nmap port scanning tool

nmap tool introduced

I. Introduction

nmap: that is, Network Mapper, is the first under the Linux network scanning and sniffing tool kit.

a network connection is nmap scanning software, used to scan the Internet computer network connection open. Determine which services to run in what connection, and infers which computer is running the operating system (which is also known as fingerprinting). It is one of the network administrator will use the software, as well as to assess the network security system.
As with most tools are used for network security, nmap is a lot of hackers and hacker (also known as script kiddies) like to use the tool. System administrators can use nmap to detect unauthorized use of the work environment of the server, but hackers will use nmap to collect the target computer's network settings so that the planned method of attack.
Nmap is often assess vulnerabilities with software Nessus  confused. Nmap in a secret way, to avoid the intrusion detection system monitoring, and does not affect the daily operations of the target system as much as possible.

Second, the function

  (1), to detect a group of hosts are online

  (2), the host port scanning, sniffing the network services provided

  (3) infer the operating system used by the host 

Third, the installation

Fourth, the use

1, nmap simple scanning

nmap default send an ARP PING packet and to detect the target host in the range of 1-10000 open all ports

Command Syntax: 
nmap < target ip address >

Where: target ip address is ip address of the target host scanning

Examples: nmap 10.0.0.55

###############

Scanning multiple targets

nmap 192.168.1.2 192.168.1.5

2, nmap scanning is simple, and the results returned output detailed description

Command syntax: NAMP -vv < target ip address >

Introduction: -vv detailed parameters of the output results

Examples: nmap -vv 10.0.0.55

3, nmap custom scan

Command Syntax: nmap -p (the Range) < target IP >

Introduction: (range) is a range of ports to be scanned, the port size can not exceed 65535

Example: scanning the target host port number 1-50

nmap -p50-80 10.0.0.55

##############

80,21,23 port, the scanning order follows a particular host

nmap -p80,21,23 192.168.31.136

4, nmap port scan specified

Command Syntax: nmap -p (port1, port2, ...) < target IP >

Description: port1, port2 ... port number you want to scan

Example: scanning the target host port 80,443,801

nmap -p80,443,801 10.0.0.55

5, nmap ping scan

nmap scanning may be performed in similar manner using ping windows / linux system

Command Syntax: nmap -sP < target ip >

Examples: nmap sP 10.1.112.89

6, nmap Traceroute

Router tracking, can help network administrators understand network traffic situation, but also a very good network management aid, through the router can easily track the investigation often between network nodes from our location to the destination computer, and you can see by the time it takes for each node

Command Syntax: 
nmap -traceroute < target IP >

Examples: namp -traceroute 8.8.8.8 (geogle dns server ip)

7, ip under nmap scanning is provided a network

Command Syntax: 
nmap -sP < Network address > < / CIDR >

Introduction: CIDR subnet mask set (/ 24, / 16, / 8, etc.)

Examples: nmap -sP 10.1.1.0 / 24

8, detection of target host operating system:
nmap -O 192.168.1.19
nmap -A 192.168.1.19
9. See nearby computer IP 

nmap -sn 192.168.88.0/24 # See nearby computer's IP
nmap scan -sV 192.168.88.2 # IP port development

10, nmap command hybrid scanning

-A similar parameters can be done to complete the function, but can refine our demand requirements

Command Syntax: 
nmap -vv -p1-100 -O < target ip >

Examples: 
nmap -vv -p1-100 -O 10.1.112.89

 

Transfer: https: //www.cnblogs.com/haiyan123/p/9007928.html

Guess you like

Origin www.cnblogs.com/liulj0713/p/11286512.html