RestTemplate to implement interface cal](/img/ab/1c0adeb344329e28010b6ffda5389d.png)
58: Chapter 5: Develop admin management services: 11: Develop [admin face login, interface]; (not measured) (using Ali AI face recognition) (demonstrated, using RestTemplate to implement interface cal

安全作业7.25

力扣刷题之合并两个有序数组

升哲科技携全域数字化方案亮相2022全球数字经济大会

10 个 PHP 代码安全漏洞扫描程序

终于有人把AB实验讲明白了

win10,在proe/creo中鼠标中键不能放大缩小

【蓝桥杯选拔赛真题47】Scratch潜艇游戏 少儿编程scratch蓝桥杯选拔赛真题讲解
随机推荐
Choosing the right DevOps tool starts with understanding DevOps
Ruijie switch basic configuration
突破边界,华为存储的破壁之旅
Database Plus 的云上之旅:SphereEx 正式开源 ShardingSphere on Cloud 解决方案
18. Distributed configuration center nacos
SENSORO成长伙伴计划 x 怀柔黑马科技加速实验室丨以品牌力打造To B企业影响力
Win11如何开启剪贴板自动复制?Win11开启剪贴板自动复制的方法
kingbaseV8R3和postgreSQL哪个版本最接近?
内网穿透 lanproxy部署
nacos installation and configuration
Pytorch模型训练实用教程学习笔记:四、优化器与学习率调整
如何写一个vim插件?
app直播源码,点击搜索栏自动弹出下拉框
The graphic details Eureka's caching mechanism/level 3 cache
MySQL开发技巧——并发控制
In the background of the GBase 8c database, what command is used to perform the master-slave switchover operation for the gtm and dn nodes?
MySQL你到底都加了什么锁?
GZIPOutputStream 类源码分析
DAO开发教程【WEB3.0】
锐捷交换机基础配置
https://blog.csdn.net/qq_53079406/article/details/125263917?ops_request_misc=%257B%2522request%255Fid%2522%253A%2522165932934416781432923359%2522%252C%2522scm%2522%253A%252220140713.130102334.pc%255Fblog.%2522%257D&request_id=165932934416781432923359&biz_id=0&utm_medium=distribute.pc_search_result.none-task-blog-2~blog~first_rank_ecpm_v1~rank_v31_ecpm-1-125263917-null-null.nonecase&utm_term=nmap&spm=1018.2226.3001.4450

