欧美激情综合网_欧美激情视频网址_天天干天天干天天干_成人免费视频电影

< 返回

一次使用nmap掃描探測服務器端口的過程

2022-12-17 13:34 作者:joseph wu 閱讀量:8001

nmap是Linux下常用的端口掃描工具,它可以檢測主機是否在線,是否開啟了某個服務端口,使用了何種操作系統等。我經常用它來檢測遠程的Windows服務器的ip地址,因為不是固定ip地址,該服務器的ip地址會經常變化,但是有個規律,只在一個網段內變化,這樣就給ip地址的確定帶來了方便。

1. 如果沒有安裝nmap,就安裝

yum install -y nmap

2. 掃描指定網段的遠程桌面連接端口

nmap -sT -p3389 218.206.112.0/24

3. 如果覺得輸出太多,可以用 grep 命令過濾

nmap -sT -p3389 218.206.112.0/24 | grep -B2 open

下面是操作的消息記錄,備查。

[[email protected] opt]# nmap

-bash: nmap: command not found

[[email protected] opt]# yum install -y nmap

Loaded plugins: fastestmirror

Determining fastest mirrors

* base: mirrors.163.com

* extras: ftp.iij.ad.jp

* updates: rsync.atworks.co.jp

base | 1.1 kB 00:00

extras | 1.9 kB 00:00

extras/primary_db | 172 kB 00:00

updates | 1.9 kB 00:00

updates/primary_db | 828 kB 00:03

Setting up Install Process

Resolving Dependencies

--> Running transaction check

---> Package nmap.i386 2:4.11-2 set to be updated

--> Finished Dependency Resolution

Dependencies Resolved

========================================================================================================================================================================

Package Arch Version Repository Size

========================================================================================================================================================================

Installing:

nmap i386 2:4.11-2 base 660 k

Transaction Summary

========================================================================================================================================================================

Install 1 Package(s)

Upgrade 0 Package(s)

Total download size: 660 k

Downloading Packages:

nmap-4.11-2.i386.rpm | 660 kB 00:00

Running rpm_check_debug

Running Transaction Test

Finished Transaction Test

Transaction Test Succeeded

Running Transaction

Installing : nmap 1/1

Installed:

nmap.i386 2:4.11-2

Complete!

[[email protected] opt]# nmap

Nmap 4.11 ( http://www.insecure.org/nmap/ )

Usage: nmap [Scan Type(s)] [Options] {target specification}

TARGET SPECIFICATION:

Can pass hostnames, IP addresses, networks, etc.

Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254

-iL : Input from list of hosts/networks

-iR : Choose random targets

--exclude <HOST1[,HOST2][,HOST3],...>: Exclude hosts/networks

--excludefile : Exclude list from file

HOST DISCOVERY:

-sL: List Scan - simply list targets to scan

-sP: Ping Scan - go no further than determining if host is online

-P0: Treat all hosts as online -- skip host discovery

-PS/PA/PU [portlist]: TCP SYN/ACK or UDP discovery to given ports

-PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes

-n/-R: Never do DNS resolution/Always resolve [default: sometimes]

--dns-servers <SERV1[,SERV2],...>: Specify custom DNS servers

--system-dns: Use OS's DNS resolver

SCAN TECHNIQUES:

-sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans

-sN/sF/sX: TCP Null, FIN, and Xmas scans

--scanflags : Customize TCP scan flags

-sI : Idlescan

-sO: IP protocol scan

-b : FTP bounce scan

PORT SPECIFICATION AND SCAN ORDER:

-p : Only scan specified ports

Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080

-F: Fast - Scan only the ports listed in the nmap-services file)

-r: Scan ports consecutively - don't randomize

SERVICE/VERSION DETECTION:

-sV: Probe open ports to determine service/version info

--version-intensity : Set from 0 (light) to 9 (try all probes)

--version-light: Limit to most likely probes (intensity 2)

--version-all: Try every single probe (intensity 9)

--version-trace: Show detailed version scan activity (for debugging)

OS DETECTION:

-O: Enable OS detection

--osscan-limit: Limit OS detection to promising targets

--osscan-guess: Guess OS more aggressively

TIMING AND PERFORMANCE:

Options which take are in milliseconds, unless you append 's'

(seconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m).

-T[0-5]: Set timing template (higher is faster)

--min-hostgroup/max-hostgroup : Parallel host scan group sizes

--min-parallelism/max-parallelism : Probe parallelization

--min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout : Specifies

probe round trip time.

--max-retries : Caps number of port scan probe retransmissions.

--host-timeout : Give up on target after this long

--scan-delay/--max-scan-delay : Adjust delay between probes

FIREWALL/IDS EVASION AND SPOOFING:

-f; --mtu : fragment packets (optionally w/given MTU)

-D <DECOY1,DECOY2[,ME],...>: Cloak a scan with decoys

-S : Spoof source address

-e : Use specified interface

-g/--source-port : Use given port number

--data-length : Append random data to sent packets

--ttl : Set IP time-to-live field

--spoof-mac : Spoof your MAC address

--badsum: Send packets with a bogus TCP/UDP checksum

OUTPUT:

-oN/-oX/-oS/-oG : Output scan in normal, XML, s|

and Grepable format, respectively, to the given filename.

-oA : Output in the three major formats at once

-v: Increase verbosity level (use twice for more effect)

-d[level]: Set or increase debugging level (Up to 9 is meaningful)

--packet-trace: Show all packets sent and received

--iflist: Print host interfaces and routes (for debugging)

--log-errors: Log errors/warnings to the normal-format output file

--append-output: Append to rather than clobber specified output files

--resume : Resume an aborted scan

--stylesheet : XSL stylesheet to transform XML output to HTML

--webxml: Reference stylesheet from Insecure.Org for more portable XML

--no-stylesheet: Prevent associating of XSL stylesheet w/XML output

MISC:

-6: Enable IPv6 scanning

-A: Enables OS detection and Version detection

--datadir : Specify custom Nmap data file location

--send-eth/--send-ip: Send using raw ethernet frames or IP packets

--privileged: Assume that the user is fully privileged

-V: Print version number

-h: Print this help summary page.

EXAMPLES:

nmap -v -A scanme.nmap.org

nmap -v -sP 192.168.0.0/16 10.0.0.0/8

nmap -v -iR 10000 -P0 -p 80

SEE THE MAN PAGE FOR MANY MORE OPTIONS, DESCRIPTIONS, AND EXAMPLES

[[email protected] opt]#

[[email protected] opt]# nmap -sT -p3389 218.206.112.0/24

Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2012-10-26 15:36 CST

Interesting ports on 218.206.112.1:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.11:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.16:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.39:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.40:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.41:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.49:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.51:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.56:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.59:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.65:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.68:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.69:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.71:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.72:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.74:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.77:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.78:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.80:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.81:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.82:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.83:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.87:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.88:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.94:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.95:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.96:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.100:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.102:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.103:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.105:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.107:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.108:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.109:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.110:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.111:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.116:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.117:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.119:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.121:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.123:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.129:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.131:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.132:

PORT STATE SERVICE

3389/tcp open ms-term-serv

Interesting ports on 218.206.112.134:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.136:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.144:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.147:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.150:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.156:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.157:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.160:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.163:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.165:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.179:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.181:

PORT STATE SERVICE

3389/tcp closed ms-term-serv

Interesting ports on 218.206.112.188:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Interesting ports on 218.206.112.190:

PORT STATE SERVICE

3389/tcp filtered ms-term-serv

Nmap finished: 256 IP addresses (58 hosts up) scanned in 22.497 seconds

[[email protected] opt]#

[[email protected] opt]#

[[email protected] opt]#

[[email protected] opt]# nmap -sT -p3389 218.206.112.0/24 | grep -B2 open

Interesting ports on 218.206.112.100:

PORT STATE SERVICE

3389/tcp open ms-term-serv

--

Interesting ports on 218.206.112.132:

PORT STATE SERVICE

3389/tcp open ms-term-serv

[[email protected] opt]#

聯系我們
返回頂部 欧美激情综合网_欧美激情视频网址_天天干天天干天天干_成人免费视频电影

国产精品久久久久久影视| 亚洲在线黄色| 国产精品欧美日韩一区| 久久久夜精品| 中日韩高清电影网| 黄色一区二区在线| 国产精品嫩草99a| 免费一级欧美在线大片| 欧美一区二区在线免费播放| 亚洲精品1234| 激情五月综合色婷婷一区二区| 欧美日韩性视频在线| 免费视频一区二区三区在线观看| 欧美一区二区三区播放老司机 | 久久精品视频导航| 中日韩视频在线观看| 91久久精品美女高潮| 在线免费不卡视频| 国产日产高清欧美一区二区三区| 欧美日韩国产91| 欧美激情视频一区二区三区不卡| 女人天堂亚洲aⅴ在线观看| 久久精品视频播放| 久久久视频精品| 久久精品30| 久久婷婷色综合| 久久久久久婷| 美女黄网久久| 免费欧美网站| 欧美日韩国产区| 欧美日韩国产91| 国产精品高潮呻吟视频| 欧美性一二三区| 国产伦精品一区二区三区在线观看| 国产精品久久久久免费a∨大胸| 欧美日韩精品国产| 国产精品美女久久久免费| 国产精品区免费视频| 国产日韩欧美一区二区三区四区| 国产精品一区二区久久| 国产一区二区三区在线观看免费| 好吊色欧美一区二区三区视频| 狠狠干成人综合网| 最新亚洲激情| 亚洲网友自拍| 久久精品亚洲一区二区| 久久亚洲不卡| 欧美日韩国产黄| 国产精品免费在线 | 欧美日韩一级视频| 久久婷婷激情| 欧美日韩免费一区二区三区| 国产精品国产亚洲精品看不卡15| 国产精品chinese| 国产一区二区无遮挡| 亚洲激情女人| 亚洲嫩草精品久久| 美女成人午夜| 国产精品乱码一区二三区小蝌蚪 | 欧美激情中文字幕一区二区| 国产精品盗摄一区二区三区| 精久久久久久| 亚洲伊人一本大道中文字幕| 久久综合色综合88| 国产欧美精品日韩精品| 91久久香蕉国产日韩欧美9色| 亚洲性视频网站| 欧美福利电影在线观看| 国产精品乱码久久久久久| 亚洲电影在线播放| 欧美诱惑福利视频| 欧美日韩国产成人高清视频| 黄色一区二区在线| 欧美亚洲一区二区三区| 欧美另类videos死尸| 国产亚洲免费的视频看| 中文av字幕一区| 欧美日韩国产精品专区| 狠狠爱综合网| 久久精品30| 国产伦精品一区| 亚洲一二三级电影| 欧美日韩免费观看一区| 亚洲精品乱码久久久久久黑人| 久久久久九九九九| 国产一区二区三区在线观看网站 | 亚洲一区二区三区中文字幕在线| 欧美久久综合| 亚洲三级电影全部在线观看高清| 久久久一本精品99久久精品66| 国产欧美亚洲视频| 亚洲欧美日韩另类| 国产亚洲精品久久久| 香蕉成人伊视频在线观看| 国产精品久久久久久久久| 妖精成人www高清在线观看| 欧美精品三级在线观看| 日韩亚洲视频在线| 欧美日韩不卡一区| 99av国产精品欲麻豆| 欧美日产在线观看| 亚洲视频网在线直播| 欧美日韩理论| 99国产一区| 国产精品白丝av嫩草影院| 亚洲网站在线看| 国产精品啊啊啊| 欧美一区二区三区在线观看视频| 国产伦精品一区二区三区高清 | 国产麻豆91精品| 久久成人在线| 亚洲激情在线观看| 欧美日韩免费高清| 欧美一级艳片视频免费观看| 国产日韩欧美一区在线| 久热精品视频在线观看一区| 亚洲日本一区二区三区| 欧美色图一区二区三区| 性色av一区二区三区| 精品白丝av| 欧美日韩精品在线观看| 午夜精品一区二区三区四区| 国户精品久久久久久久久久久不卡| 久久综合电影| 亚洲一区二区三区免费视频| 国产亚洲午夜| 欧美日韩 国产精品| 性欧美长视频| 国产亚洲欧美一区在线观看| 久久九九国产精品| 日韩一区二区精品视频| 国产一区日韩二区欧美三区| 欧美精品在线观看91| 久久大综合网| 亚洲午夜一区| 亚洲欧洲综合| 国精品一区二区| 欧美性jizz18性欧美| 久久一区欧美| 亚洲男女自偷自拍| 亚洲精品影视| 黄色成人av| 国产日韩欧美一二三区| 欧美日本国产视频| 快播亚洲色图| 欧美一级片一区| 亚洲一区二区三区视频播放| 亚洲国产视频一区| 一区在线播放| 国产在线视频不卡二| 国产精品国产三级国产aⅴ无密码 国产精品国产三级国产aⅴ入口 | 亚洲精品一区二区三区福利| 国产精品一区二区三区观看| 欧美日韩国产成人精品| 欧美a级理论片| 久久久噜噜噜久久人人看| 亚洲欧美亚洲| 亚洲欧美不卡| 亚洲午夜在线| av成人毛片| 在线亚洲欧美视频| 99国产精品| 一卡二卡3卡四卡高清精品视频| 亚洲第一区中文99精品| 1024日韩| 亚洲日韩第九十九页| 亚洲精品免费一区二区三区| 亚洲国产黄色片| 亚洲全黄一级网站| 亚洲国产精品va在看黑人| 亚洲国产三级网| 亚洲另类自拍| 亚洲午夜在线视频| 性欧美大战久久久久久久久| 午夜精品www| 久久久久久免费| 久久香蕉精品| 欧美精品日韩一区| 欧美吻胸吃奶大尺度电影| 欧美日韩国产欧| 国产精品爽爽ⅴa在线观看| 国产日韩av一区二区| 国内精品久久久久久久果冻传媒| 国内精品久久久久影院色| 在线观看日韩国产| 亚洲精品欧洲精品| 亚洲一二三区在线| 欧美在线国产精品| 欧美sm视频| 国产精品xxxxx| 黄色亚洲网站| 亚洲视频一区二区| 久久久人成影片一区二区三区观看| 免费在线观看日韩欧美| 欧美日韩国产首页在线观看| 国产免费观看久久| 亚洲国产精品久久| 性久久久久久久久| 欧美激情一区二区| 国产主播在线一区|