Network Security - Active Information Collection Service Scan next chapter to chapter 2

NMAP

Nmap in a secret way, to avoid the intrusion detection system monitoring, to scan your computer online open network ports in order to achieve intelligence gathering capabilities.

amap –B IP port

-B options for concealed crawl banner.

image

NC

nc –nv IP port

image

Banner acquired by obtaining information is limited, and easy to be misled safety program, only as part of the reference.

nmap according to the response characteristics of the analysis more powerful recognition service

nmap port to identify the services running through the rear of the fingerprint information (the most common)

By fingerprint information to verify the reliability is high, even if modify high ports can easily detect.

nmap IP –p port –sV

image

image

image

amap also be based on identification of ways to get to the destination port information but the result is more rich content inferior to nmap

amap IP port

Options: -q does not show off the port and display the results unidentified port

           -b combined Banner get scan results

image

Guess you like

Origin www.cnblogs.com/lqinghua/p/11286166.html