当前位置:网站首页>Nmap user manual learning records
Nmap user manual learning records
2022-07-05 03:38:00 【paidx0】
Catalog
Take a brief note of nmap Some of the basic instructions , Don't ask , There are too many orders , I am tired of turning English documents ,nmap Its scanning function and concealment are very powerful , It is necessary to have a look more
Description of objectives
-iL <inputname> ( Enter from a list or file )
-iR <hostnum> ( Randomly select the number of generation targets )
--exclude <host1,host2> ( Excluded host network )
The host found
-sL ( List scan )
-sP (Ping scanning , Can and in addition -P0 Any way of discovery )
-P0 ( nothing Ping, All hosts are considered online , Skip host discovery )
-PS <portlist> (TCP SYN Ping)
-PA <portlist> (TCP ACK Ping, What is actually sent is SYN message , instead of ACK message . Stateless firewall , Stateful unexpected firewall , Designated -PS And specify the -PA, namely SYS and ACK)
-PU <portlist> (UDP Ping, through TCP A firewall )
-PE;-PP;-PM (ICMP Ping)
-PR (ARP Ping , be based on ARP Bi Ji Yu IP Faster and more reliable , By default, when the target host is on the same LAN , Even if you specify ping The type of , You can also use ARP. Don't want to ARP,--send-ip)
-n ( Never reverse domain name resolution )
-R ( All target reverse domain name resolution )
--system-dns ( Use the system domain name resolver , Unless nmap Of DNS Only when there is a problem , Because thieves are slow )
Port scanning
nmap Of 6 Two port States
1、open( Open )
2、closed ( closed )
3、filtered( Filtered )
4、unfiltered( Unfiltered ,ACK Scanning will classify this state , Other types of scan confirmation )
5、open|filtered( Open or filtered )
6、closed|filtered( Closed or filtered )
-sS (SYN, Default ,TCP Half connection is not easy to find , Return explicit port status )
-sT (TCP)
-sU (UDP)
-sN;-sF;-sX (TCP Null,FIN,Xmas, Except that the detection flag bit is different , Completely consistent in behavior , You can avoid some stateless firewalls , Even better than SYN More secret , Disadvantages: the port status cannot be marked correctly )
-sA (ACK, Unable to determine the port status , Used to discover firewall rules )
-sW (TCP window , inaccurate )
-sM (Maimon, and Null,FIN,Xmas Exactly the same as , Except that the message is FIN/ACK)
--scanflags ( custom TCP scanning , Set flag bit or scan type )
-sl <zombie host:probeport> (TCP Port blind scan , There is no message from your truth ip Address to destination , Extreme concealment , Default without ports 80)
-sO (IP Protocol scan )
-b <ftp host> (FTP Bounce scan , agent ftp Connect , Format <username>:<password>@<server>:<port>,server It is fragile. FTP Server name ip)
Port specification
-p <port range> ( Scan only the specified port )
-F ( Quick scan , about 1200 Common ports )
-r ( Sequential scanning , For efficiency , Default random scan , Move forward according to the common port )
Service and version detection
-sV ( Version detection ,-A Open the operating system and version detection at the same time )
--allports ( Do not exclude any ports for version probe , Skip by default 9100 port , Print data like some simple printers )
--version-intensity <intensity> ( Set version scan strength 1-9, Default 7)
--version-light (version-intensity2 Another name for , Lightweight and faster , The identification service is weak )
--version-all ( Try all the probes ,version-intensity9 Another name for , Detection of each port )
--version-trace ( Track version scan activity , Print detailed information about the scanning and debugging in progress )
-sR (RPC,-sV Version detection includes it and is more comprehensive , all -sR Rarely need )
Operating system detection
-O ( Enable operating system detection ,-A)
--osscan-limit ( Detect the specified target operating system , Use only -O or -A Operating system detection works )
--osscan-guess;--fuzzy ( Extrapolate the operating system test results , Try to match when you can't be sure , Default match )
Time and performance
--min-hostgroup <milliseconds>;--max-hostgroup <milliseconds> ( Adjust the size range of the parallel scanning group )
--min-parallelism <milliseconds>;--max-parallelism <milliseconds> ( Adjust the parallelism of the detection message , Usually max Set to 1,min Set to 10)
--min-rtt-timeout <milliseconds>;--max-rtt-timeout <milliseconds>;--initial-rtt-timeout <milliseconds> ( Adjust detection message timeout )
--host-timeout <milliseconds> ( Give up the low speed target host )
--scan-delay <milliseconds>;--max-scan-delay <milliseconds> ( Adjust the time interval of detection message , Avoid threshold based intrusion detection and prevention systems )
-T <Paranoid|Sneaky|Polite|Normal|Aggressive|Insane> ( Set time template 0-5, The first two are used for IDS avoid ,Polite Reduce scanning speed to use less bandwidth and target resources , Default Normal,Aggressive Speed up scanning ,Insane Faster speed sacrifices accuracy )
A firewall /IDS avoid
-f ( Segmented message );--mtu ( Use specified MTU, You can customize the offset size , Do not use -f, The offset must be 8 Multiple )
-D <decoy1,decoy2,decoy3.....,me....> ( Use decoys to conceal scanning , The first 6 Use at or later positions me, The port scan detector will not report this true ip, If not used nmap Will be true ip Put it in a random position )
-S <IP_address> ( Source address spoof , Constant cooperation -e or -P0 Use )
-e <interface> ( Use the specified interface )
--source-port <portnumber>; -g <portnumber> ( Source port spoof ,nmap Send data from the specified port )
--data-length <number> ( When sending a message , Additional random data )
--ttl <value> ( Set up IP time-to-live Domain )
--randomize-hosts ( The order of the target hosts is random )
--spoof-mac <mac address,prefix,or vendor name> (MAC Address hoax )
Output
-oN <filespec> ( The standard output is written directly to the specified file )
-oX <filespec> (XML Output is written directly to the specified file )
-oS <filespec> ( Interactive output )
-oG <filespec> (Grep Output , Not recommended ,XML Very powerful )
-oA <basename> ( Scan results in standard format 、XML、Grep One time output , Store separately <basename>.nmap,<basename>.xml and <basename>.gnmap In file )
-v ( Detailed output )
-d [level] ( Set debug level 0-9, Than -v More information , Mainly developers use this )
--packet-trace ( Track messages sent and received , Print the message summary sent and received , For debugging )
--iflist ( List interfaces and routes , Output the detected interface list and system route , Debugging route and device description error )
--append-output ( Append... To the output file , Because the default is overwritten )
--resume <filename> ( Continue interrupted scan ,-oN or -oG When the log is retained ,nmap Append the new result to the file , I won't support it XML)
The other options
-A ( Intense scanning mode , Operating system included -O And version scanning -sV)
--interactive ( Start in interactive mode , This option contains a ! The operator , Used to perform shell command , Can be used to claim , This is also not installed Nmap setuid root One of many reasons )
--send-eth ( Use the original Ethernet frame to send , The original socket word (IP layer ) yes UNIX The most effective way to host , And Ethernet frames are the best Windows operation System , because Microsoft The original socket support is disabled )
--send-ip ( In the original IP Layer send , requirement Nmap Through the original IP Socket send message , Instead of the lower ones Too net frame )
example
nmap -v scanme.nmap.org
Scan the host for all reservations TCP port ,-v For more details
nmap -sS -O scanme.nmap.org/24
Secret SYN scanning , Detect the operating system version , Same as host C Segment machine
nmap -sV -p 22,53,110,143,4564 198.116.0-255.1-127
Host enumeration ,TCP scanning , The object is B class 188.116 In segment 255 individual 8 Seat net . Used to determine whether the system is running sshd、DNS、imapd or 4564 port
nmap -v -iR 1000 -P0 -p 80
Random 1000 Host scanning web Whether the service is on
nmap -P0 -p80 -oX logs/pb-port80scan.xml -oG logs/pb-port80scan.gnmap 216.163.128.20/20
scanning 4096 individual IP Address , lookup Web The server ( No ping), Put the result in Grep and XML Format preservation .
host -l company.com | cut -d -f 4 | nmap -v -iL
Conduct DNS Area transmission , To discover company.com Host in , And then IP Address to Nmap. be used for GNU/Linux, Other systems have different commands for area transmission .
边栏推荐
- Use of kubesphere configuration set (configmap)
- 有個疑問 flink sql cdc 的話可以設置並行度麼, 並行度大於1會有順序問題吧?
- Binary heap implementation (priority queue implementation)
- error Couldn‘t find a package.json file in “你的路径“
- De debugging (set the main thread as hidden debugging to destroy the debugging Channel & debugger detection)
- Kubernetes -- cluster expansion principle
- KVM virtualization
- Port, domain name, protocol.
- Talk about the SQL server version of DTM sub transaction barrier function
- 线程基础知识
猜你喜欢

Sqoop installation

Machine learning experiment report 1 - linear model, decision tree, neural network part

The perfect car for successful people: BMW X7! Superior performance, excellent comfort and safety

Pat grade a 1119 pre- and post order traversals (30 points)

Mongodb common commands

线程基础知识

Use of kubesphere configuration set (configmap)
![[wp][入门]刷弱类型题目](/img/d0/9eb3ade701057837d98e4a20082a10.png)
[wp][入门]刷弱类型题目

How to learn to get the embedding matrix e # yyds dry goods inventory #

KVM virtualization
随机推荐
[安洵杯 2019]不是文件上传
Six stone programming: advantages of automated testing
Multimedia query
深度学习——LSTM基础
Use UDP to send a JPEG image, and UPD will convert it into the mat format of OpenCV after receiving it
【web源码-代码审计方法】审计技巧及审计工具
DECLARE_ WAIT_ QUEUE_ HEAD、wake_ up_ Interruptible macro analysis
SQL performance optimization skills
[wp][入门]刷弱类型题目
Ask, does this ADB MySQL support sqlserver?
Blue Bridge Cup single chip microcomputer -- PWM pulse width modulation
腾讯云,实现图片上传
有个疑问 flink sql cdc 的话可以设置并行度么, 并行度大于1会有顺序问题吧?
天干地支纪年法中为什么是60年一个轮回,而不是120年
[web Audit - source code disclosure] obtain source code methods and use tools
Kbp206-asemi rectifier bridge kbp206
Kubernetes - identity and authority authentication
Sqoop command
Asemi rectifier bridge 2w10 parameters, 2w10 specifications, 2w10 characteristics
Design and practice of kubernetes cluster and application monitoring scheme