Linux的shell编程前奏之常见网络管理命令实战六

                                                                                Linux的shell编程前奏之常见网络管理命令实战六

前言: nmap命令是一款开发源代码的网络探测和安全审核工具,是Network Mapper的缩写。其设计目标是快速地扫描大型网络。nmap可以发现网络上有哪些主机,主机提供了什么服务(应用程序名称和版本号),并探测操作系统的类型及版本信息。

1>如果系统没有nmap命令,则可以使用下面的命令来安装:

[root@lll bin]# yum -y install nmap
已加载插件:fastestmirror, langpacks
Repodata is over 2 weeks old. Install yum-cron? Or run: yum makecache fast
http://mirrors.cqu.edu.cn/CentOS/7.6.1810/os/x86_64/repodata/repomd.xml: [Errno 14] curl#56 - "Recv failure: Connection reset by peer"
正在尝试其它镜像。
base                                                                                     | 3.6 kB  00:00:00     
extras                                                                                   | 3.4 kB  00:00:00     
updates                                                                                  | 3.4 kB  00:00:00     
(1/2): extras/7/x86_64/primary_db                                                        | 179 kB  00:00:01     
(2/2): updates/7/x86_64/primary_db                                                       | 2.4 MB  00:01:29     
Determining fastest mirrors
 * base: mirrors.aliyun.com
 * extras: mirrors.aliyun.com
 * updates: centos.ustc.edu.cn
正在解决依赖关系
--> 正在检查事务
---> 软件包 nmap.x86_64.2.6.40-13.el7 将被 升级
---> 软件包 nmap.x86_64.2.6.40-16.el7 将被 更新
--> 正在处理依赖关系 nmap-ncat = 2:6.40-16.el7,它被软件包 2:nmap-6.40-16.el7.x86_64 需要
--> 正在检查事务
---> 软件包 nmap-ncat.x86_64.2.6.40-13.el7 将被 升级
---> 软件包 nmap-ncat.x86_64.2.6.40-16.el7 将被 更新
--> 解决依赖关系完成
依赖关系解决
================================================================================================================
 Package                    架构                    版本                            源                     大小
================================================================================================================
正在更新:
 nmap                       x86_64                  2:6.40-16.el7                   base                  3.9 M
为依赖而更新:
 nmap-ncat                  x86_64                  2:6.40-16.el7                   base                  206 k
事务概要
================================================================================================================
升级  1 软件包 (+1 依赖软件包)
总下载量:4.2 M
Downloading packages:
No Presto metadata available for base
(1/2): nmap-ncat-6.40-16.el7.x86_64.rpm                                                  | 206 kB  00:00:01     
(2/2): nmap-6.40-16.el7.x86_64.rpm                                                       | 3.9 MB  00:00:02     
----------------------------------------------------------------------------------------------------------------
总计                                                                            1.2 MB/s | 4.2 MB  00:00:03     
Running transaction check
Running transaction test
Transaction test succeeded
Running transaction
  正在更新    : 2:nmap-ncat-6.40-16.el7.x86_64                                                              1/4 
  正在更新    : 2:nmap-6.40-16.el7.x86_64                                                                   2/4 
  清理        : 2:nmap-6.40-13.el7.x86_64                                                                   3/4 
  清理        : 2:nmap-ncat-6.40-13.el7.x86_64                                                              4/4 
  验证中      : 2:nmap-ncat-6.40-16.el7.x86_64                                                              1/4 
  验证中      : 2:nmap-6.40-16.el7.x86_64                                                                   2/4 
  验证中      : 2:nmap-ncat-6.40-13.el7.x86_64                                                              3/4 
  验证中      : 2:nmap-6.40-13.el7.x86_64                                                                   4/4 
更新完毕:
  nmap.x86_64 2:6.40-16.el7                                                                                     
作为依赖被升级:
  nmap-ncat.x86_64 2:6.40-16.el7                                                                                
完毕!


2>nmap查看目标主机开发端口

[root@lll bin]# nmap 192.168.0.100
Starting Nmap 6.40 ( http://nmap.org ) at 2019-02-16 16:57 CST
Nmap scan report for 192.168.0.100 (192.168.0.100)
Host is up (0.00052s latency).
Not shown: 990 closed ports
PORT      STATE SERVICE
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
445/tcp   open  microsoft-ds
902/tcp   open  iss-realsecure
912/tcp   open  apex-mesh
3389/tcp  open  ms-wbt-server
49152/tcp open  unknown
49154/tcp open  unknown
49155/tcp open  unknown
49156/tcp open  unknown
MAC Address: 48:D2:24:2C:19:F8 (Liteon Technology)
Nmap done: 1 IP address (1 host up) scanned in 0.72 seconds

3>nmap扫描主机的指定端口

[root@lll bin]# nmap -p 200-500 192.168.0.100 
Starting Nmap 6.40 ( http://nmap.org ) at 2019-02-16 16:58 CST
Nmap scan report for 192.168.0.100 (192.168.0.100)
Host is up (0.00048s latency).
Not shown: 300 closed ports
PORT    STATE SERVICE
445/tcp open  microsoft-ds
MAC Address: 48:D2:24:2C:19:F8 (Liteon Technology)
Nmap done: 1 IP address (1 host up) scanned in 0.42 seconds


4>扫描局域网内所有ip

[root@lll /]# nmap 192.168.0.0/24            
Starting Nmap 6.40 ( http://nmap.org ) at 2019-02-16 17:08 CST
Nmap scan report for 192.168.0.1 (192.168.0.1)
Host is up (0.0045s latency).
Not shown: 998 filtered ports
PORT     STATE SERVICE
80/tcp   open  http
1900/tcp open  upnp
MAC Address: 20:6B:E7:72:8D:D5 (Unknown)
Nmap scan report for 192.168.0.100 (192.168.0.100)
Host is up (0.0012s latency).
Not shown: 990 closed ports
PORT      STATE SERVICE
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
445/tcp   open  microsoft-ds
902/tcp   open  iss-realsecure
912/tcp   open  apex-mesh
3389/tcp  open  ms-wbt-server
49152/tcp open  unknown
49154/tcp open  unknown
49155/tcp open  unknown
49156/tcp open  unknown
MAC Address: 48:D2:24:2C:19:F8 (Liteon Technology)
Nmap scan report for 192.168.0.101 (192.168.0.101)
Host is up (0.032s latency).
Not shown: 999 closed ports
PORT      STATE SERVICE
55555/tcp open  unknown
MAC Address: 70:D9:23:B8:DA:A7 (Unknown)
Nmap scan report for 192.168.0.103 (192.168.0.103)
Host is up (0.019s latency).
All 1000 scanned ports on 192.168.0.103 (192.168.0.103) are closed
MAC Address: 34:79:16:56:DC:DA (Unknown)
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
Nmap scan report for 192.168.0.104 (192.168.0.104)
Host is up (0.000062s latency).
Not shown: 996 closed ports
PORT    STATE SERVICE
21/tcp  open  ftp
22/tcp  open  ssh
80/tcp  open  http
111/tcp open  rpcbind


5>探测目标主机的服务和操作系统的版本

[root@lll /]# nmap -O -sV 192.168.0.100             
Starting Nmap 6.40 ( http://nmap.org ) at 2019-02-16 17:11 CST
Nmap scan report for 192.168.0.100 (192.168.0.100)
Host is up (0.0012s latency).
Not shown: 990 closed ports
PORT      STATE SERVICE         VERSION
135/tcp   open  msrpc           Microsoft Windows RPC
139/tcp   open  netbios-ssn
445/tcp   open  netbios-ssn
902/tcp   open  ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP)
912/tcp   open  vmware-auth     VMware Authentication Daemon 1.0 (Uses VNC, SOAP)
3389/tcp  open  ms-wbt-server   Microsoft Terminal Service
49152/tcp open  msrpc           Microsoft Windows RPC
49154/tcp open  msrpc           Microsoft Windows RPC
49155/tcp open  msrpc           Microsoft Windows RPC
49156/tcp open  msrpc           Microsoft Windows RPC
MAC Address: 48:D2:24:2C:19:F8 (Liteon Technology)
Device type: general purpose
Running: Microsoft Windows Vista
OS CPE: cpe:/o:microsoft:windows_vista
OS details: Microsoft Windows Vista
Network Distance: 1 hop
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 56.84 seconds


6>写一个shell脚本,判断192.168.0.0/24网络里,当前在线的ip有哪些?(扫描网络内存活主机)

方法一:
#!/bin/sh
 CMD="ping -W 2 -c 2"
 Ip="192.168.0."
        for n in $(seq 254)----------正确的说法是:根据IP地址和子网掩码进行计算,IP地址所在网段的首位和末尾分别是网段地址和广播地址,不能使用。
        do
           {
                $CMD $Ip$n &>/dev/null
                if [ $? -eq 0 ];then
                        echo "$Ip$n is ok"
                fi
                }&
        done
方法二:
 #!/bin/sh
 CMD="nmap -sP"
 Ip="192.168.0.0/24"
 $CMD $Ip|awk '/Nmap scan report for/ {print $NF}'   ##/Nmap scan report for/ 表示匹配到该字段所在的行;$NF 表示匹配最后一列

 




















猜你喜欢

转载自blog.51cto.com/11218855/2350986