Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to use the batch host service scanning tool nmap for common network tools in Linux

2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/01 Report--

This article mainly explains "how to use the batch host service scanning tool nmap of Linux common network tools". Interested friends may wish to have a look. The method introduced in this paper is simple, fast and practical. Let's let the editor take you to learn "Linux common network tools how to use the batch host service scanning tool nmap"!

There are many powerful network scanning tools under Linux. Network scanning tools can be divided into host scanning, host service scanning, routing scanning and so on.

Common host scanning and routing scanning tools have been written before, and nmap supports batch host scanning and host service scanning.

The installation of nmap directly uses: yum install nmap.

ICMP scan of nmap

Nmap can use ICMP protocol to achieve the function of Ping, support batch host scanning, and be used to detect the survival status of hosts.

Using ICMP does not require the establishment of a three-way handshake compared to the TCP protocol, so it is faster, but some firewalls or operators cannot scan with ICMP shielded.

Common commands:

The code is as follows:

Nmap-sP 192.168.0.1 hand 24

Nmap-sP 192.168.0.*

Nmap-sP 192.168.0.1-255

TCP SYN scan of nmap

Nmap can support TCP semi-open scanning by sending TCP SYN packets to scan the open state of the host TCP port.

SYN scans are faster than fully open scans that complete a three-way handshake and are not easy to detect.

Nmap scans ports 1-1024 and other commonly used ports by default. If you want to scan other ports, you can specify them with the p option.

Common commands:

The code is as follows:

Nmap-sS 192.168.2.224

Nmap-sS 192.168.2.230-255

Nmap-sS-p 0-30000 192.168.2.230-255

TCP Connect scan of nmap

Nmap's Connect scan is detected by TCP's three-way handshake, so it is slower than SYN semi-open scan, but the result is more reliable.

The default scan port and port assignment are the same as SYN scan.

Common commands:

The code is as follows:

Nmap-sT 192.168.2.230-255

Nmap-sT-p 0-30000 192.168.2.230-255

UDP scan of nmap

Nmap also supports scanning of UDP ports.

UDP is less likely to be blocked by a firewall than TCP.

Common commands:

The code is as follows:

Nmap-sU 192.168.2.230-255

Nmap-sU-p 0-30000 192.168.2.230-255

At this point, I believe that everyone on the "Linux common network tools how to use the batch host service scanning tool nmap" have a deeper understanding, might as well to actual operation it! Here is the website, more related content can enter the relevant channels to inquire, follow us, continue to learn!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report