当前位置:网站首页>Network security Kali penetration learning how to get started with web penetration how to scan based on nmap
Network security Kali penetration learning how to get started with web penetration how to scan based on nmap
2022-07-03 19:44:00 【Learning God is coming】
Nmap It's an open source and free network discovery (Network Discovery) And security audit (Security Auditing) Tools . Software name Nmap yes Network Mapper For short .
nmap Scanning mainly includes four scanning functions: host discovery (Host Discovery)、 Port scanning (Port Scanning)、 Application and version detection (Version Detection)、 Operating system detection (Operating System Detection). Between these four functions , There is also a general dependency .
This article teaches you how to proceed based on Nmap Scan
There are video version and text version below
I don't know how to operate. Please see the text version , Detailed steps inside .
Attention to official account rogue Baron reply 【kali System 】
Video version ↓:
Text version ↓:
Nmap The basic scanning method
Nmap, That is to say Network Mapper, The first is Linux Under the network scanning and sniffing Kit .
notes :Nmap The function of is very powerful, which will be explained in a separate class later
example : scanning 192.168.1.0 This segment
┌──(rootxuegod53)-[~]
└─# nmap -sn 192.168.1.0/24
or
┌──(rootxuegod53)-[~]
└─# nmap -sn 192.168.1.1-254
-sn Parameter description : Means only ping scanning , No port scan
4.3.2 Use nmap Perform a half connection scan
nmap The main scanning types are TCP Full connection scan for ( Will leave a record on the scanned machine ), Half connected scan ( There will be no record )
┌──(rootxuegod53)-[~]
└─# nmap -sS 101.200.128.35 -p 80,81,21,25,110,443
-sS Said the use of SYN Perform a half connection scan
4.3.3 Use nc Scan port
nc yes netcat Abbreviation , With the reputation of Swiss Army knife in the Internet world . Because it's short and sharp 、 Functional and practical , Designed as a simple 、 Reliable Internet tools
nc The role of :
To achieve arbitrary TCP/UDP Port listening ,nc It can be used as server With TCP or UDP Mode to listen on the specified port
Port scan ,nc It can be used as client launch TCP or UDP Connect
Transfer files between machines
Network speed measurement between machines
nc Parameters :
-nv It means the target of our scan is IP Address does not do domain name resolution
-w Time out
-z Indicates port scanning
┌──(rootxuegod53)-[~]
└─# nc -nv -w 1 -z 192.168.1.1 1-100
(UNKNOWN) [192.168.1.1] 80 (http) open
(UNKNOWN) [192.168.1.1] 23 (telnet) : Connection timed out
(UNKNOWN) [192.168.1.1] 21 (ftp) open
边栏推荐
- Leetcode 1189. Maximum number of balloons (special character count)
- 2022-06-27 advanced network engineering (XII) IS-IS overhead type, overhead calculation, LSP processing mechanism, route revocation, route penetration
- PR 2021 quick start tutorial, material import and management
- Geek Daily: the system of monitoring employees' turnover intention has been deeply convinced off the shelves; The meta universe app of wechat and QQ was actively removed from the shelves; IntelliJ pla
- Chapitre 1: le roi de shehan a mal calculé
- 05 -- QT OpenGL draw cube uniform
- Web Security (VII) specific process of authentication with session cookie scheme
- Meso tetra [P - (p-n-carbazole benzylidene imino)] phenylporphyrin (tcipp) /eu (tcipp) [pc( α- 2-oc8h17) 4] and euh (tcipp) [pc (a-2-oc8h17) 4] supplied by Qiyue
- PR 2021 quick start tutorial, how to create new projects and basic settings of preferences?
- Win10 share you don't have permission
猜你喜欢

BUUCTF

Sentinel source code analysis part I sentinel overview

Chapter 1: King Shehan miscalculated

03 -- QT OpenGL EBO draw triangle

Octopus online ecological chain tour Atocha protocol received near grant worth $50000

Nerfplusplus parameter format sorting

第二章:求长方体数组,指定区间内的完全数,改进指定区间内的完全数

Xctf attack and defense world crypto advanced area best_ rsa

01. Preparation for automated office (free guidance, only three steps)

01 - QT OpenGL display OpenGL window
随机推荐
Zhang Fei hardware 90 day learning notes - personal record on day 6. Please see my personal profile / homepage for the complete record
Part 27 supplement (27) buttons of QML basic elements
2022-06-27 advanced network engineering (XII) IS-IS overhead type, overhead calculation, LSP processing mechanism, route revocation, route penetration
unittest框架基本使用
2022-06-30 網工進階(十四)路由策略-匹配工具【ACL、IP-Prefix List】、策略工具【Filter-Policy】
2022-06-28 advanced network engineering (XIII) IS-IS route filtering, route summary, authentication, factors affecting the establishment of Isis neighbor relations, other commands and characteristics
Merge K ascending linked lists
2022 Xinjiang latest construction eight members (standard members) simulated examination questions and answers
Chapter 1: recursively find the factorial n of n!
Part 28 supplement (XXVIII) busyindicator (waiting for elements)
01. Preparation for automated office (free guidance, only three steps)
The most valuable thing
Use unique_ PTR forward declaration? [repetition] - forward declaration with unique_ ptr? [duplicate]
第一章: 舍罕王失算
Chapter 1: find the factorial n of n!
第一章:喝汽水,阶梯电费计算,阶梯电费计算函数,个人所税,求解平方根不等式,简化求解平方根不等式,求解调和级数不等式,解不等式:d<1+1/2-1/3+1/4+1/5-1/6+..士1/n
Chapter 2: find the classical solution of the maximum Convention and the least common multiple of a and B, find the conventional solution of the maximum Convention and the least common multiple of a a
2022-06-25 advanced network engineering (XI) IS-IS synchronization process of three tables (neighbor table, routing table, link state database table), LSP, cSNP, psnp, LSP
Luogu-p1107 [bjwc2008] Lei Tao's kitten
第一章:拓广同码小数和s(d, n)



