搜索
首页运维安全网络安全审计工具Nmap如何使用

一.软件下载

https://nmap.org/download.html

二.扫描IP

nmap 192.168.1.10                       #扫描单IP

nmap 192.168.1.10-100                #扫描IP段

nmap 192.168.1.10 192.168.1.11   #扫描单独的多IP

nmap 192.168.1.1/24                    #扫描整个网段

nmap  -iL  list.txt                          #根据文件列表扫描

#list.txt

192.168.1.20

192.168.1.21  

nmap -iR 3                                   # 随机扫描3个IP

nmap 192.168.1.10-100 --exclude 192.168.1.20      #排除指定IP 

nmap 192.168.1.1/24 --excludefile list.txt          #从文件中取出排除IP

nmap -A 192.168.1.10       #-A将绝大多数有用的扫描命令集成在一起   

-o 用来识别远程操作系统 

-sC 用来运行默认的脚本扫描

-Pn         #Ping No不用ping 扫描

-sP          #simple Ping 简单嗅探一个网络里面的在线主机

-PS          #用ping 进行扫描  

-PU         #嗅控UDP

-p            # 0-65535  #指定端口

-PA         # ACK协议

-PY          #CTP协议

-PE         #不带参数默认的方式  ICMP

-PP         #ICMP时间戳嗅控命令,用来嗅探被防火墙保护的目标

-PO1,2,3      #选择不同协议扫描1是ICMP  2 IGMP  4 IP

 --traceroute IP      #路由过程

-R     #DNS反向查的

nmap --system-dns 192.168.1.10   #使用主机系统各DNS自己的解析器

nmap --dns-servers 202.103.24.68 192.168.1.10    #指定DNS服务器

nmap -sL 192.168.1/24        #快速得到主机列表

-sS      #TCP SYN 扫描

-sT      #

Nmap 7.70 ( https://nmap.org )

Usage: nmap [Scan Type(s)] [Options] {target specification}

TARGET SPECIFICATION:

  Can pass hostnames, IP addresses, networks, etc.

  Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254

  -iL : Input from list of hosts/networks

  -iR : Choose random targets

  --exclude : Exclude hosts/networks

  --excludefile : Exclude list from file

HOST DISCOVERY:

  -sL: List Scan - simply list targets to scan

  -sn: Ping Scan - disable port scan

  -Pn: Treat all hosts as online -- skip host discovery

  -PS/PA/PU/PY[portlist]: TCP SYN/ACK, UDP or SCTP discovery to given ports

  -PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes

  -PO[protocol list]: IP Protocol Ping

  -n/-R: Never do DNS resolution/Always resolve [default: sometimes]

  --dns-servers : Specify custom DNS servers

  --system-dns: Use OS's DNS resolver

  --traceroute: Trace hop path to each host

SCAN TECHNIQUES:

  -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans

  -sU: UDP Scan

  -sN/sF/sX: TCP Null, FIN, and Xmas scans

  --scanflags : Customize TCP scan flags

  -sI : Idle scan

  -sY/sZ: SCTP INIT/COOKIE-ECHO scans

  -sO: IP protocol scan   开通协议扫描

  -b : FTP bounce scan

PORT SPECIFICATION AND SCAN ORDER:

  -p : Only scan specified ports 指定扫描的端口

    Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080,S:9

  --exclude-ports : Exclude the specified ports from scanning

  -F: Fast mode - Scan fewer ports than the default scan 快速扫描1000多个常用端口

  -r: Scan ports consecutively - don't randomize

  --top-ports : Scan most common ports

  --port-ratio : Scan ports more common than

SERVICE/VERSION DETECTION:

  -sV: Probe open ports to determine service/version info

  --version-intensity : Set from 0 (light) to 9 (try all probes)

  --version-light: Limit to most likely probes (intensity 2)

  --version-all: Try every single probe (intensity 9)

  --version-trace: Show detailed version scan activity (for debugging)

SCRIPT SCAN:

  -sC: equivalent to --script=default

  --script=: is a comma separated list of

           directories, script-files or script-categories

  --script-args=: provide arguments to scripts

  --script-args-file=filename: provide NSE script args in a file

  --script-trace: Show all data sent and received

  --script-updatedb: Update the script database.

  --script-help=: Show help about scripts.

            is a comma-separated list of script-files or

           script-categories.

OS DETECTION:

  -O: Enable OS detection

  --osscan-limit: Limit OS detection to promising targets

  --osscan-guess: Guess OS more aggressively

TIMING AND PERFORMANCE:

  Options which take

  's' (seconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m).

  -T<0-5>: Set timing template (higher is faster)

  --min-hostgroup/max-hostgroup : Parallel host scan group sizes

  --min-parallelism/max-parallelism : Probe parallelization

  --min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout

      probe round trip time.

  --max-retries : Caps number of port scan probe retransmissions.

  --host-timeout

  --scan-delay/--max-scan-delay

  --min-rate : Send packets no slower than per second

  --max-rate : Send packets no faster than per second

FIREWALL/IDS EVASION AND SPOOFING:

  -f; --mtu : fragment packets (optionally w/given MTU)

  -D : Cloak a scan with decoys

  -S : Spoof source address

  -e : Use specified interface

  -g/--source-port : Use given port number

  --proxies : Relay connections through HTTP/SOCKS4 proxies

  --data : Append a custom payload to sent packets

  --data-string : Append a custom ASCII string to sent packets

  --data-length : Append random data to sent packets

  --ip-options : Send packets with specified ip options

  --ttl : Set IP time-to-live field

  --spoof-mac : Spoof your MAC address

  --badsum: Send packets with a bogus TCP/UDP/SCTP checksum

OUTPUT:

  -oN/-oX/-oS/-oG : Output scan in normal, XML, s|

and Grepable format, respectively, to the given filename.

-oA : Output in the three major formats at once

  -v: Increase verbosity level (use -vv or more for greater effect)

  -d: Increase debugging level (use -dd or more for greater effect)

  --reason: Display the reason a port is in a particular state

  --open: Only show open (or possibly open) ports

  --packet-trace: Show all packets sent and received

  --iflist: Print host interfaces and routes (for debugging)

  --append-output: Append to rather than clobber specified output files

  --resume : Resume an aborted scan

  --stylesheet : XSL stylesheet to transform XML output to HTML

  --webxml: Reference stylesheet from Nmap.Org for more portable XML

  --no-stylesheet: Prevent associating of XSL stylesheet w/XML output

MISC:

  -6: Enable IPv6 scanning

  -A: Enable OS detection, version detection, script scanning, and traceroute

  --datadir : Specify custom Nmap data file location

  --send-eth/--send-ip: Send using raw ethernet frames or IP packets  隐藏IP

  --privileged: Assume that the user is fully privileged

  --unprivileged: Assume the user lacks raw socket privileges

  -V: Print version number

  -h: Print this help summary page.

EXAMPLES:

  nmap -v -A scanme.nmap.org

  nmap -v -sn 192.168.0.0/16 10.0.0.0/8

  nmap -v -iR 10000 -Pn -p 80

以上是网络安全审计工具Nmap如何使用的详细内容。更多信息请关注PHP中文网其他相关文章!

声明
本文转载于:亿速云。如有侵权,请联系admin@php.cn删除

热AI工具

Undresser.AI Undress

Undresser.AI Undress

人工智能驱动的应用程序,用于创建逼真的裸体照片

AI Clothes Remover

AI Clothes Remover

用于从照片中去除衣服的在线人工智能工具。

Undress AI Tool

Undress AI Tool

免费脱衣服图片

Clothoff.io

Clothoff.io

AI脱衣机

AI Hentai Generator

AI Hentai Generator

免费生成ai无尽的。

热门文章

R.E.P.O.能量晶体解释及其做什么(黄色晶体)
3 周前By尊渡假赌尊渡假赌尊渡假赌
R.E.P.O.最佳图形设置
3 周前By尊渡假赌尊渡假赌尊渡假赌
R.E.P.O.如果您听不到任何人,如何修复音频
3 周前By尊渡假赌尊渡假赌尊渡假赌
WWE 2K25:如何解锁Myrise中的所有内容
3 周前By尊渡假赌尊渡假赌尊渡假赌

热工具

WebStorm Mac版

WebStorm Mac版

好用的JavaScript开发工具

禅工作室 13.0.1

禅工作室 13.0.1

功能强大的PHP集成开发环境

SublimeText3 英文版

SublimeText3 英文版

推荐:为Win版本,支持代码提示!

SublimeText3 Mac版

SublimeText3 Mac版

神级代码编辑软件(SublimeText3)

DVWA

DVWA

Damn Vulnerable Web App (DVWA) 是一个PHP/MySQL的Web应用程序,非常容易受到攻击。它的主要目标是成为安全专业人员在合法环境中测试自己的技能和工具的辅助工具,帮助Web开发人员更好地理解保护Web应用程序的过程,并帮助教师/学生在课堂环境中教授/学习Web应用程序安全。DVWA的目标是通过简单直接的界面练习一些最常见的Web漏洞,难度各不相同。请注意,该软件中