In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >
Share
Shulou(Shulou.com)06/01 Report--
This article mainly explains "what is the use of Linux's nmap command". Interested friends may wish to have a look. The method introduced in this paper is simple, fast and practical. Let's let the editor take you to learn "what is the use of Linux's nmap command"?
Linux commonly used command nmap (Network Mapper-Network Mapper) command is used for network detection and security audit, is a network exploration tool and port scanner. Namp it can scan a single host, but also quickly scan large network structures.
Syntax format nmap [Scan Type...] [Options] {target specification} option description-O # activate probe operation-P0 # scan only, not ping host-PT # is the same as TCP ping-sV # display service version information-sP # ping scan Only find whether the target host is alive-ps # send synchronization (SYN) message-PU # send udp ping-PE # enforce direct ICMPping-PB # default mode-6 # use IPv6 address-v # details-d # output debugging information-A # use all advanced scanning options-resume # resume (continue last) aborted scan Trace-P # specifies the port to scan Can be one port, separate multiple ports with commas, and use "-" to indicate port range-e # in multiple network interface Linux systems Specify the network interface used for the scan-g # scan the specified port as the source port-- ttl # specify the lifetime of the scan message sent-- packet-trace # display the statistics of sending and receiving messages during the scan-- scanflags # set the TCP flag in the scan message-- send-eth/--send-ip # use the original Ethernet send / construct to specify the IP transmission application, for example, scan
[root@CentOS7-1] # nmap-A www.baidu.com Starting Nmap 6.40 (http://nmap.org) at 2021-03-13 04:30 EST Nmap scan report for www.baidu.com (36.152.44.95) Host is up (0.012s latency). Other addresses for www.baidu.com (not scanned): 36.152.44.96 Not shown: 998 filtered ports PORT STATE SERVICE VERSION 80/tcp open http-proxy sslstrip | _ http-methods: No Allow or Public header in OPTIONS response (status code 302) | http-robots.txt: 10 disallowed entries | / baidu / s? / ulink? / link? / home/news/data/ / bh / shifen/ | _ / homepage/ / cpro / | _ http-title: xE7x99xBExE5xBAxA6xE4xB8x80xE4xB8x8BxEFxBCx8CxE4xBDxA0xE5xB0xB1xE7x9FxA5xE9x81x93 443/tcp Open ssl/http-proxy sslstrip | _ http-methods: No Allow or Public header in OPTIONS response (status code 302) | http-robots.txt: 10 disallowed entries | / baidu / s? / ulink? / link? / home/news/data/ / bh / shifen/ | _ / homepage/ / cpro / | _ http-title: Site doesn't have a title (text/html). | ssl-cert: Subject: commonName=baidu.com/organizationName=Beijing Baidu Netcom Science Technology Co., Ltd/stateOrProvinceName=beijing/countryName=CN | Not valid before: 2020-04-02T06:04:58+00:00 | _ Not valid after: 2021-07-26T04:31:02+00:00 | _ ssl-date: 2021-03-16T03-16T03-16T03-16T03-16T03-16T03-14virtual 2100commonName=baidu.com/organizationName=Beijing Baidu Netcom Science Technology Co., Ltd/stateOrProvinceName=beijing/countryName=CN; + 2d17h53m18s from local time. | tls-nextprotoneg: _ http/1.1 Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: specialized | switch Running (JUST GUESSING): AVtech embedded (88%), HP embedded (86%) OS CPE: cpe:/h:hp:procurve_switch_4000m Aggressive OS guesses: AVtech Room Alert 26W environmental monitor (88%), HP 4000m ProCurve switch (J4121A) (86%) No exact OS matches for host (test conditions non-ideal). Network Distance: 10 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.97 ms 192.168.1.1 2 4.96 ms 100.106.0.1 3... 9 10 15.25 ms 36.152.44.95 OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/. Nmap done: 1 IP address (1 host up) scanned in 37.64 secondsTCP port scan
[root@CentOS7-1] # nmap-sT 192.168.1.100 Starting Nmap 6.40 (http://nmap.org) at 2021-03-13 04:32 EST Nmap scan report for 192.168.1.100 Host is up (0.00037s latency). Not shown: 999 closed ports PORT STATE SERVICE 22/tcp open ssh Nmap done: 1 IP address (1 host up) scanned in 0.07 seconds scan 1-65535
[root@CentOS7-1] # nmap-p 1-65535-T4-A-v 192.168.1.100 Starting Nmap 6.40 (http://nmap.org) at 2021-03-13 04:33 EST NSE: Loaded 110scripts for scanning. NSE: Script Pre-scanning. Initiating Parallel DNS resolution of 1 host. At 04:33 Completed Parallel DNS resolution of 1 host. At 04:33, 0.00s elapsed Initiating SYN Stealth Scan at 04:33 Scanning 192.168.1.100 [65535 ports] Discovered open port 22/tcp on 192.168.1.100 Discovered open port 19999/tcp on 192.168.1.100 Completed SYN Stealth Scan at 04:33, 6.82s elapsed (65535 total ports) Initiating Service scan at 04:33 Scanning 2 services on 192.168.1.100 Completed Service scan at 04:33 19.10s elapsed (2 services on 1 host) Initiating OS detection (try # 1) against 192.168.1.100 NSE: Script scanning 192.168.1.100. Initiating NSE at 04:34 Completed NSE at 04:34, 0.14s elapsed Nmap scan report for 192.168.1.100 Host is up (0.000032s latency). Not shown: 65533 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.4 (protocol 2.0) | ssh-hostkey: 2048 37:71:8e:4a:db:cc:ac:29:f2:a2:20:93:23:8c:f6:e8 (RSA) | _ 256cc:4b:7d:b6:59:0f:77:83:a9:a5:32:70:4e:87:0d:41 (ECDSA) 19999/tcp open unknown 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi: SF-Port19999-TCP:V=6.40%I=7%D=3/13%Time=604C86FA%P=x86_64-redhat-linux-gnu SF:%r (GenericLines,190, "HTTP/1.1x20400x20Badx20RequestrnConnection: SF:x20closernServer:x20NetDatax20Embeddedx20HTTPx20Serverx20v1.29 SF:.3rnAccess-Control-Allow-Origin:x20*rnAccess-Control-Allow-Creden SF:tials:x20truernContent-Type:x20text/plain" X20charset=utf-8rnDate SF::x20Sat,x2013x20Marx202021x2009:33:46x20GMTrnCache-Control:x20 SF:no-cache,x20no-store,x20must-revalidaternPragma:x20no-cachernExp SF:ires:x20Sat,x2013x20Marx202021x2009:33:47x20GMTrnContent-Length SF::x2027rnrnIx20don'tx20understandx20you...rn ") r (GetRequest SF:,5580," HTTP/1.1x20200x20OKrnConnection:x20closernServer:x20Net SF:Datax20Embeddedx20HTTPx20Serverx20v1.29.3rnAccess-Control-Allow SF:-Origin:x20*rnAccess-Control-Allow-Credentials:x20truernContent- SF:Type:x20text/html SF:x2014x20Marx202021x2009:33:46x20GMTrnContent-Length:x2085228rn SF:rnnetdatax20dash SF:board SF:UDP port scan [root@CentOS7-1 ~] # nmap-sU 192.168.1.100 Starting Nmap 6.40 (http://nmap.org) at 2021-03-13 04:34 EST Nmap scan report for 192.168.1.100 Host is up (0.0000040s latency). All 1000 scanned ports on 192.168.1.100 are closed Nmap done: 1 IP address (1 host up) scanned in 1.65 seconds here, I believe you have a deeper understanding of "what is the use of Linux's nmap command", you might as well do it in practice! Here is the website, more related content can enter the relevant channels to inquire, follow us, continue to learn!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.