网络安全审计工具Nmap如何使用,针对这个问题,这篇文章详细介绍了相对应的分析和解答,希望可以帮助更多想解决这个问题的小伙伴找到更简单易行的方法。
在马尾等地区,都构建了全面的区域性战略布局,加强发展的系统性、市场前瞻性、产品创新能力,以专注、极致的服务理念,为客户提供成都网站建设、网站制作 网站设计制作按需定制开发,公司网站建设,企业网站建设,高端网站设计,营销型网站建设,成都外贸网站建设公司,马尾网站建设费用合理。
一.软件下载
https://nmap.org/download.html
二.扫描IP
nmap 192.168.1.10 #扫描单IP
nmap 192.168.1.10-100 #扫描IP段
nmap 192.168.1.10 192.168.1.11 #扫描单独的多IP
nmap 192.168.1.1/24 #扫描整个网段
nmap -iL list.txt #根据文件列表扫描
#list.txt
192.168.1.20
192.168.1.21
nmap -iR 3 # 随机扫描3个IP
nmap 192.168.1.10-100 --exclude 192.168.1.20 #排除指定IP
nmap 192.168.1.1/24 --excludefile list.txt #从文件中取出排除IP
nmap -A 192.168.1.10 #-A将绝大多数有用的扫描命令集成在一起
-o 用来识别远程操作系统
-sC 用来运行默认的脚本扫描
-Pn #Ping No不用ping 扫描
-sP #simple Ping 简单嗅探一个网络里面的在线主机
-PS #用ping 进行扫描
-PU #嗅控UDP
-p # 0-65535 #指定端口
-PA # ACK协议
-PY #CTP协议
-PE #不带参数默认的方式 ICMP
-PP #ICMP时间戳嗅控命令,用来嗅探被防火墙保护的目标
-PO1,2,3 #选择不同协议扫描1是ICMP 2 IGMP 4 IP
--traceroute IP #路由过程
-R #DNS反向查的
nmap --system-dns 192.168.1.10 #使用主机系统各DNS自己的解析器
nmap --dns-servers 202.103.24.68 192.168.1.10 #指定DNS服务器
nmap -sL 192.168.1/24 #快速得到主机列表
-sS #TCP SYN 扫描
-sT #
Nmap 7.70 ( https://nmap.org )
Usage: nmap [Scan Type(s)] [Options] {target specification}
TARGET SPECIFICATION:
Can pass hostnames, IP addresses, networks, etc.
Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254
-iL
-iR
--exclude
--excludefile
HOST DISCOVERY:
-sL: List Scan - simply list targets to scan
-sn: Ping Scan - disable port scan
-Pn: Treat all hosts as online -- skip host discovery
-PS/PA/PU/PY[portlist]: TCP SYN/ACK, UDP or SCTP discovery to given ports
-PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes
-PO[protocol list]: IP Protocol Ping
-n/-R: Never do DNS resolution/Always resolve [default: sometimes]
--dns-servers
--system-dns: Use OS's DNS resolver
--traceroute: Trace hop path to each host
SCAN TECHNIQUES:
-sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans
-sU: UDP Scan
-sN/sF/sX: TCP Null, FIN, and Xmas scans
--scanflags
-sI
-sY/sZ: SCTP INIT/COOKIE-ECHO scans
-sO: IP protocol scan 开通协议扫描
-b
PORT SPECIFICATION AND SCAN ORDER:
-p
Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080,S:9
--exclude-ports
-F: Fast mode - Scan fewer ports than the default scan 快速扫描1000多个常用端口
-r: Scan ports consecutively - don't randomize
--top-ports
--port-ratio
SERVICE/VERSION DETECTION:
-sV: Probe open ports to determine service/version info
--version-intensity
--version-light: Limit to most likely probes (intensity 2)
--version-all: Try every single probe (intensity 9)
--version-trace: Show detailed version scan activity (for debugging)
SCRIPT SCAN:
-sC: equivalent to --script=default
--script=
directories, script-files or script-categories
--script-args=
--script-args-file=filename: provide NSE script args in a file
--script-trace: Show all data sent and received
--script-updatedb: Update the script database.
--script-help=
script-categories.
OS DETECTION:
-O: Enable OS detection
--osscan-limit: Limit OS detection to promising targets
--osscan-guess: Guess OS more aggressively
TIMING AND PERFORMANCE:
Options which take
's' (seconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m).
-T<0-5>: Set timing template (higher is faster)
--min-hostgroup/max-hostgroup
--min-parallelism/max-parallelism
--min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout
probe round trip time.
--max-retries
--host-timeout
--scan-delay/--max-scan-delay
--min-rate
--max-rate
FIREWALL/IDS EVASION AND SPOOFING:
-f; --mtu
-D
-S
-e
-g/--source-port
--proxies
--data
--data-string
--data-length
--ip-options
--ttl
--spoof-mac
--badsum: Send packets with a bogus TCP/UDP/SCTP checksum
OUTPUT:
-oN/-oX/-oS/-oG and Grepable format, respectively, to the given filename. -oA -v: Increase verbosity level (use -vv or more for greater effect) -d: Increase debugging level (use -dd or more for greater effect) --reason: Display the reason a port is in a particular state --open: Only show open (or possibly open) ports --packet-trace: Show all packets sent and received --iflist: Print host interfaces and routes (for debugging) --append-output: Append to rather than clobber specified output files --resume --stylesheet --webxml: Reference stylesheet from Nmap.Org for more portable XML --no-stylesheet: Prevent associating of XSL stylesheet w/XML output MISC: -6: Enable IPv6 scanning -A: Enable OS detection, version detection, script scanning, and traceroute --datadir
--send-eth/--send-ip: Send using raw ethernet frames or IP packets 隐藏IP --privileged: Assume that the user is fully privileged --unprivileged: Assume the user lacks raw socket privileges -V: Print version number -h: Print this help summary page. EXAMPLES: nmap -v -A scanme.nmap.org nmap -v -sn 192.168.0.0/16 10.0.0.0/8 nmap -v -iR 10000 -Pn -p 80 关于网络安全审计工具Nmap如何使用问题的解答就分享到这里了,希望以上内容可以对大家有一定的帮助,如果你还有很多疑惑没有解开,可以关注创新互联行业资讯频道了解更多相关知识。
分享文章:网络安全审计工具Nmap如何使用
文章分享:http://cdweb.net/article/pjggoh.html