端口扫描之王-----------nmap
[root@ok data]# nmap -F -sT -v nmap.org Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 12:46 CST
Initiating Ping Scan at :
Scanning nmap.org (45.33.49.119) [ ports]
Completed Ping Scan at :, .17s elapsed ( total hosts)
Initiating Parallel DNS resolution of host. at :
Completed Parallel DNS resolution of host. at :, .24s elapsed#URL进行解析花了16.5秒
Initiating Connect Scan at :
Scanning nmap.org (45.33.49.119) [ ports]
Discovered open port /tcp on 45.33.49.119
Discovered open port /tcp on 45.33.49.119
Discovered open port /tcp on 45.33.49.119
Discovered open port /tcp on 45.33.49.119
Completed Connect Scan at :, .40s elapsed ( total ports)
Nmap scan report for nmap.org (45.33.49.119)
Host is up (.19s latency).
rDNS record for 45.33.49.119: ack.nmap.org
Not shown: filtered ports#有95个端口被屏屏蔽了,说明防火墙是开启的,如果不开启防火墙是不会对端口屏蔽的
PORT STATE SERVICE
/tcp open ssh
/tcp open smtp
/tcp open http
/tcp closed auth
/tcp open https Read data files from: /usr/share/nmap
Nmap done: IP address ( host up) scanned in 4.87 seconds#总共的运行时间
Raw packets sent: (152B) | Rcvd: (28B)
探测目标主机的操做系统:
对自己的系统进行扫描:
[root@ok Desktop]# nmap -O 192.168.1.14 Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 13:34 CST
Nmap scan report for 192.168.1.14
Host is up (.000091s latency).
Not shown: closed ports
PORT STATE SERVICE
/tcp open ssh
/tcp open rpcbind
/tcp open X11:
/tcp open X11:
No exact OS matches for host (If you know what OS is running on it, see http://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=5.51%D=/%OT=%CT=%CU=%PV=Y%DS=%DC=L%G=Y%TM=580C4BF3%P
OS:=x86_64-redhat-linux-gnu)SEQ(SP=%GCD=%ISR=%TI=Z%CI=Z%II=I%TS=A)OP
OS:S(O1=MFFD7ST11NW7%O2=MFFD7ST11NW7%O3=MFFD7NNT11NW7%O4=MFFD7ST11NW7%O5=MF
OS:FD7ST11NW7%O6=MFFD7ST11)WIN(W1=FFCB%W2=FFCB%W3=FFCB%W4=FFCB%W5=FFCB%W6=F
OS:FCB)ECN(R=Y%DF=Y%T=%W=FFD7%O=MFFD7NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=%S=O%
OS:A=S+%F=AS%RD=%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=%W=%S=A%A=Z%F=R%O=%RD=
OS:%Q=)T5(R=Y%DF=Y%T=%W=%S=Z%A=S+%F=AR%O=%RD=%Q=)T6(R=Y%DF=Y%T=%W=%S
OS:=A%A=Z%F=R%O=%RD=%Q=)T7(R=Y%DF=Y%T=%W=%S=Z%A=S+%F=AR%O=%RD=%Q=)U1(R
OS:=Y%DF=N%T=%IPL=%UN=%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N
OS:%T=%CD=S) Network Distance: hops OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: IP address ( host up) scanned in 11.79 seconds
对系统中的vhosts进行扫描:
[root@ok Desktop]# virsh list
Id Name State
----------------------------------------------------
c01 running#192.168.105
c02 running#192.168.1.103
1xp running#192.168.1.104
c01 c02为linux ,1xp为windows
[root@ok Desktop]# nmap -O 192.168.1.103 Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 13:38 CST
Nmap scan report for 192.168.1.103
Host is up (.00045s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open ssh
/tcp closed http
/tcp closed http-proxy
MAC Address: :::B3:: (QEMU Virtual NIC)
Device type: general purpose
Running (JUST GUESSING): Linux 2.6.X (%)
Aggressive OS guesses: Linux 2.6. (Fedora Core ) (%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: hop OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: IP address ( host up) scanned in 9.10 seconds
[root@ok Desktop]# nmap -O 192.168.1.105 Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 13:42 CST
Nmap scan report for 192.168.1.105
Host is up (.00041s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open ssh
MAC Address: :::ED:C2:DB (QEMU Virtual NIC)
Warning: OSScan results may be unreliable because we could not find at least open and closed port
Device type: specialized|WAP|general purpose
Running (JUST GUESSING): Crestron -Series (%), Netgear embedded (%), Linux 2.6.X (%)
Aggressive OS guesses: Crestron XPanel control system (%), Netgear DG834G WAP (%), Linux 2.6. - 2.6. (%), Linux 2.6. - 2.6. (%), Linux 2.6. (%), Linux 2.6. - 2.6. (%), Linux 2.6. - 2.6. (%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: hop OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: IP address ( host up) scanned in 9.22 seconds
[root@ok Desktop]# nmap -O 192.168.1.104 Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 13:43 CST
Nmap scan report for 192.168.1.104
Host is up (.00099s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open icslap
/tcp open ms-term-serv
MAC Address: :::C5::BD (QEMU Virtual NIC)
Warning: OSScan results may be unreliable because we could not find at least open and closed port
Device type: general purpose
Running: Microsoft Windows |XP
OS details: Microsoft Windows SP4, Microsoft Windows XP SP2 or SP3
Network Distance: hop OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: IP address ( host up) scanned in 6.66 seconds
对局域网内的手机ipd进行扫描,系统识别失败!!!
扫描一个范围内的目标(扫描ip地址为192.168.1.1-192.168.1.100内的所有主机)
nmap 192.168.1.1-100
[root@ok Desktop]# nmap 192.168.1.1- Starting Nmap 5.51 ( http://nmap.org ) at 2016-10-23 14:14 CST
Nmap scan report for 192.168.1.1
Host is up (.00022s latency).
Not shown: filtered ports, closed ports
PORT STATE SERVICE
/tcp open http
/tcp open upnp
MAC Address: EC::8F:::6C (Unknown) Nmap scan report for 192.168.1.14
Host is up (.0000040s latency).
Not shown: closed ports
PORT STATE SERVICE
/tcp open ssh
/tcp open rpcbind
/tcp open X11:
/tcp open X11: Nmap scan report for 192.168.1.100
Host is up (.0013s latency).
All scanned ports on 192.168.1.100 are closed
MAC Address: ::AD:::E7 (Unknown) Nmap scan report for 192.168.1.101
Host is up (.12s latency).
All scanned ports on 192.168.1.101 are filtered
MAC Address: :2A::8F:D9:2D (Unknown) Nmap scan report for 192.168.1.102
Host is up (.075s latency).
All scanned ports on 192.168.1.102 are filtered
MAC Address: EC:F3:5B::: (Unknown) Nmap scan report for 192.168.1.103
Host is up (.00037s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open ssh
/tcp closed http
/tcp closed http-proxy
MAC Address: :::B3:: (QEMU Virtual NIC) Nmap scan report for 192.168.1.104
Host is up (.00064s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open icslap
/tcp open ms-term-serv
MAC Address: :::C5::BD (QEMU Virtual NIC) Nmap scan report for 192.168.1.105
Host is up (.00039s latency).
Not shown: filtered ports
PORT STATE SERVICE
/tcp open ssh
MAC Address: :::ED:C2:DB (QEMU Virtual NIC) Nmap done: IP addresses ( hosts up) scanned in 40.97 seconds
端口扫描之王-----------nmap的更多相关文章
- 端口扫描之王——nmap入门精讲(一)
端口扫描在百度百科上的定义是: 端口扫描是指某些别有用心的人发送一组端口扫描消息,试图以此侵入某台计算机,并了解其提供的计算机网络服务类型(这些网络服务均与端口号相关),但是端口扫描不但可以为黑客所利 ...
- 端口扫描之王——nmap入门精讲(转)
端口扫描在百度百科上的定义是: 端口扫描是指某些别有用心的人发送一组端口扫描消息,试图以此侵入某台计算机,并了解其提供的计算机网络服务类型(这些网络服务均与端口号相关),但是端口扫描不但可以为黑客所利 ...
- 端口扫描之王——nmap入门精讲(二)
接着讲上节的内容,上节中提到了一个时间优化的问题是使用参数-n,通过不解析地址来进行优化时间的,但是优化时间的方法还有很多,比如说我们可以通过时间优化(0-5),指定单位时间内的探针数,设置组的大小 ...
- 端口扫描工具nmap
nmap 使用介绍 nmap是目前为止最广为使用的国外端口扫描工具之一.我们可以从[url]http://www.insecure.org/[/url]进行下载,可以很容易的安装到Windows和un ...
- 7.python实现高效端口扫描器之nmap模块
对于端口扫描,使用的最多的就是nmap这个工具,不想python已经强大到,提供了nmap这个扫描端口的模块. 本片文章主要介绍nmap模块的两个常用类: PortScanner()类,实现一个nma ...
- 端口扫描程序nmap使用手册
其实还是建议看英文的man,对以后学习其他东西很有帮助的:) 摘要 nmap是一个网络探测和安全扫描程序,系统管理者和个人可以使用这个软件扫描大型的网络,获取那台主机正在运行以及提供什么服务等 ...
- 端口扫描工具nmap的常用参数讲解
转载请注明出处:https://www.cnblogs.com/wangyanzhong123/p/12576406.html nmap下载与安装 这个没什么好说的.很简单官网上下载就ok了,需要注意 ...
- 端口扫描工具 nmap 使用手册
0x00 主机发现 -sL 仅仅是显示,扫描的IP数目,不会进行任何扫描 -sn ping扫描,即主机发现 -Pn 不检测主机存活 -PS/PA/PU/PY[portlist] TCP SYN Pin ...
- 端口扫描命令nmap
转:http://www.osyunwei.com/archives/2004.html 下面教大家在CentOS中用nmap查看主机端口: 一.安装nmap yum install nmap -y ...
随机推荐
- mysql 按距离今日时间最近排序
xxx order by abs(DATEDIFF(time_start,now()))
- web安全及防护
本文将对web方面的安全问题以及相应的防护方法进行一个简单的介绍. SQL注入(SQL Injection) 原理:就是通过把SQL命令插入到Web表单递交或输入域名或页面请求的查询字符串,最终达到欺 ...
- HTTP头部详解
因为之后的HTTP头注入要学习这些所以就看了.觉得很不错,算是学习前的科普. <HTTP头部详解>转载自:http://www.cnblogs.com/lcamry/p/5763040.h ...
- TO BE OPEN
我们通常都在一个很狭隘的世界里. 却以为我们有了整个蓝天.
- MappingJacksonHttpMessageConverter过期
最新在做一个SSM整合学习项目,maven加上jackson库,spring配置json,tomcat不能正常部署启动 Maven配置 <!-- 引入jackson,防止ajax调用返回json ...
- PHP使用curl替代file_get_contents
初学php的朋友们,很容易翻一个错误,在写采集程序或者调用api接口总会有线考虑到使用file_get_contents函数来或许内容,程序的访问量不大倒是没什么影响,但是访问量提升了那非常的悲剧了, ...
- ajax调用aspx.cs中的WebMethod
前台: <script language="javascript" src="../js/jquery-1.8.2.js"></script& ...
- iOS drawRect 和 awakeFromNib
今天想在一个view上绘制一个虚线边框,百度到的代码如下: CAShapeLayer *borderLayer = [CAShapeLayer layer]; borderLayer.frame = ...
- reportng的使用
1.首先安装testng 2.下载reportng jar包 http://pan.baidu.com/s/1i3KdlQH 3.添加到project build path 注意:需要同时引入goog ...
- ada 图形编辑器 - GNAT GPL
The GNAT GPL and SPARK GPL Editions are made available to the free software developers by AdaCore. T ...