[root@ok data]# nmap -F -sT -v nmap.org

Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 12:46 CST
Initiating Ping Scan at :
Scanning nmap.org (45.33.49.119) [ ports]
Completed Ping Scan at :, .17s elapsed ( total hosts)
Initiating Parallel DNS resolution of host. at :
Completed Parallel DNS resolution of host. at :, .24s elapsed#URL进行解析花了16.5秒
Initiating Connect Scan at :
Scanning nmap.org (45.33.49.119) [ ports]
Discovered open port /tcp on 45.33.49.119
Discovered open port /tcp on 45.33.49.119
Discovered open port /tcp on 45.33.49.119
Discovered open port /tcp on 45.33.49.119
Completed Connect Scan at :, .40s elapsed ( total ports)
Nmap scan report for nmap.org (45.33.49.119)
Host is up (.19s latency).
rDNS record for 45.33.49.119: ack.nmap.org
Not shown: filtered ports#有95个端口被屏屏蔽了,说明防火墙是开启的,如果不开启防火墙是不会对端口屏蔽的
PORT STATE SERVICE
/tcp open ssh
/tcp open smtp
/tcp open http
/tcp closed auth
/tcp open https Read data files from: /usr/share/nmap
Nmap done: IP address ( host up) scanned in 4.87 seconds#总共的运行时间
Raw packets sent: (152B) | Rcvd: (28B)

探测目标主机的操做系统:

对自己的系统进行扫描:

[root@ok Desktop]# nmap -O 192.168.1.14

Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 13:34 CST
Nmap scan report for 192.168.1.14
Host is up (.000091s latency).
Not shown: closed ports
PORT STATE SERVICE
/tcp open ssh
/tcp open rpcbind
/tcp open X11:
/tcp open X11:
No exact OS matches for host (If you know what OS is running on it, see http://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=5.51%D=/%OT=%CT=%CU=%PV=Y%DS=%DC=L%G=Y%TM=580C4BF3%P
OS:=x86_64-redhat-linux-gnu)SEQ(SP=%GCD=%ISR=%TI=Z%CI=Z%II=I%TS=A)OP
OS:S(O1=MFFD7ST11NW7%O2=MFFD7ST11NW7%O3=MFFD7NNT11NW7%O4=MFFD7ST11NW7%O5=MF
OS:FD7ST11NW7%O6=MFFD7ST11)WIN(W1=FFCB%W2=FFCB%W3=FFCB%W4=FFCB%W5=FFCB%W6=F
OS:FCB)ECN(R=Y%DF=Y%T=%W=FFD7%O=MFFD7NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=%S=O%
OS:A=S+%F=AS%RD=%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=%W=%S=A%A=Z%F=R%O=%RD=
OS:%Q=)T5(R=Y%DF=Y%T=%W=%S=Z%A=S+%F=AR%O=%RD=%Q=)T6(R=Y%DF=Y%T=%W=%S
OS:=A%A=Z%F=R%O=%RD=%Q=)T7(R=Y%DF=Y%T=%W=%S=Z%A=S+%F=AR%O=%RD=%Q=)U1(R
OS:=Y%DF=N%T=%IPL=%UN=%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N
OS:%T=%CD=S) Network Distance: hops OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: IP address ( host up) scanned in 11.79 seconds

对系统中的vhosts进行扫描:

[root@ok Desktop]# virsh list
Id Name State
----------------------------------------------------
c01 running#192.168.105
c02 running#192.168.1.103
1xp running#192.168.1.104

c01 c02为linux ,1xp为windows

[root@ok Desktop]# nmap -O 192.168.1.103

Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 13:38 CST
Nmap scan report for 192.168.1.103
Host is up (.00045s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open ssh
/tcp closed http
/tcp closed http-proxy
MAC Address: :::B3:: (QEMU Virtual NIC)
Device type: general purpose
Running (JUST GUESSING): Linux 2.6.X (%)
Aggressive OS guesses: Linux 2.6. (Fedora Core ) (%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: hop OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: IP address ( host up) scanned in 9.10 seconds
[root@ok Desktop]# nmap -O 192.168.1.105

Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 13:42 CST
Nmap scan report for 192.168.1.105
Host is up (.00041s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open ssh
MAC Address: :::ED:C2:DB (QEMU Virtual NIC)
Warning: OSScan results may be unreliable because we could not find at least open and closed port
Device type: specialized|WAP|general purpose
Running (JUST GUESSING): Crestron -Series (%), Netgear embedded (%), Linux 2.6.X (%)
Aggressive OS guesses: Crestron XPanel control system (%), Netgear DG834G WAP (%), Linux 2.6. - 2.6. (%), Linux 2.6. - 2.6. (%), Linux 2.6. (%), Linux 2.6. - 2.6. (%), Linux 2.6. - 2.6. (%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: hop OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: IP address ( host up) scanned in 9.22 seconds
[root@ok Desktop]# nmap -O 192.168.1.104

Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 13:43 CST
Nmap scan report for 192.168.1.104
Host is up (.00099s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open icslap
/tcp open ms-term-serv
MAC Address: :::C5::BD (QEMU Virtual NIC)
Warning: OSScan results may be unreliable because we could not find at least open and closed port
Device type: general purpose
Running: Microsoft Windows |XP
OS details: Microsoft Windows SP4, Microsoft Windows XP SP2 or SP3
Network Distance: hop OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: IP address ( host up) scanned in 6.66 seconds

对局域网内的手机ipd进行扫描,系统识别失败!!!

扫描一个范围内的目标(扫描ip地址为192.168.1.1-192.168.1.100内的所有主机)

nmap 192.168.1.1-100

[root@ok Desktop]# nmap 192.168.1.1-

Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 14:14 CST
Nmap scan report for 192.168.1.1
Host is up (.00022s latency).
Not shown: filtered ports, closed ports
PORT STATE SERVICE
/tcp open http
/tcp open upnp
MAC Address: EC::8F:::6C (Unknown) Nmap scan report for 192.168.1.14
Host is up (.0000040s latency).
Not shown: closed ports
PORT STATE SERVICE
/tcp open ssh
/tcp open rpcbind
/tcp open X11:
/tcp open X11: Nmap scan report for 192.168.1.100
Host is up (.0013s latency).
All scanned ports on 192.168.1.100 are closed
MAC Address: ::AD:::E7 (Unknown) Nmap scan report for 192.168.1.101
Host is up (.12s latency).
All scanned ports on 192.168.1.101 are filtered
MAC Address: :2A::8F:D9:2D (Unknown) Nmap scan report for 192.168.1.102
Host is up (.075s latency).
All scanned ports on 192.168.1.102 are filtered
MAC Address: EC:F3:5B::: (Unknown) Nmap scan report for 192.168.1.103
Host is up (.00037s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open ssh
/tcp closed http
/tcp closed http-proxy
MAC Address: :::B3:: (QEMU Virtual NIC) Nmap scan report for 192.168.1.104
Host is up (.00064s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open icslap
/tcp open ms-term-serv
MAC Address: :::C5::BD (QEMU Virtual NIC) Nmap scan report for 192.168.1.105
Host is up (.00039s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open ssh
MAC Address: :::ED:C2:DB (QEMU Virtual NIC) Nmap done: IP addresses ( hosts up) scanned in 40.97 seconds

端口扫描之王-----------nmap的更多相关文章

  1. 端口扫描之王——nmap入门精讲(一)

    端口扫描在百度百科上的定义是: 端口扫描是指某些别有用心的人发送一组端口扫描消息,试图以此侵入某台计算机,并了解其提供的计算机网络服务类型(这些网络服务均与端口号相关),但是端口扫描不但可以为黑客所利 ...

  2. 端口扫描之王——nmap入门精讲(转)

    端口扫描在百度百科上的定义是: 端口扫描是指某些别有用心的人发送一组端口扫描消息,试图以此侵入某台计算机,并了解其提供的计算机网络服务类型(这些网络服务均与端口号相关),但是端口扫描不但可以为黑客所利 ...

  3. 端口扫描之王——nmap入门精讲(二)

    接着讲上节的内容,上节中提到了一个时间优化的问题是使用参数-n,通过不解析地址来进行优化时间的,但是优化时间的方法还有很多,比如说我们可以通过时间优化(0-5),指定单位时间内的探针数,设置组的大小 ...

  4. 端口扫描工具nmap

    nmap 使用介绍 nmap是目前为止最广为使用的国外端口扫描工具之一.我们可以从[url]http://www.insecure.org/[/url]进行下载,可以很容易的安装到Windows和un ...

  5. 7.python实现高效端口扫描器之nmap模块

    对于端口扫描,使用的最多的就是nmap这个工具,不想python已经强大到,提供了nmap这个扫描端口的模块. 本片文章主要介绍nmap模块的两个常用类: PortScanner()类,实现一个nma ...

  6. 端口扫描程序nmap使用手册

        其实还是建议看英文的man,对以后学习其他东西很有帮助的:) 摘要 nmap是一个网络探测和安全扫描程序,系统管理者和个人可以使用这个软件扫描大型的网络,获取那台主机正在运行以及提供什么服务等 ...

  7. 端口扫描工具nmap的常用参数讲解

    转载请注明出处:https://www.cnblogs.com/wangyanzhong123/p/12576406.html nmap下载与安装 这个没什么好说的.很简单官网上下载就ok了,需要注意 ...

  8. 端口扫描工具 nmap 使用手册

    0x00 主机发现 -sL 仅仅是显示,扫描的IP数目,不会进行任何扫描 -sn ping扫描,即主机发现 -Pn 不检测主机存活 -PS/PA/PU/PY[portlist] TCP SYN Pin ...

  9. 端口扫描命令nmap

    转:http://www.osyunwei.com/archives/2004.html 下面教大家在CentOS中用nmap查看主机端口: 一.安装nmap yum install nmap -y ...

随机推荐

  1. CF570D——Tree Requests

    1.题目大意:给你一棵树,每个点有一个字符,然后我们定义1的深度是1,然后1的儿子深度是2... 然后有一个询问,询问以i为根节点的子树,然后深度是k的那层的所有字符,可否组成一个回文串 2.分析:首 ...

  2. Eclipse/MyEclipse 安装国际化资源文件编辑插件(i18n tools)

    一.JInto 官网:http://www.guh-software.de/index_en.html http://www.guh-software.de/jinto_en.html 下载地址:ht ...

  3. ACM-括号匹配问题

    对ACM仰慕已久,无奈今天才开始.好吧,遇到的第二个题目就把我难到了.(实话是第一个) 进入正题,下面Copy出题目:  现在,有一行括号序列,请你检查这行括号是否配对. 输入 第一行输入一个数N(0 ...

  4. 浏览器JS脚本

    javascript: void((function() { alert("zeze"); })()) javascript:

  5. sql server 2008笔记

    sql server 2008开启远程访问数据库 1.以windows验证模式进入数据库管理器. 第二步:右击sa,选择属性: 在常规选项卡中,重新填写密码和确认密码(改成个好记的).把强制实施密码策 ...

  6. Maven打包排除不需要的文件。

    pom.xml <!-- package打包排除掉一些配置文件 --> <plugin> <groupId>org.apache.maven.plugins< ...

  7. espcms自定义表单邮件字段

    /include/inc_replace_mailtemplates.php中增加一行就可以了. 如:$replacemail['mailform'][] = array(name => '职位 ...

  8. 【Java】嵌套For循环性能优化案例

    参考资料:http://cgs1999.iteye.com/blog/1596671 1 案例描述 某日,在JavaEye上看到一道面试题,题目是这样的:请对以下的代码进行优化 for (int i  ...

  9. 【GoLang】GoLang 中 make 与 new的区别

    make.new操作 make用于内建类型(map.slice 和channel)的内存分配.new用于各种类型的内存分配. 内建函数new本质上说跟其它语言中的同名函数功能一样:new(T)分配了零 ...

  10. Java计时器Timer和TimerTask用法

    package com.sy.game.test; import java.util.Timer; import java.util.TimerTask; public class TimeTask ...