In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/01 Report--
This article mainly explains "how to use the batch host service scanning tool nmap of Linux common network tools". Interested friends may wish to have a look. The method introduced in this paper is simple, fast and practical. Let's let the editor take you to learn "Linux common network tools how to use the batch host service scanning tool nmap"!
There are many powerful network scanning tools under Linux. Network scanning tools can be divided into host scanning, host service scanning, routing scanning and so on.
Common host scanning and routing scanning tools have been written before, and nmap supports batch host scanning and host service scanning.
The installation of nmap directly uses: yum install nmap.
ICMP scan of nmap
Nmap can use ICMP protocol to achieve the function of Ping, support batch host scanning, and be used to detect the survival status of hosts.
Using ICMP does not require the establishment of a three-way handshake compared to the TCP protocol, so it is faster, but some firewalls or operators cannot scan with ICMP shielded.
Common commands:
The code is as follows:
Nmap-sP 192.168.0.1 hand 24
Nmap-sP 192.168.0.*
Nmap-sP 192.168.0.1-255
TCP SYN scan of nmap
Nmap can support TCP semi-open scanning by sending TCP SYN packets to scan the open state of the host TCP port.
SYN scans are faster than fully open scans that complete a three-way handshake and are not easy to detect.
Nmap scans ports 1-1024 and other commonly used ports by default. If you want to scan other ports, you can specify them with the p option.
Common commands:
The code is as follows:
Nmap-sS 192.168.2.224
Nmap-sS 192.168.2.230-255
Nmap-sS-p 0-30000 192.168.2.230-255
TCP Connect scan of nmap
Nmap's Connect scan is detected by TCP's three-way handshake, so it is slower than SYN semi-open scan, but the result is more reliable.
The default scan port and port assignment are the same as SYN scan.
Common commands:
The code is as follows:
Nmap-sT 192.168.2.230-255
Nmap-sT-p 0-30000 192.168.2.230-255
UDP scan of nmap
Nmap also supports scanning of UDP ports.
UDP is less likely to be blocked by a firewall than TCP.
Common commands:
The code is as follows:
Nmap-sU 192.168.2.230-255
Nmap-sU-p 0-30000 192.168.2.230-255
At this point, I believe that everyone on the "Linux common network tools how to use the batch host service scanning tool nmap" have a deeper understanding, might as well to actual operation it! Here is the website, more related content can enter the relevant channels to inquire, follow us, continue to learn!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.