---恢复内容开始---

[root@miyan ~]# nmap -v

Starting Nmap 7.12 ( https://nmap.org ) at 2016-04-04 15:34 CST
Read data files from: /usr/bin/../share/nmap
WARNING: No targets were specified, so 0 hosts scanned.
Nmap done: 0 IP addresses (0 hosts up) scanned in 0.07 seconds
           Raw packets sent: 0 (0B) | Rcvd: 0 (0B)

       nmap用于探查网络、执行安全扫描、网络核查并且在远程机器上找出开放端口。它可以扫描在线的主机、操作系统、包过滤器和远程主机上的开放端口。

nmap命令格式:

Usage: nmap [Scan Type(s)] [Options] {target specification}

1.使用主机名扫描:

 

玩玩nmap

2.使用IP扫描

玩玩nmap

2.使用-v选项可以给出更详细信息

玩玩nmap

3.扫描多台主机。nmap后面写上多个IP地址或者主机名

玩玩nmap

4.使用通配符来使nmap扫描整个子网或者IP段

[root@miyan ~]# nmap 172.18.16.*

耗时太久

5.使用IP地址的最后一段扫描多台主机

[root@miyan ~]# nmap 172.18.16.201,202,203

Starting Nmap 7.12 ( https://nmap.org ) at 2016-04-04 16:26 CST
Nmap scan report for 172.18.16.203
Host is up (0.012s latency).
Not shown: 994 filtered ports
PORT      STATE SERVICE
22/tcp    open  ssh
80/tcp    open  http
111/tcp   open  rpcbind
443/tcp   open  https
5120/tcp  open  unknown
50000/tcp open  ibm-db2

Nmap done: 3 IP addresses (1 host up) scanned in 6.20 seconds

6.从文件中扫描主机列表

将主机名或者IP写到一个文件中,可以直接让nmap读取并执行扫描。

[root@miyan ~]# cat test.txt 
172.18.16.201
172.18.16.202
172.18.16.203

执行扫描,使用-iL参数

[root@miyan ~]# nmap -iL test.txt 

Starting Nmap 7.12 ( https://nmap.org ) at 2016-04-04 16:43 CST
Nmap scan report for 172.18.16.203
Host is up (0.015s latency).
Not shown: 994 filtered ports
PORT      STATE SERVICE
22/tcp    open  ssh
80/tcp    open  http
111/tcp   open  rpcbind
443/tcp   open  https
5120/tcp  open  unknown
50000/tcp open  ibm-db2

Nmap done: 3 IP addresses (1 host up) scanned in 6.08 seconds

7.扫描一个IP段

[root@miyan ~]# nmap 172.18.16.200-220

Starting Nmap 7.12 ( https://nmap.org ) at 2016-04-04 16:46 CST
Nmap scan report for 172.18.16.203
Host is up (0.084s latency).
Not shown: 994 filtered ports
PORT      STATE SERVICE
22/tcp    open  ssh
80/tcp    open  http
111/tcp   open  rpcbind
443/tcp   open  https
5120/tcp  open  unknown
50000/tcp open  ibm-db2

Nmap scan report for 172.18.16.205
Host is up (0.074s latency).
Not shown: 997 filtered ports
PORT     STATE SERVICE
80/tcp   open  http
3306/tcp open  mysql
3389/tcp open  ms-wbt-server

Nmap scan report for 172.18.16.209
Host is up (0.041s latency).
Not shown: 995 filtered ports
PORT      STATE SERVICE
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
445/tcp   open  microsoft-ds
3389/tcp  open  ms-wbt-server
10000/tcp open  snet-sensor-mgmt

Nmap scan report for 172.18.16.214
Host is up (0.052s latency).
Not shown: 993 filtered ports
PORT      STATE SERVICE
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
445/tcp   open  microsoft-ds
2869/tcp  open  icslap
3389/tcp  open  ms-wbt-server
5357/tcp  open  wsdapi
10243/tcp open  unknown

Nmap scan report for 172.18.16.218
Host is up (0.0043s latency).
All 1000 scanned ports on 172.18.16.218 are filtered

Nmap done: 21 IP addresses (5 hosts up) scanned in 31.94 seconds
View Code

相关文章: