nmap基本使用方法
阿新 • • 發佈:2020-08-27
1、nmap簡單掃描 nmap預設傳送一個ARP的PING資料包,來探測目標主機1-10000範圍內所開放的所有埠 命令語法: nmap <target ip address> 其中:target ip address是掃描的目標主機的ip地址 例子:nmap 173.22.90.10 [root@docker-node4 ~]# nmap 173.22.90.10 PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 掃描出開放的埠
2、nmap簡單掃描,並對結果返回詳細的描述輸出 命令語法:namp -vv <target ip address> 介紹:-vv引數設定對結果的詳細輸出 例子:nmap -vv 173.22.90.10 效果如下: [root@docker-node4 ~]# nmap -vv 173.22.90.10 Starting Nmap 6.40 ( http://nmap.org ) at 2019-08-18 04:48 CST Initiating ARP Ping Scan at 04:48 Scanning 173.22.90.10 [1 port] Completed ARP Ping Scan at 04:48, 0.01s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 04:48 Completed Parallel DNS resolution of 1 host. at 04:48, 6.53s elapsed Initiating SYN Stealth Scan at 04:48 Scanning 173-22-90-10.client.mchsi.com (173.22.90.10) [1000 ports] Discovered open port 111/tcp on 173.22.90.10 Discovered open port 80/tcp on 173.22.90.10 Discovered open port 22/tcp on 173.22.90.10