Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Ten scanning commands commonly used in nmap

2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

NMap, also known as Network Mapper, is the network scanning and sniffing toolkit under Linux.

Nmap is a powerful scanner that is often used in network security testing. It is self-evident that the function is powerful. Here are some of its scanning commands. Specifically, it is up to everyone to learn by themselves, because it is too powerful.

1) obtain the system type and open port of the remote host

Nmap-sS-P0-sV-O

Here

< target >

It can be a single IP, or hostname, or domain name, or subnet

-sS TCP SYN scan (also known as semi-open, or stealth scan)

-P0 allows you to turn off ICMP pings.

-sV open system version detection

-O attempts to identify the remote operating system

Other options:

-A turn on operating system fingerprint and version detection at the same time

-v output the scan in detail.

Nmap-sS-P0-A-v

< target >

2) list the hosts with the specified ports open

Nmap-sT-p 80-oG-192.168.1.* | grep open

3) find all online hosts on the network

Nmap-sP 192.168.0.*

Or you can use the following command:

Nmap-sP 192.168.0.0 Universe 24

Specify subnet

4) IP address within the specified range of Ping

Nmap-sP 192.168.1.100-254

5) search for unoccupied IP on a certain subnet

Nmap-T4-sP 192.168.2.0 Plus 24 & & egrep "00 proc/net/arp 00" / proc/net/arp

6) scan the local area network for Conficker worm

Nmap-PN-T4-p139445-n-v-script=smb-check-vulns-script-args safe=1 192.168.0.1-254

7) scan the network for malicious access points (rogue APs).

Nmap-A-p1-85 max-rtt-timeout 113, 443, 8080-8100-T4-min-hostgroup 50-max-rtt-timeout

2000-initial-rtt-timeout 300-max-retries 3-host-timeout 20m

-max-scan-delay 1000-oA wapscan 10.0.0.0 Universe 8

8) use bait scanning method to scan the host port

Sudo nmap-sS 192.168.0.10-D 192.168.0.2

9) list reverse DNS records for a subnet

Nmap-R-sL 209.85.229.99 print 27 | awk'{if ($3 million = "not") print "(" $2 ") no PTR"; else print$3 "is" $2}'| grep'('

10) how many Linux and Win devices are displayed on the network?

Sudo nmap-F-O 192.168.0.1-255 | grep "Running:" > / tmp/os; echo "$(cat / tmp/os | grep Linux | wc-l) Linux device (s)"; echo "$(cat / tmp/os | grep Windows | wc-l) Window (s) device"

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report