当前位置:网站首页>Network security Kali penetration learning how to get started with web penetration how to scan based on nmap
Network security Kali penetration learning how to get started with web penetration how to scan based on nmap
2022-07-03 19:44:00 【Learning God is coming】
Nmap It's an open source and free network discovery (Network Discovery) And security audit (Security Auditing) Tools . Software name Nmap yes Network Mapper For short .
nmap Scanning mainly includes four scanning functions: host discovery (Host Discovery)、 Port scanning (Port Scanning)、 Application and version detection (Version Detection)、 Operating system detection (Operating System Detection). Between these four functions , There is also a general dependency .
This article teaches you how to proceed based on Nmap Scan
There are video version and text version below
I don't know how to operate. Please see the text version , Detailed steps inside .
Attention to official account rogue Baron reply 【kali System 】
Video version ↓:
Text version ↓:
Nmap The basic scanning method
Nmap, That is to say Network Mapper, The first is Linux Under the network scanning and sniffing Kit .
notes :Nmap The function of is very powerful, which will be explained in a separate class later
example : scanning 192.168.1.0 This segment
┌──(rootxuegod53)-[~]
└─# nmap -sn 192.168.1.0/24
or
┌──(rootxuegod53)-[~]
└─# nmap -sn 192.168.1.1-254
-sn Parameter description : Means only ping scanning , No port scan
4.3.2 Use nmap Perform a half connection scan
nmap The main scanning types are TCP Full connection scan for ( Will leave a record on the scanned machine ), Half connected scan ( There will be no record )
┌──(rootxuegod53)-[~]
└─# nmap -sS 101.200.128.35 -p 80,81,21,25,110,443
-sS Said the use of SYN Perform a half connection scan
4.3.3 Use nc Scan port
nc yes netcat Abbreviation , With the reputation of Swiss Army knife in the Internet world . Because it's short and sharp 、 Functional and practical , Designed as a simple 、 Reliable Internet tools
nc The role of :
To achieve arbitrary TCP/UDP Port listening ,nc It can be used as server With TCP or UDP Mode to listen on the specified port
Port scan ,nc It can be used as client launch TCP or UDP Connect
Transfer files between machines
Network speed measurement between machines
nc Parameters :
-nv It means the target of our scan is IP Address does not do domain name resolution
-w Time out
-z Indicates port scanning
┌──(rootxuegod53)-[~]
└─# nc -nv -w 1 -z 192.168.1.1 1-100
(UNKNOWN) [192.168.1.1] 80 (http) open
(UNKNOWN) [192.168.1.1] 23 (telnet) : Connection timed out
(UNKNOWN) [192.168.1.1] 21 (ftp) open
边栏推荐
- Zhang Fei hardware 90 day learning notes - personal record on day 5. Please see my personal profile / homepage for the complete record
- 2022-06-25 网工进阶(十一)IS-IS-三大表(邻居表、路由表、链路状态数据库表)、LSP、CSNP、PSNP、LSP的同步过程
- If the warehouse management communication is not in place, what problems will occur?
- PR FAQ: how to set PR vertical screen sequence?
- 01. Preparation for automated office (free guidance, only three steps)
- Zhang Fei hardware 90 day learning notes - personal record on day 6. Please see my personal profile / homepage for the complete record
- Detailed explanation of shuttle unity interworking principle
- OSPF - detailed explanation of stub area and full stub area
- 第一章:喝汽水,阶梯电费计算,阶梯电费计算函数,个人所税,求解平方根不等式,简化求解平方根不等式,求解调和级数不等式,解不等式:d<1+1/2-1/3+1/4+1/5-1/6+..士1/n
- HCIA-USG Security Policy
猜你喜欢

第二章:求a,b的最大公约与最小公倍数经典求解,求a,b的最大公约与最小公倍数常规求解,求n个正整数的的最大公约与最小公倍数

第一章:递归求n的阶乘n!

Thesis study - 7 Very Deep Convolutional Networks for Large-Scale Image Recognition (3/3)

Acquisition and transmission of parameters in automatic testing of JMeter interface

2022.2.14 Li Kou - daily question - single element in an ordered array

How to build an efficient information warehouse
![Chapter 2: find the number of daffodils based on decomposition, find the number of daffodils based on combination, find the conformal number in [x, y], explore the n-bit conformal number, recursively](/img/c5/0081689817700770f6210d50ec4e1f.png)
Chapter 2: find the number of daffodils based on decomposition, find the number of daffodils based on combination, find the conformal number in [x, y], explore the n-bit conformal number, recursively

Chapter 1: simplify the same code decimal sum s (D, n)

2022 Xinjiang latest construction eight members (standard members) simulated examination questions and answers

Basic principle of LSM tree
随机推荐
PR 2021 quick start tutorial, material import and management
Difference between surface go1 and surface GO2 (non professional comparison)
Leetcode 1189. Maximum number of balloons (special character count)
BOC protected alanine porphyrin compound TAPP ala BOC BOC BOC protected phenylalanine porphyrin compound TAPP Phe BOC Qi Yue supply
BOC protected tryptophan porphyrin compound (TAPP Trp BOC) Pink Solid 162.8mg supply - Qiyue supply
第二章:求a,b的最大公约与最小公倍数经典求解,求a,b的最大公约与最小公倍数常规求解,求n个正整数的的最大公约与最小公倍数
The space of C disk is insufficient, and the computer becomes stuck. Quickly expand the capacity of C disk to make the system more smooth
Typora charges, WTF? Still need support
Pecan - route
Kubernetes cluster builds efk log collection platform
Utilisation de base du cadre unitest
CesiumJS 2022^ 源码解读[7] - 3DTiles 的请求、加载处理流程解析
Comments on flowable source code (37) asynchronous job processor
Summary of 90 day learning materials and notes of Zhang Fei's actual electronic hardware engineer
This Chinese numpy quick look-up table is too easy!
Chapter 1: King Shehan miscalculated
Recommend a GIF processing artifact less than 300K - gifsicle (free download)
[free sharing] kotalog diary2022 plan electronic manual ledger
BOC protected alanine zinc porphyrin Zn · TAPP ala BOC / alanine zinc porphyrin Zn · TAPP ala BOC / alanine zinc porphyrin Zn · TAPP ala BOC / alanine zinc porphyrin Zn · TAPP ala BOC supplied by Qiyu
2022 - 06 - 30 networker Advanced (XIV) Routing Policy Matching Tool [ACL, IP prefix list] and policy tool [Filter Policy]



