Nmap是一个开源的网络连接端口扫描软件(内置于kali中)
打开Nmap:
> nmap
打开桌面化Nmap——zenmap:
> zenmap
Nmap支持多种扫描方式,用法简单,参数丰富:
案例一:扫描指定的IP所开方的的端口
> nmap -sS -p 1-65535 -v 192.168.2.129
上述命令:表示使用半开扫描,指定端口1-65535,显示扫描过程
root@kali:~# nmap -sS -p 1-65535 -v 192.168.2.129 Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-22 12:34 CST Initiating ARP Ping Scan at 12:34 Scanning 192.168.2.129 [1 port] Completed ARP Ping Scan at 12:34, 0.03s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 12:34 Completed Parallel DNS resolution of 1 host. at 12:34, 0.00s elapsed Initiating SYN Stealth Scan at 12:34 Scanning 0XMirror.lan (192.168.2.129) [65535 ports] Discovered open port 3389/tcp on 192.168.2.129 Discovered open port 445/tcp on 192.168.2.129 Discovered open port 443/tcp on 192.168.2.129 Discovered open port 135/tcp on 192.168.2.129 Discovered open port 139/tcp on 192.168.2.129 Discovered open port 49668/tcp on 192.168.2.129 Discovered open port 49676/tcp on 192.168.2.129 Discovered open port 49690/tcp on 192.168.2.129 Discovered open port 49665/tcp on 192.168.2.129 Discovered open port 49683/tcp on 192.168.2.129 Discovered open port 903/tcp on 192.168.2.129 Discovered open port 913/tcp on 192.168.2.129 Discovered open port 49666/tcp on 192.168.2.129 Discovered open port 5040/tcp on 192.168.2.129 Discovered open port 5646/tcp on 192.168.2.129 Discovered open port 28653/tcp on 192.168.2.129 Discovered open port 49664/tcp on 192.168.2.129 Discovered open port 49667/tcp on 192.168.2.129 Discovered open port 49677/tcp on 192.168.2.129 Completed SYN Stealth Scan at 12:34, 25.95s elapsed (65535 total ports) Nmap scan report for 0XMirror.lan (192.168.2.129) Host is up (0.00020s latency). Not shown: 65516 closed ports PORT STATE SERVICE 135/tcp open msrpc 139/tcp open netbios-ssn 443/tcp open https 445/tcp open microsoft-ds 903/tcp open iss-console-mgr 913/tcp open apex-edge 3389/tcp open ms-wbt-server 5040/tcp open unknown 5646/tcp open vfmobile 28653/tcp open unknown 49664/tcp open unknown 49665/tcp open unknown 49666/tcp open unknown 49667/tcp open unknown 49668/tcp open unknown 49676/tcp open unknown 49677/tcp open unknown 49683/tcp open unknown 49690/tcp open unknown MAC Address: 4C:ED:FB:47:0A:D2 (Unknown) Read data files from: /usr/bin/../share/nmap Nmap done: 1 IP address (1 host up) scanned in 26.15 seconds Raw packets sent: 68562 (3.017MB) | Rcvd: 65536 (2.622MB)