溫馨提示×

溫馨提示×

您好,登錄后才能下訂單哦!

密碼登錄×
登錄注冊×
其他方式登錄
點(diǎn)擊 登錄注冊 即表示同意《億速云用戶服務(wù)條款》

nmap的應(yīng)用

發(fā)布時(shí)間:2020-07-28 04:50:13 來源:網(wǎng)絡(luò) 閱讀:1989 作者:sky9890 欄目:安全技術(shù)

操作環(huán)境:CentOS release 6.9 (Final)

[root@sky9890 ~]# /etc/init.d/iptables  start

iptables: No config file.                                  [WARNING]

[root@sky9890 ~]# /etc/init.d/iptables  save   #保存規(guī)則文件

iptables: Saving firewall rules to /etc/sysconfig/iptables:[  OK  ]

[root@sky9890 ~]# /etc/init.d/iptables  start      #啟動(dòng)防火墻

iptables: Applying firewall rules:                         [  OK  ]

[root@sky9890 ~]# nmap

-bash: nmap: command not found

[root@sky9890 ~]# yum install nmap

Loaded plugins: fastestmirror

Setting up Install Process

Loading mirror speeds from cached hostfile

Resolving Dependencies

--> Running transaction check

---> Package nmap.x86_64 2:5.51-6.el6 will be installed

--> Finished Dependency Resolution

Dependencies Resolved

Installing:

 nmap                         x86_64                         2:5.51-6.el6                         base                         2.8 M

Transaction Summary

=======================================================

Install       1 Package(s)

Total download size: 2.8 M

Installed size: 9.7 M

Is this ok [y/N]: y

Downloading Packages:

nmap-5.51-6.el6.x86_64.rpm                                                                                   

……

Installed:

  nmap.x86_64 2:5.51-6.el6                                                                                                          

Complete!

nmap有三個(gè)作用:

一是探測一組主機(jī)是否在線;

二是掃描主機(jī)端口,嗅探所提供的網(wǎng)絡(luò)服務(wù);

三是可以推斷主機(jī)所用的操作系統(tǒng)。

 [root@sky9890 ~]# nmap 113.195.210.151 -p 22   #查看連接服務(wù)端的22端口是否處于開通狀態(tài)

Starting Nmap 5.51 ( http://nmap.org ) at 2018-03-31 16:54 CST

Nmap scan report for 151.210.195.113.adsl-pool.jx.chinaunicom.com (113.195.210.151)

Host is up (0.020s latency).

PORT   STATE SERVICE

22/tcp open  ssh

Nmap done: 1 IP address (1 host up) scanned in 0.20 seconds

 

 [root@sky9890 ~]# nmap 114.55.53.205    #掃描主機(jī)開放的端口

Starting Nmap 5.51 ( http://nmap.org ) at 2018-03-31 17:24 CST

Nmap scan report for 114.55.53.205

Host is up (0.0079s latency).

Not shown: 984 closed ports

PORT      STATE    SERVICE

25/tcp    filtered smtp

42/tcp    filtered nameserver

80/tcp    open     http

135/tcp   filtered msrpc

139/tcp   filtered netbios-ssn

445/tcp   filtered microsoft-ds

3306/tcp  open     mysql

3389/tcp  open     ms-term-serv

7000/tcp  open     afs3-fileserver

8000/tcp  open     http-alt

8082/tcp  open     blackice-alerts

10001/tcp open     scp-config

49152/tcp open     unknown

49153/tcp open     unknown

49154/tcp open     unknown

49155/tcp open     unknown

Nmap done: 1 IP address (1 host up) scanned in 1.30 seconds

 

[root@sky9890 ~]# nmap -O 114.55.53.205   #探測目標(biāo)主機(jī)的操作系統(tǒng):Windows

Starting Nmap 5.51 ( http://nmap.org ) at 2018-03-31 17:26 CST

Nmap scan report for 114.55.53.205

Host is up (0.0059s latency).

Not shown: 984 closed ports

PORT      STATE    SERVICE

25/tcp    filtered smtp

42/tcp    filtered nameserver

80/tcp    open     http

135/tcp   filtered msrpc

139/tcp   filtered netbios-ssn

445/tcp   filtered microsoft-ds

3306/tcp  open     mysql

3389/tcp  open     ms-term-serv

7000/tcp  open     afs3-fileserver

8000/tcp  open     http-alt

8082/tcp  open     blackice-alerts

10001/tcp open     scp-config

49152/tcp open     unknown

49153/tcp open     unknown

49154/tcp open     unknown

49155/tcp open     unknown

Device type: general purpose

Running (JUST GUESSING): Microsoft Windows Vista|7|2008|Longhorn (97%)

Aggressive OS guesses: Microsoft Windows Vista Enterprise (97%), Microsoft Windows 7 Ultimate (95%), Microsoft Windows Vista Home Premium SP1, Windows 7, or Server 2008 (94%), Microsoft Windows 7 Professional (93%), Microsoft Windows Vista (92%), Microsoft Windows Vista SP0 - SP2, Server 2008, or Windows 7 Ultimate (92%), Microsoft Windows Server 2008 R2 (92%), Microsoft Windows 7 (91%), Microsoft Windows Vista SP1 (91%), Microsoft Windows Server 2008 (90%)

No exact OS matches for host (test conditions non-ideal).

Network Distance: 9 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 6.80 seconds

 

[root@sky9890 ~]# nmap -O 113.195.210.151   #探測目標(biāo)主機(jī)的操作系統(tǒng):Linux

Starting Nmap 5.51 ( http://nmap.org ) at 2018-03-31 17:18 CST

Nmap scan report for 151.210.195.113.adsl-pool.jx.chinaunicom.com (113.195.210.151)

Host is up (0.021s latency).

Not shown: 995 filtered ports

PORT     STATE  SERVICE

22/tcp   open   ssh

80/tcp   open   http

3306/tcp closed mysql

8080/tcp closed http-proxy

9090/tcp closed zeus-admin

Device type: general purpose|WAP|specialized

Running (JUST GUESSING): Linux 2.6.X|2.4.X (89%), Netgear embedded (89%), Linksys Linux 2.4.X (87%), Asus Linux 2.6.X (87%), Crestron 2-Series (86%)

Aggressive OS guesses: Linux 2.6.31 - 2.6.34 (89%), Linux 2.6.9 - 2.6.27 (89%), Netgear DG834G WAP (89%), Linux 2.6.22 (Fedora Core 6) (88%), Linux 2.6.32 (88%), Linux 2.6.34 (88%), OpenWrt White Russian 0.9 (Linux 2.4.30) (87%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (87%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (87%), Linux 2.6.24 - 2.6.35 (87%)

No exact OS matches for host (test conditions non-ideal).

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 9.32 seconds

 

[root@sky9890 ~]# nmap  -A  114.55.53.205

Starting Nmap 5.51 ( http://nmap.org ) at 2018-03-31 17:28 CST

Stats: 0:01:33 elapsed; 0 hosts completed (1 up), 1 undergoing Service Scan

Service scan Timing: About 90.91% done; ETC: 17:29 (0:00:09 remaining)

Nmap scan report for 114.55.53.205

Host is up (0.0057s latency).

Not shown: 984 closed ports

PORT      STATE    SERVICE       VERSION

25/tcp    filtered smtp

42/tcp    filtered nameserver

80/tcp    open     http          Apache httpd 2.4.10 ((Win32) OpenSSL/0.9.8zb PHP/5.3.29)

| http-methods: Potentially risky methods: TRACE

|_See http://nmap.org/nsedoc/scripts/http-methods.html

|_http-title: 403 Forbidden

135/tcp   filtered msrpc

139/tcp   filtered netbios-ssn

445/tcp   filtered microsoft-ds

3306/tcp  open     mysql         MySQL (unauthorized)

3389/tcp  open     microsoft-rdp Microsoft Terminal Service

7000/tcp  open     tcpwrapped

8000/tcp  open     http-alt?

|_http-methods: No Allow or Public header in OPTIONS response (status code 302)

|_http-title: Requested resource was http://114.55.53.205:8000/accounts/login?next=/ and no page was returned.

8082/tcp  open     http          Octoshape P2P streaming web service

|_http-methods: No Allow or Public header in OPTIONS response (status code 404)

10001/tcp open     scp-config?

49152/tcp open     msrpc         Microsoft Windows RPC

49153/tcp open     msrpc         Microsoft Windows RPC

49154/tcp open     msrpc         Microsoft Windows RPC

49155/tcp open     msrpc         Microsoft Windows RPC

2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :

==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============

SF-Port8000-TCP:V=5.51%I=7%D=3/31%Time=5ABF54A8%P=x86_64-redhat-linux-gnu%

     SF:x01\0\(\0\0\0\x0046e7c680871c5fe0ac4581b5c3d558e593bba4b4");

Device type: general purpose

Running (JUST GUESSING): Microsoft Windows Vista|7|2008|Longhorn (97%)

Aggressive OS guesses: Microsoft Windows Vista Enterprise (97%), Microsoft Windows 7 Ultimate (95%), Microsoft Windows Vista Home Premium SP1, Windows 7, or Server 2008 (94%), Microsoft Windows 7 Professional (93%), Microsoft Windows Vista (92%), Microsoft Windows Vista SP0 - SP2, Server 2008, or Windows 7 Ultimate (92%), Microsoft Windows Server 2008 R2 (92%), Microsoft Windows 7 (91%), Microsoft Windows Vista SP1 (91%), Microsoft Windows Server 2008 (90%)

No exact OS matches for host (test conditions non-ideal).

Network Distance: 10 hops

Service Info: OS: Windows

TRACEROUTE (using port 1723/tcp)

HOP RTT      ADDRESS

1   ...

2   6.09 ms  11.218.123.13

3   7.29 ms  11.218.122.178

4   4.70 ms  11.217.0.26

5   4.11 ms  106.11.75.1

6   6.74 ms  140.205.24.21

7   4.95 ms  116.251.124.109

8   10.98 ms 11.182.220.17

9   13.50 ms 11.220.129.54

10  5.36 ms  114.55.53.205

OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 127.84 seconds


向AI問一下細(xì)節(jié)

免責(zé)聲明:本站發(fā)布的內(nèi)容(圖片、視頻和文字)以原創(chuàng)、轉(zhuǎn)載和分享為主,文章觀點(diǎn)不代表本網(wǎng)站立場,如果涉及侵權(quán)請聯(lián)系站長郵箱:is@yisu.com進(jìn)行舉報(bào),并提供相關(guān)證據(jù),一經(jīng)查實(shí),將立刻刪除涉嫌侵權(quán)內(nèi)容。

AI