您好,登錄后才能下訂單哦!
本篇內(nèi)容主要講解“Linux的nmap命令有什么用”,感興趣的朋友不妨來看看。本文介紹的方法操作簡單快捷,實用性強。下面就讓小編來帶大家學(xué)習(xí)“Linux的nmap命令有什么用”吧!
nmap [Scan Type...] [Options] {target specification}
-O #激活探測操作 -P0 #只進行掃描,不ping主機 -PT #是同TCP的ping -sV #顯示服務(wù)版本信息 -sP #ping掃描,僅發(fā)現(xiàn)目標主機是否存活 -ps #發(fā)送同步(SYN)報文 -PU #發(fā)送udp ping -PE #強制執(zhí)行直接的ICMPping -PB #默認模式 -6 #使用IPv6地址 -v #詳細信息 -d #增加調(diào)試信息地輸出 -A #使用所有高級掃描選項 --resume #恢復(fù)(繼續(xù)上次)中止的掃描 -P #指定要掃描的端口,可以是一個端口,用逗號隔開多個端口,使用“-”表示端口范圍 -e #在多網(wǎng)絡(luò)接口Linux系統(tǒng)中,指定掃描使用的網(wǎng)絡(luò)接口 -g #將指定的端口作為源端口進行掃描 --ttl #指定發(fā)送的掃描報文的生存期 --packet-trace #顯示掃描過程中收發(fā)報文統(tǒng)計 --scanflags #設(shè)置在掃描報文中的TCP標志 --send-eth/--send-ip #使用原始以太網(wǎng)發(fā)送/構(gòu)造指定IP發(fā)送
典型的掃描
[root@CentOS7-1 ~]# nmap -A www.baidu.com Starting Nmap 6.40 ( http://nmap.org ) at 2021-03-13 04:30 EST Nmap scan report for www.baidu.com (36.152.44.95) Host is up (0.012s latency). Other addresses for www.baidu.com (not scanned): 36.152.44.96 Not shown: 998 filtered ports PORT STATE SERVICE VERSION 80/tcp open http-proxy sslstrip |_http-methods: No Allow or Public header in OPTIONS response (status code 302) | http-robots.txt: 10 disallowed entries | /baidu /s? /ulink? /link? /home/news/data/ /bh /shifen/ |_/homepage/ /cpro / |_http-title: xE7x99xBExE5xBAxA6xE4xB8x80xE4xB8x8BxEFxBCx8CxE4xBDxA0xE5xB0xB1xE7x9FxA5xE9x81x93 443/tcp open ssl/http-proxy sslstrip |_http-methods: No Allow or Public header in OPTIONS response (status code 302) | http-robots.txt: 10 disallowed entries | /baidu /s? /ulink? /link? /home/news/data/ /bh /shifen/ |_/homepage/ /cpro / |_http-title: Site doesn't have a title (text/html). | ssl-cert: Subject: commonName=baidu.com/organizationName=Beijing Baidu Netcom Science Technology Co., Ltd/stateOrProvinceName=beijing/countryName=CN | Not valid before: 2020-04-02T06:04:58+00:00 |_Not valid after: 2021-07-26T04:31:02+00:00 |_ssl-date: 2021-03-16T03:14:21+00:00; +2d17h53m18s from local time. | tls-nextprotoneg: |_ http/1.1 Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: specialized|switch Running (JUST GUESSING): AVtech embedded (88%), HP embedded (86%) OS CPE: cpe:/h:hp:procurve_switch_4000m Aggressive OS guesses: AVtech Room Alert 26W environmental monitor (88%), HP 4000M ProCurve switch (J4121A) (86%) No exact OS matches for host (test conditions non-ideal). Network Distance: 10 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.97 ms 192.168.1.1 2 4.96 ms 100.106.0.1 3 ... 9 10 15.25 ms 36.152.44.95 OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 37.64 seconds
TCP 端口掃描
[root@CentOS7-1 ~]# nmap -sT 192.168.1.100 Starting Nmap 6.40 ( http://nmap.org ) at 2021-03-13 04:32 EST Nmap scan report for 192.168.1.100 Host is up (0.00037s latency). Not shown: 999 closed ports PORT STATE SERVICE 22/tcp open ssh Nmap done: 1 IP address (1 host up) scanned in 0.07 seconds
掃描1-65535
[root@CentOS7-1 ~]# nmap -p 1-65535 -T4 -A -v 192.168.1.100 Starting Nmap 6.40 ( http://nmap.org ) at 2021-03-13 04:33 EST NSE: Loaded 110 scripts for scanning. NSE: Script Pre-scanning. Initiating Parallel DNS resolution of 1 host. at 04:33 Completed Parallel DNS resolution of 1 host. at 04:33, 0.00s elapsed Initiating SYN Stealth Scan at 04:33 Scanning 192.168.1.100 [65535 ports] Discovered open port 22/tcp on 192.168.1.100 Discovered open port 19999/tcp on 192.168.1.100 Completed SYN Stealth Scan at 04:33, 6.82s elapsed (65535 total ports) Initiating Service scan at 04:33 Scanning 2 services on 192.168.1.100 Completed Service scan at 04:33, 19.10s elapsed (2 services on 1 host) Initiating OS detection (try #1) against 192.168.1.100 NSE: Script scanning 192.168.1.100. Initiating NSE at 04:34 Completed NSE at 04:34, 0.14s elapsed Nmap scan report for 192.168.1.100 Host is up (0.000032s latency). Not shown: 65533 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.4 (protocol 2.0) | ssh-hostkey: 2048 37:71:8e:4a:db:cc:ac:29:f2:a2:20:93:23:8c:f6:e8 (RSA) |_256 cc:4b:7d:b6:59:0f:77:83:a9:a5:32:70:4e:87:0d:41 (ECDSA) 19999/tcp open unknown 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : SF-Port19999-TCP:V=6.40%I=7%D=3/13%Time=604C86FA%P=x86_64-redhat-linux-gnu SF:%r(GenericLines,190,"HTTP/1.1x20400x20Badx20RequestrnConnection: SF:x20closernServer:x20NetDatax20Embeddedx20HTTPx20Serverx20v1.29 SF:.3rnAccess-Control-Allow-Origin:x20*rnAccess-Control-Allow-Creden SF:tials:x20truernContent-Type:x20text/plain;x20charset=utf-8rnDate SF::x20Sat,x2013x20Marx202021x2009:33:46x20GMTrnCache-Control:x20 SF:no-cache,x20no-store,x20must-revalidaternPragma:x20no-cachernExp SF:ires:x20Sat,x2013x20Marx202021x2009:33:47x20GMTrnContent-Length SF::x2027rnrnIx20don'tx20understandx20you...rn")%r(GetRequest SF:,5580,"HTTP/1.1x20200x20OKrnConnection:x20closernServer:x20Net SF:Datax20Embeddedx20HTTPx20Serverx20v1.29.3rnAccess-Control-Allow SF:-Origin:x20*rnAccess-Control-Allow-Credentials:x20truernContent- SF:Type:x20text/html;x20charset=utf-8rnDate:x20Tue,x2009x20Febx202 SF:021x2010:11:54x20GMTrnCache-Control:x20publicrnExpires:x20Sun, SF:x2014x20Marx202021x2009:33:46x20GMTrnContent-Length:x2085228rn SF:rnnetdatax20dash SF:board SF:UDP 端口掃描 [root@CentOS7-1 ~]# nmap -sU 192.168.1.100 Starting Nmap 6.40 ( http://nmap.org ) at 2021-03-13 04:34 EST Nmap scan report for 192.168.1.100 Host is up (0.0000040s latency). All 1000 scanned ports on 192.168.1.100 are closed Nmap done: 1 IP address (1 host up) scanned in 1.65 seconds
到此,相信大家對“Linux的nmap命令有什么用”有了更深的了解,不妨來實際操作一番吧!這里是億速云網(wǎng)站,更多相關(guān)內(nèi)容可以進入相關(guān)頻道進行查詢,關(guān)注我們,繼續(xù)學(xué)習(xí)!
免責(zé)聲明:本站發(fā)布的內(nèi)容(圖片、視頻和文字)以原創(chuàng)、轉(zhuǎn)載和分享為主,文章觀點不代表本網(wǎng)站立場,如果涉及侵權(quán)請聯(lián)系站長郵箱:is@yisu.com進行舉報,并提供相關(guān)證據(jù),一經(jīng)查實,將立刻刪除涉嫌侵權(quán)內(nèi)容。