当前位置:网站首页>Network security Kali penetration learning how to get started with web penetration how to scan based on nmap
Network security Kali penetration learning how to get started with web penetration how to scan based on nmap
2022-07-03 19:44:00 【Learning God is coming】
Nmap It's an open source and free network discovery (Network Discovery) And security audit (Security Auditing) Tools . Software name Nmap yes Network Mapper For short .
nmap Scanning mainly includes four scanning functions: host discovery (Host Discovery)、 Port scanning (Port Scanning)、 Application and version detection (Version Detection)、 Operating system detection (Operating System Detection). Between these four functions , There is also a general dependency .
This article teaches you how to proceed based on Nmap Scan
There are video version and text version below
I don't know how to operate. Please see the text version , Detailed steps inside .
Attention to official account rogue Baron reply 【kali System 】
Video version ↓:
Text version ↓:
Nmap The basic scanning method
Nmap, That is to say Network Mapper, The first is Linux Under the network scanning and sniffing Kit .
notes :Nmap The function of is very powerful, which will be explained in a separate class later
example : scanning 192.168.1.0 This segment
┌──(rootxuegod53)-[~]
└─# nmap -sn 192.168.1.0/24
or
┌──(rootxuegod53)-[~]
└─# nmap -sn 192.168.1.1-254
-sn Parameter description : Means only ping scanning , No port scan
4.3.2 Use nmap Perform a half connection scan
nmap The main scanning types are TCP Full connection scan for ( Will leave a record on the scanned machine ), Half connected scan ( There will be no record )
┌──(rootxuegod53)-[~]
└─# nmap -sS 101.200.128.35 -p 80,81,21,25,110,443
-sS Said the use of SYN Perform a half connection scan
4.3.3 Use nc Scan port
nc yes netcat Abbreviation , With the reputation of Swiss Army knife in the Internet world . Because it's short and sharp 、 Functional and practical , Designed as a simple 、 Reliable Internet tools
nc The role of :
To achieve arbitrary TCP/UDP Port listening ,nc It can be used as server With TCP or UDP Mode to listen on the specified port
Port scan ,nc It can be used as client launch TCP or UDP Connect
Transfer files between machines
Network speed measurement between machines
nc Parameters :
-nv It means the target of our scan is IP Address does not do domain name resolution
-w Time out
-z Indicates port scanning
┌──(rootxuegod53)-[~]
└─# nc -nv -w 1 -z 192.168.1.1 1-100
(UNKNOWN) [192.168.1.1] 80 (http) open
(UNKNOWN) [192.168.1.1] 23 (telnet) : Connection timed out
(UNKNOWN) [192.168.1.1] 21 (ftp) open
边栏推荐
- 02 -- QT OpenGL drawing triangle
- CMD implements the language conversion of locale non Unicode programs
- 10 smart contract developer tools that miss and lose
- 6. Data agent object Defineproperty method
- Use of aggregate functions
- Common text labels
- 01 - QT OpenGL display OpenGL window
- 第二章:求长方体数组,指定区间内的完全数,改进指定区间内的完全数
- [wallpaper] (commercially available) 70 wallpaper HD free
- 2022-06-25 advanced network engineering (XI) IS-IS synchronization process of three tables (neighbor table, routing table, link state database table), LSP, cSNP, psnp, LSP
猜你喜欢
Kubernetes cluster builds efk log collection platform
IPv6 experiment
2022-07-02 advanced network engineering (XV) routing policy - route policy feature, policy based routing, MQC (modular QoS command line)
Thesis study - 7 Very Deep Convolutional Networks for Large-Scale Image Recognition (3/3)
Chapter 20: y= sin (x) /x, rambling coordinate system calculation, y= sin (x) /x with profile graphics, Olympic rings, ball rolling and bouncing, water display, rectangular optimization cutting, R que
CMD implements the language conversion of locale non Unicode programs
Geek Daily: the system of monitoring employees' turnover intention has been deeply convinced off the shelves; The meta universe app of wechat and QQ was actively removed from the shelves; IntelliJ pla
Chapter 1: find all factorial sums, Grand Prix site unified programming, three factorial sums, graphic point scanning, recursive factorial n of n!, Find the factorial n of n!, King Shehan miscalculate
Chapter 1: extend the same code decimal sum s (D, n)
Chapter 1: find the factorial n of n!
随机推荐
Detailed explanation of shuttle unity interworking principle
第二章:求a,b的最大公约与最小公倍数经典求解,求a,b的最大公约与最小公倍数常规求解,求n个正整数的的最大公约与最小公倍数
第一章: 舍罕王失算
The 15 year old interviewer will teach you four unique skills that you must pass the interview
2022-06-25 网工进阶(十一)IS-IS-三大表(邻居表、路由表、链路状态数据库表)、LSP、CSNP、PSNP、LSP的同步过程
BOC protected amino acid porphyrins TAPP ala BOC, TAPP Phe BOC, TAPP Trp BOC, Zn · TAPP ala BOC, Zn · TAPP Phe BOC, Zn · TAPP Trp BOC Qiyue
P1891 crazy LCM (Euler function)
The most valuable thing
Professional interpretation | how to become an SQL developer
Free sharing | linefriends hand account inner page | horizontal grid | not for sale
2. Template syntax
第一章:简化同码小数和s(d, n)
Kubernetes cluster builds efk log collection platform
Pecan — @expose()
FPGA learning notes: vivado 2019.1 project creation
Chapitre 1: le roi de shehan a mal calculé
Nerfplusplus parameter format sorting
CMD implements the language conversion of locale non Unicode programs
05 -- QT OpenGL draw cube uniform
Point cloud data denoising