端口扫描之王-----------nmap
[root@ok data]# nmap -F -sT -v nmap.org Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 12:46 CST
Initiating Ping Scan at :
Scanning nmap.org (45.33.49.119) [ ports]
Completed Ping Scan at :, .17s elapsed ( total hosts)
Initiating Parallel DNS resolution of host. at :
Completed Parallel DNS resolution of host. at :, .24s elapsed#URL进行解析花了16.5秒
Initiating Connect Scan at :
Scanning nmap.org (45.33.49.119) [ ports]
Discovered open port /tcp on 45.33.49.119
Discovered open port /tcp on 45.33.49.119
Discovered open port /tcp on 45.33.49.119
Discovered open port /tcp on 45.33.49.119
Completed Connect Scan at :, .40s elapsed ( total ports)
Nmap scan report for nmap.org (45.33.49.119)
Host is up (.19s latency).
rDNS record for 45.33.49.119: ack.nmap.org
Not shown: filtered ports#有95个端口被屏屏蔽了,说明防火墙是开启的,如果不开启防火墙是不会对端口屏蔽的
PORT STATE SERVICE
/tcp open ssh
/tcp open smtp
/tcp open http
/tcp closed auth
/tcp open https Read data files from: /usr/share/nmap
Nmap done: IP address ( host up) scanned in 4.87 seconds#总共的运行时间
Raw packets sent: (152B) | Rcvd: (28B)
探测目标主机的操做系统:
对自己的系统进行扫描:
[root@ok Desktop]# nmap -O 192.168.1.14 Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 13:34 CST
Nmap scan report for 192.168.1.14
Host is up (.000091s latency).
Not shown: closed ports
PORT STATE SERVICE
/tcp open ssh
/tcp open rpcbind
/tcp open X11:
/tcp open X11:
No exact OS matches for host (If you know what OS is running on it, see http://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=5.51%D=/%OT=%CT=%CU=%PV=Y%DS=%DC=L%G=Y%TM=580C4BF3%P
OS:=x86_64-redhat-linux-gnu)SEQ(SP=%GCD=%ISR=%TI=Z%CI=Z%II=I%TS=A)OP
OS:S(O1=MFFD7ST11NW7%O2=MFFD7ST11NW7%O3=MFFD7NNT11NW7%O4=MFFD7ST11NW7%O5=MF
OS:FD7ST11NW7%O6=MFFD7ST11)WIN(W1=FFCB%W2=FFCB%W3=FFCB%W4=FFCB%W5=FFCB%W6=F
OS:FCB)ECN(R=Y%DF=Y%T=%W=FFD7%O=MFFD7NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=%S=O%
OS:A=S+%F=AS%RD=%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=%W=%S=A%A=Z%F=R%O=%RD=
OS:%Q=)T5(R=Y%DF=Y%T=%W=%S=Z%A=S+%F=AR%O=%RD=%Q=)T6(R=Y%DF=Y%T=%W=%S
OS:=A%A=Z%F=R%O=%RD=%Q=)T7(R=Y%DF=Y%T=%W=%S=Z%A=S+%F=AR%O=%RD=%Q=)U1(R
OS:=Y%DF=N%T=%IPL=%UN=%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N
OS:%T=%CD=S) Network Distance: hops OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: IP address ( host up) scanned in 11.79 seconds
对系统中的vhosts进行扫描:
[root@ok Desktop]# virsh list
Id Name State
----------------------------------------------------
c01 running#192.168.105
c02 running#192.168.1.103
1xp running#192.168.1.104
c01 c02为linux ,1xp为windows
[root@ok Desktop]# nmap -O 192.168.1.103 Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 13:38 CST
Nmap scan report for 192.168.1.103
Host is up (.00045s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open ssh
/tcp closed http
/tcp closed http-proxy
MAC Address: :::B3:: (QEMU Virtual NIC)
Device type: general purpose
Running (JUST GUESSING): Linux 2.6.X (%)
Aggressive OS guesses: Linux 2.6. (Fedora Core ) (%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: hop OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: IP address ( host up) scanned in 9.10 seconds
[root@ok Desktop]# nmap -O 192.168.1.105 Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 13:42 CST
Nmap scan report for 192.168.1.105
Host is up (.00041s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open ssh
MAC Address: :::ED:C2:DB (QEMU Virtual NIC)
Warning: OSScan results may be unreliable because we could not find at least open and closed port
Device type: specialized|WAP|general purpose
Running (JUST GUESSING): Crestron -Series (%), Netgear embedded (%), Linux 2.6.X (%)
Aggressive OS guesses: Crestron XPanel control system (%), Netgear DG834G WAP (%), Linux 2.6. - 2.6. (%), Linux 2.6. - 2.6. (%), Linux 2.6. (%), Linux 2.6. - 2.6. (%), Linux 2.6. - 2.6. (%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: hop OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: IP address ( host up) scanned in 9.22 seconds
[root@ok Desktop]# nmap -O 192.168.1.104 Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 13:43 CST
Nmap scan report for 192.168.1.104
Host is up (.00099s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open icslap
/tcp open ms-term-serv
MAC Address: :::C5::BD (QEMU Virtual NIC)
Warning: OSScan results may be unreliable because we could not find at least open and closed port
Device type: general purpose
Running: Microsoft Windows |XP
OS details: Microsoft Windows SP4, Microsoft Windows XP SP2 or SP3
Network Distance: hop OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: IP address ( host up) scanned in 6.66 seconds
对局域网内的手机ipd进行扫描,系统识别失败!!!
扫描一个范围内的目标(扫描ip地址为192.168.1.1-192.168.1.100内的所有主机)
nmap 192.168.1.1-100
[root@ok Desktop]# nmap 192.168.1.1- Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 14:14 CST
Nmap scan report for 192.168.1.1
Host is up (.00022s latency).
Not shown: filtered ports, closed ports
PORT STATE SERVICE
/tcp open http
/tcp open upnp
MAC Address: EC::8F:::6C (Unknown) Nmap scan report for 192.168.1.14
Host is up (.0000040s latency).
Not shown: closed ports
PORT STATE SERVICE
/tcp open ssh
/tcp open rpcbind
/tcp open X11:
/tcp open X11: Nmap scan report for 192.168.1.100
Host is up (.0013s latency).
All scanned ports on 192.168.1.100 are closed
MAC Address: ::AD:::E7 (Unknown) Nmap scan report for 192.168.1.101
Host is up (.12s latency).
All scanned ports on 192.168.1.101 are filtered
MAC Address: :2A::8F:D9:2D (Unknown) Nmap scan report for 192.168.1.102
Host is up (.075s latency).
All scanned ports on 192.168.1.102 are filtered
MAC Address: EC:F3:5B::: (Unknown) Nmap scan report for 192.168.1.103
Host is up (.00037s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open ssh
/tcp closed http
/tcp closed http-proxy
MAC Address: :::B3:: (QEMU Virtual NIC) Nmap scan report for 192.168.1.104
Host is up (.00064s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open icslap
/tcp open ms-term-serv
MAC Address: :::C5::BD (QEMU Virtual NIC) Nmap scan report for 192.168.1.105
Host is up (.00039s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open ssh
MAC Address: :::ED:C2:DB (QEMU Virtual NIC) Nmap done: IP addresses ( hosts up) scanned in 40.97 seconds
端口扫描之王-----------nmap的更多相关文章
- 端口扫描之王——nmap入门精讲(一)
端口扫描在百度百科上的定义是: 端口扫描是指某些别有用心的人发送一组端口扫描消息,试图以此侵入某台计算机,并了解其提供的计算机网络服务类型(这些网络服务均与端口号相关),但是端口扫描不但可以为黑客所利 ...
- 端口扫描之王——nmap入门精讲(转)
端口扫描在百度百科上的定义是: 端口扫描是指某些别有用心的人发送一组端口扫描消息,试图以此侵入某台计算机,并了解其提供的计算机网络服务类型(这些网络服务均与端口号相关),但是端口扫描不但可以为黑客所利 ...
- 端口扫描之王——nmap入门精讲(二)
接着讲上节的内容,上节中提到了一个时间优化的问题是使用参数-n,通过不解析地址来进行优化时间的,但是优化时间的方法还有很多,比如说我们可以通过时间优化(0-5),指定单位时间内的探针数,设置组的大小 ...
- 端口扫描工具nmap
nmap 使用介绍 nmap是目前为止最广为使用的国外端口扫描工具之一.我们可以从[url]http://www.insecure.org/[/url]进行下载,可以很容易的安装到Windows和un ...
- 7.python实现高效端口扫描器之nmap模块
对于端口扫描,使用的最多的就是nmap这个工具,不想python已经强大到,提供了nmap这个扫描端口的模块. 本片文章主要介绍nmap模块的两个常用类: PortScanner()类,实现一个nma ...
- 端口扫描程序nmap使用手册
其实还是建议看英文的man,对以后学习其他东西很有帮助的:) 摘要 nmap是一个网络探测和安全扫描程序,系统管理者和个人可以使用这个软件扫描大型的网络,获取那台主机正在运行以及提供什么服务等 ...
- 端口扫描工具nmap的常用参数讲解
转载请注明出处:https://www.cnblogs.com/wangyanzhong123/p/12576406.html nmap下载与安装 这个没什么好说的.很简单官网上下载就ok了,需要注意 ...
- 端口扫描工具 nmap 使用手册
0x00 主机发现 -sL 仅仅是显示,扫描的IP数目,不会进行任何扫描 -sn ping扫描,即主机发现 -Pn 不检测主机存活 -PS/PA/PU/PY[portlist] TCP SYN Pin ...
- 端口扫描命令nmap
转:http://www.osyunwei.com/archives/2004.html 下面教大家在CentOS中用nmap查看主机端口: 一.安装nmap yum install nmap -y ...
随机推荐
- BZOJ4612——[Wf2016]Forever Young
1.题意:将一个数y转化成b进制数,使得他>=l,且<y,且转化后均为0~9,使b最大. 2.分析:我们发现要么答案的b很小,要么y很小..那我们直接暴力枚举就好了啊 然后判断一下...另 ...
- leetcode 142. Linked List Cycle II
Given a linked list, return the node where the cycle begins. If there is no cycle, return null. Note ...
- oracle with as 用法
http://blog.itpub.net/28371090/viewspace-1190141/
- Android客户端的图形化拖放操作的设计实现
为什么要拖放?拖放在某些UI交互中可以简化用户操作. 拖放的步骤包括哪些?“Drag and Drop”,拖放,顾名思义,总共就分三步:1, 开始拖起来:2, 正在拖:3, 放下,进行操作:在这三步里 ...
- uniq命令注意事项,检查重复行的时候,只会检查相邻的行。
今天在使用uniq命令统计数量时,uniq -c总是得不到想要的效果,相同的行没有合并,例如 后来在http://ju.outofmemory.cn/entry/78365才看到,原来uniq检查重复 ...
- POCO浅探
POCO作用类似于POJO.POJO的内在含义是指那些从来没有任何类继承.也没有实现任何接口,更是没有被其他框架侵入的JAVA对象.POCO的含义与此是一致的.POJO的意义就在于它的简单灵活性,能够 ...
- Shortest Palindrome
Given a string S, you are allowed to convert it to a palindrome by adding characters in front of it. ...
- C#之显示效果
窗体最大化(包含任务栏): this.TopMost = true; , ); this.Size = Screen.PrimaryScreen.Bounds.Size; 窗体最大化(不包含任务栏): ...
- POJ 2503
http://poj.org/problem?id=2503 题意就是字典翻译.这个输入输出真心恶心,要不是看discuss我肯定是解决不了,还用上了sscanf函数.... 这道题我用几种方法做. ...
- 解决Django发送中文邮件时的编码及乱码问题
参考自---http://blog.csdn.net/clh604/article/details/9274793 #-*- coding=utf8 -*- from email.message im ...