端口扫描之王-----------nmap
[root@ok data]# nmap -F -sT -v nmap.org Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 12:46 CST
Initiating Ping Scan at :
Scanning nmap.org (45.33.49.119) [ ports]
Completed Ping Scan at :, .17s elapsed ( total hosts)
Initiating Parallel DNS resolution of host. at :
Completed Parallel DNS resolution of host. at :, .24s elapsed#URL进行解析花了16.5秒
Initiating Connect Scan at :
Scanning nmap.org (45.33.49.119) [ ports]
Discovered open port /tcp on 45.33.49.119
Discovered open port /tcp on 45.33.49.119
Discovered open port /tcp on 45.33.49.119
Discovered open port /tcp on 45.33.49.119
Completed Connect Scan at :, .40s elapsed ( total ports)
Nmap scan report for nmap.org (45.33.49.119)
Host is up (.19s latency).
rDNS record for 45.33.49.119: ack.nmap.org
Not shown: filtered ports#有95个端口被屏屏蔽了,说明防火墙是开启的,如果不开启防火墙是不会对端口屏蔽的
PORT STATE SERVICE
/tcp open ssh
/tcp open smtp
/tcp open http
/tcp closed auth
/tcp open https Read data files from: /usr/share/nmap
Nmap done: IP address ( host up) scanned in 4.87 seconds#总共的运行时间
Raw packets sent: (152B) | Rcvd: (28B)
探测目标主机的操做系统:
对自己的系统进行扫描:
[root@ok Desktop]# nmap -O 192.168.1.14 Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 13:34 CST
Nmap scan report for 192.168.1.14
Host is up (.000091s latency).
Not shown: closed ports
PORT STATE SERVICE
/tcp open ssh
/tcp open rpcbind
/tcp open X11:
/tcp open X11:
No exact OS matches for host (If you know what OS is running on it, see http://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=5.51%D=/%OT=%CT=%CU=%PV=Y%DS=%DC=L%G=Y%TM=580C4BF3%P
OS:=x86_64-redhat-linux-gnu)SEQ(SP=%GCD=%ISR=%TI=Z%CI=Z%II=I%TS=A)OP
OS:S(O1=MFFD7ST11NW7%O2=MFFD7ST11NW7%O3=MFFD7NNT11NW7%O4=MFFD7ST11NW7%O5=MF
OS:FD7ST11NW7%O6=MFFD7ST11)WIN(W1=FFCB%W2=FFCB%W3=FFCB%W4=FFCB%W5=FFCB%W6=F
OS:FCB)ECN(R=Y%DF=Y%T=%W=FFD7%O=MFFD7NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=%S=O%
OS:A=S+%F=AS%RD=%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=%W=%S=A%A=Z%F=R%O=%RD=
OS:%Q=)T5(R=Y%DF=Y%T=%W=%S=Z%A=S+%F=AR%O=%RD=%Q=)T6(R=Y%DF=Y%T=%W=%S
OS:=A%A=Z%F=R%O=%RD=%Q=)T7(R=Y%DF=Y%T=%W=%S=Z%A=S+%F=AR%O=%RD=%Q=)U1(R
OS:=Y%DF=N%T=%IPL=%UN=%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N
OS:%T=%CD=S) Network Distance: hops OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: IP address ( host up) scanned in 11.79 seconds
对系统中的vhosts进行扫描:
[root@ok Desktop]# virsh list
Id Name State
----------------------------------------------------
c01 running#192.168.105
c02 running#192.168.1.103
1xp running#192.168.1.104
c01 c02为linux ,1xp为windows
[root@ok Desktop]# nmap -O 192.168.1.103 Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 13:38 CST
Nmap scan report for 192.168.1.103
Host is up (.00045s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open ssh
/tcp closed http
/tcp closed http-proxy
MAC Address: :::B3:: (QEMU Virtual NIC)
Device type: general purpose
Running (JUST GUESSING): Linux 2.6.X (%)
Aggressive OS guesses: Linux 2.6. (Fedora Core ) (%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: hop OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: IP address ( host up) scanned in 9.10 seconds
[root@ok Desktop]# nmap -O 192.168.1.105 Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 13:42 CST
Nmap scan report for 192.168.1.105
Host is up (.00041s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open ssh
MAC Address: :::ED:C2:DB (QEMU Virtual NIC)
Warning: OSScan results may be unreliable because we could not find at least open and closed port
Device type: specialized|WAP|general purpose
Running (JUST GUESSING): Crestron -Series (%), Netgear embedded (%), Linux 2.6.X (%)
Aggressive OS guesses: Crestron XPanel control system (%), Netgear DG834G WAP (%), Linux 2.6. - 2.6. (%), Linux 2.6. - 2.6. (%), Linux 2.6. (%), Linux 2.6. - 2.6. (%), Linux 2.6. - 2.6. (%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: hop OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: IP address ( host up) scanned in 9.22 seconds
[root@ok Desktop]# nmap -O 192.168.1.104 Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 13:43 CST
Nmap scan report for 192.168.1.104
Host is up (.00099s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open icslap
/tcp open ms-term-serv
MAC Address: :::C5::BD (QEMU Virtual NIC)
Warning: OSScan results may be unreliable because we could not find at least open and closed port
Device type: general purpose
Running: Microsoft Windows |XP
OS details: Microsoft Windows SP4, Microsoft Windows XP SP2 or SP3
Network Distance: hop OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: IP address ( host up) scanned in 6.66 seconds
对局域网内的手机ipd进行扫描,系统识别失败!!!
扫描一个范围内的目标(扫描ip地址为192.168.1.1-192.168.1.100内的所有主机)
nmap 192.168.1.1-100
[root@ok Desktop]# nmap 192.168.1.1- Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 14:14 CST
Nmap scan report for 192.168.1.1
Host is up (.00022s latency).
Not shown: filtered ports, closed ports
PORT STATE SERVICE
/tcp open http
/tcp open upnp
MAC Address: EC::8F:::6C (Unknown) Nmap scan report for 192.168.1.14
Host is up (.0000040s latency).
Not shown: closed ports
PORT STATE SERVICE
/tcp open ssh
/tcp open rpcbind
/tcp open X11:
/tcp open X11: Nmap scan report for 192.168.1.100
Host is up (.0013s latency).
All scanned ports on 192.168.1.100 are closed
MAC Address: ::AD:::E7 (Unknown) Nmap scan report for 192.168.1.101
Host is up (.12s latency).
All scanned ports on 192.168.1.101 are filtered
MAC Address: :2A::8F:D9:2D (Unknown) Nmap scan report for 192.168.1.102
Host is up (.075s latency).
All scanned ports on 192.168.1.102 are filtered
MAC Address: EC:F3:5B::: (Unknown) Nmap scan report for 192.168.1.103
Host is up (.00037s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open ssh
/tcp closed http
/tcp closed http-proxy
MAC Address: :::B3:: (QEMU Virtual NIC) Nmap scan report for 192.168.1.104
Host is up (.00064s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open icslap
/tcp open ms-term-serv
MAC Address: :::C5::BD (QEMU Virtual NIC) Nmap scan report for 192.168.1.105
Host is up (.00039s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open ssh
MAC Address: :::ED:C2:DB (QEMU Virtual NIC) Nmap done: IP addresses ( hosts up) scanned in 40.97 seconds
端口扫描之王-----------nmap的更多相关文章
- 端口扫描之王——nmap入门精讲(一)
端口扫描在百度百科上的定义是: 端口扫描是指某些别有用心的人发送一组端口扫描消息,试图以此侵入某台计算机,并了解其提供的计算机网络服务类型(这些网络服务均与端口号相关),但是端口扫描不但可以为黑客所利 ...
- 端口扫描之王——nmap入门精讲(转)
端口扫描在百度百科上的定义是: 端口扫描是指某些别有用心的人发送一组端口扫描消息,试图以此侵入某台计算机,并了解其提供的计算机网络服务类型(这些网络服务均与端口号相关),但是端口扫描不但可以为黑客所利 ...
- 端口扫描之王——nmap入门精讲(二)
接着讲上节的内容,上节中提到了一个时间优化的问题是使用参数-n,通过不解析地址来进行优化时间的,但是优化时间的方法还有很多,比如说我们可以通过时间优化(0-5),指定单位时间内的探针数,设置组的大小 ...
- 端口扫描工具nmap
nmap 使用介绍 nmap是目前为止最广为使用的国外端口扫描工具之一.我们可以从[url]http://www.insecure.org/[/url]进行下载,可以很容易的安装到Windows和un ...
- 7.python实现高效端口扫描器之nmap模块
对于端口扫描,使用的最多的就是nmap这个工具,不想python已经强大到,提供了nmap这个扫描端口的模块. 本片文章主要介绍nmap模块的两个常用类: PortScanner()类,实现一个nma ...
- 端口扫描程序nmap使用手册
其实还是建议看英文的man,对以后学习其他东西很有帮助的:) 摘要 nmap是一个网络探测和安全扫描程序,系统管理者和个人可以使用这个软件扫描大型的网络,获取那台主机正在运行以及提供什么服务等 ...
- 端口扫描工具nmap的常用参数讲解
转载请注明出处:https://www.cnblogs.com/wangyanzhong123/p/12576406.html nmap下载与安装 这个没什么好说的.很简单官网上下载就ok了,需要注意 ...
- 端口扫描工具 nmap 使用手册
0x00 主机发现 -sL 仅仅是显示,扫描的IP数目,不会进行任何扫描 -sn ping扫描,即主机发现 -Pn 不检测主机存活 -PS/PA/PU/PY[portlist] TCP SYN Pin ...
- 端口扫描命令nmap
转:http://www.osyunwei.com/archives/2004.html 下面教大家在CentOS中用nmap查看主机端口: 一.安装nmap yum install nmap -y ...
随机推荐
- ionic不同view跳转到同一个
ionic不同view跳转到同一个 view并保留历史的路由设计 上代码:state 里面新加一个状态 .state("other", { url: "/other&qu ...
- 160809225-叶桦汀《C语言程序设计》实验报告
#include<stdio.h> int main() { int a,b,c,t; printf("请输入三个整数"); scanf("%d%d%d&qu ...
- hiho一下 第一百零七周 Give My Text Back(微软笔试题)
题目1 : Give My Text Back 时间限制:10000ms 单点时限:1000ms 内存限制:256MB 描述 To prepare for the English exam Littl ...
- am335x 虚拟机环境变量的设置及注释
我用的还是老的Linux3.2.0的内核,只是借用了TI am335x SDK 3.0里面的工具. 首先下载TI官方的SDK,上一章已经安装了一个Ubuntu14.04的虚拟机. TI 最新的SDK下 ...
- linux kernel i2c底层代码跟踪
其实跟上次跟的平台总线有关 在arch/arm/mach-mx6/board-mx6q_sabresd.c 文件中 static void __init mx6_sabresd_board_init( ...
- win8_64下安装paramiko
win8_64下安装paramiko C:\Python35\Scripts>easy_install paramiko 提示 C:\Python35\Scripts>python Pyt ...
- mapReduce编程之google pageRank
1 pagerank算法介绍 1.1 pagerank的假设 数量假设:每个网页都会给它的链接网页投票,假设这个网页有n个链接,则该网页给每个链接平分投1/n票. 质量假设:一个网页的pagerank ...
- linux系统下获取IP,MAC,子网掩码,网关
获取IP和子网掩码 int getLocalInfo(char IP[],char Mask[]) { int fd; int interfaceNum = 0; struct ifreq buf[1 ...
- treeiso
主要包括了一些树同构的代码和一些树图生成器... download
- Database、User、Schema、Tables、Col、Row
可以把Database看作是一个大仓库,仓库分了很多很多的房间,Schema就是其中的房间,一个Schema代表一个房间,Table可以看作是每个Schema中的床,Table(床)就被放入每个房间中 ...