Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon to discover hosts and services on a computer network to create a "map" of the network. To achieve its goals, Nmap sends specific packets to the target host and then analyzes the response. NMAP is a powerful network tool used to enumerate and test networks.
Usage:
Pure scanning of Nmap (Recommended learning: PHP video tutorial )
By default, nmap will issue an arp ping scan (-sP if the switch is committed), and it will also scan open ports for specific targets in the range 1-10000
The syntax of the following command is as follows:
nmap <目标IP地址>
Where: target IP address = the specified IP of your target machine
(nmap 10.1.1.254)
NMAP normal scan increases the output verbosity (very detailed )
The following command has the following syntax:
nmap -vv 10.1.1.254
where: -vv = switch to activate very detailed settings required for logging
your scan entries
(nmap -vv10.1.1.254)
Nmap’s Custom Port Scan
Nmap’s scan ranges from 1-10000 ports by default. To be more specific about which ports to scan, we will Use the -p switch to specify our port scan range, the advantage is that it will scan a smaller number of ports faster than the predefined default
Syntax:
nmap -p(范围)<目标IP>
Where: -P is the port switch (range) is the port number from 1-65535
(Scan from port range 1-50)
More PHP related technical articles, Please visit the PHP Graphic Tutorial column to learn!
The above is the detailed content of How to use nmap. For more information, please follow other related articles on the PHP Chinese website!