精华内容
下载资源
问答
  • nmap命令扫描存活主机

    万次阅读 2019-09-24 12:04:15
    1、ping扫描扫描192.168.0.0/24网段上有哪些主机存活的; [root@laolinux ~]#nmap -sP 192.168.0.0/24 Starting Nmap 4.11 (http://www.insecure.org/nmap/) at 2009-04-25 06:59 CSTHost laolinux (192.168...
    1、ping扫描:扫描192.168.0.0/24网段上有哪些主机是存活的;
     
    [root@laolinux ~]# nmap -sP 192.168.0.0/24
    Starting Nmap 4.11 (  http://www.insecure.org/nmap/ ) at 2009-04-25 06:59 CST
    Host laolinux (192.168.0.3) appears to be up.
    Host 192.168.0.20 appears to be up.
    MAC Address: 00:1E:4F:CD:C6:0E (Unknown)
    Host 192.168.0.108 appears to be up.
    MAC Address: 00:E3:74:27:05:B7 (Unknown)
    Host 192.168.0.109 appears to be up.
    MAC Address: 00:E0:E4:A6:14:6F (Fanuc Robotics North America)
    Host 192.168.0.111 appears to be up.
    MAC Address: 00:E0:E4:A6:1C:91 (Fanuc Robotics North America)
    Host 192.168.0.114 appears to be up.
    MAC Address: 00:11:1A:35:38:65 (Motorola BCS)
    Host 192.168.0.118 appears to be up.
    MAC Address: 00:E0:2A:51:AC:5B (Tandberg Television AS)
    Host 192.168.0.119 appears to be up.
    MAC Address: 00:EA:E5:C1:21:D6 (Unknown)
    Host 192.168.0.124 appears to be up.
    MAC Address: 00:E0:4C:39:05:81 (Realtek Semiconductor)
    Host 192.168.0.127 appears to be up.
    MAC Address: 00:11:1A:35:38:62 (Motorola BCS)
    Host 192.168.0.128 appears to be up.
    MAC Address: 00:E0:E4:A6:1C:96 (Fanuc Robotics North America)
    Host 192.168.0.134 appears to be up.
    MAC Address: 00:E0:2A:51:AC:5F (Tandberg Television AS)
    Host 192.168.0.135 appears to be up.
    MAC Address: 00:11:1A:35:38:60 (Motorola BCS)
    Host 192.168.0.137 appears to be up.
    MAC Address: 00:1F:06:D6:3E:BA (Unknown)
    Host 192.168.0.139 appears to be up.
    MAC Address: 00:E0:E4:A6:1C:92 (Fanuc Robotics North America)
    Host 192.168.0.140 appears to be up.
    MAC Address: 00:1F:1A:39:1B:8D (Unknown)
    Host 192.168.0.155 appears to be up.
    MAC Address: 00:1C:23:4C:DB:A0 (Unknown)
    Host 192.168.0.211 appears to be up.
    MAC Address: 00:1D:72:98:A2:8C (Unknown)
    Host 192.168.0.220 appears to be up.
    MAC Address: 00:40:45:20:8C:93 (Twinhead)
    Host 192.168.0.221 appears to be up.
    MAC Address: 00:09:6B:50:71:26 (IBM)
    Nmap finished: 256 IP addresses (20 hosts up) scanned in 3.818 seconds
     
    2、端口扫描:扫描192.168.0.3这台主机开放了哪些端口;
     
    [root@laolinux ~]# nmap -sT 192.168.0.3
    Starting Nmap 4.11 (  http://www.insecure.org/nmap/ ) at 2009-04-25 07:02 CST
    Interesting ports on laolinux (192.168.0.3):
    Not shown: 1667 closed ports
    PORT      STATE SERVICE
    21/tcp    open  ftp
    22/tcp    open  ssh
    25/tcp    open  smtp
    53/tcp    open  domain
    80/tcp    open  http
    110/tcp   open  pop3
    111/tcp   open  rpcbind
    143/tcp   open  imap
    964/tcp   open  unknown
    993/tcp   open  imaps
    995/tcp   open  pop3s
    3306/tcp  open  mysql
    10000/tcp open  snet-sensor-mgmt
    Nmap finished: 1 IP address (1 host up) scanned in 4.755 seconds
    3、隐藏扫描,只在目标主机上留下很少的日志信息:隐藏扫描192.168.0.220
     
    [root@laolinux ~]# nmap -sS 192.168.0.127
    Starting Nmap 4.11 (  http://www.insecure.org/nmap/ ) at 2009-04-25 07:08 CST
    Interesting ports on 192.168.0.127:
    Not shown: 1675 closed ports
    PORT    STATE SERVICE
    21/tcp  open  ftp
    135/tcp open  msrpc
    139/tcp open  netbios-ssn
    445/tcp open  microsoft-ds
    912/tcp open  unknown
    MAC Address: 00:11:1A:35:38:62 (Motorola BCS)
    Nmap finished: 1 IP address (1 host up) scanned in 3.121 seconds
    4、UDP端口扫描:扫描192.168.0.127开放了哪些UDP端口;
     
    [root@laolinux ~]# nmap -sU 192.168.0.127
    Starting Nmap 4.11 (  http://www.insecure.org/nmap/ ) at 2009-04-25 07:08 CST
    Interesting ports on 192.168.0.127:
    Not shown: 1480 closed ports
    PORT     STATE         SERVICE
    123/udp  open|filtered ntp
    137/udp  open|filtered netbios-ns
    138/udp  open|filtered netbios-dgm
    445/udp  open|filtered microsoft-ds
    500/udp  open|filtered isakmp
    1900/udp open|filtered UPnP
    4500/udp open|filtered sae-urn
    MAC Address: 00:11:1A:35:38:62 (Motorola BCS)
    Nmap finished: 1 IP address (1 host up) scanned in 2.947 seconds
    5、操作系统识别:
     
    [root@laolinux ~]# nmap -sS -O  192.168.0.127
    Starting Nmap 4.11 (  http://www.insecure.org/nmap/ ) at 2009-04-25 07:09 CST
    Interesting ports on 192.168.0.127:
    Not shown: 1675 closed ports
    PORT    STATE SERVICE
    21/tcp  open  ftp
    135/tcp open  msrpc
    139/tcp open  netbios-ssn
    445/tcp open  microsoft-ds
    912/tcp open  unknown
    MAC Address: 00:11:1A:35:38:62 (Motorola BCS)
    Device type: general purpose
    Running: Microsoft Windows 2003/.NET|NT/2K/XP
    OS details: Microsoft Windows 2003 Server or XP SP2
    Nmap finished: 1 IP address (1 host up) scanned in 5.687 seconds

    转载于:https://www.cnblogs.com/xxxyz/p/11567531.html

    展开全文
  • 利用nmap批量扫描存活主机 知识储备:grep,nmap 一、安装nmap 1.安装编译环境 [root@arppinging nmap-7.01]# yum install gcc g++ gcc-c++ -y 2.使用wget下载nmap [root@arppinging nmap-7.01]# wget ...

    利用nmap批量扫描存活主机

    知识储备:grep,nmap

    一、安装nmap

    1.安装编译环境

    [root@arppinging nmap-7.01]# yum install gcc g++ gcc-c++ -y

    2.使用wget下载nmap

    [root@arppinging nmap-7.01]# wget http://nmap.org/dist/nmap-7.01.tar.bz2

    3.解压下载的安装包

    [root@arppinging nmap-7.01]# tar -vxf nmap-7.01.tar.bz2 

    4.进入文件夹编译安装

    [root@arppinging nmap-7.01]# cd nmap-7.01
    [root@arppinging nmap-7.01]# ./configure 
    [root@arppinging nmap-7.01]# make
    [root@arppinging nmap-7.01]# make install

    5.检查安装是否成功

    [root@arppinging nmap-7.01]# nmap -v

    使用nmap

    1.sn参数
    -sn: Ping Scan - disable port scan #ping探测扫描主机, 不进行端口扫描
    2.扫描不存在的主机

    Starting Nmap 7.01 ( https://nmap.org ) at 2018-05-24 00:30 CST
    Warning: File ./nmap-payloads exists, but Nmap is using /usr/local/bin/../share/nmap/nmap-payloads for security and consistency reasons.  set NMAPDIR=. to give priority to files in your local directory (may affect the other data files too).
    Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
    Nmap done: 1 IP address (0 hosts up) scanned in 0.49 seconds
    [root@arppinging nmap-7.01]# 

    3.扫描存在的主机

    [root@arppinging nmap-7.01]# nmap -sn 172.25.65.100
    .
    Starting Nmap 7.01 ( https://nmap.org ) at 2018-05-24 00:31 CST
    Warning: File ./nmap-payloads exists, but Nmap is using /usr/local/bin/../share/nmap/nmap-payloads for security and consistency reasons.  set NMAPDIR=. to give priority to files in your local directory (may affect the other data files too).
    Stats: 0:00:00 elapsed; 0 hosts completed (0 up), 1 undergoing ARP Ping Scan
    ARP Ping Scan Timing: About 100.00% done; ETC: 00:31 (0:00:00 remaining)
    Nmap scan report for 172.25.65.100
    Host is up (0.00025s latency).
    MAC Address: 2C:FD:A1:E1:EA:DB (Unknown)
    Nmap done: 1 IP address (1 host up) scanned in 0.17 seconds

    对比发现,存在的主机都有Nmap scan report for字段

    创建脚本

    1.脚本如下

    [root@arppinging scripts]# cat host.sh 
    #/bin/bash -
    read -p "Please input scan host or network:" host
    nmap -sn $host | grep "Nmap scan report for" >/dev/null &>/dev/null
    [ $? -ne 0 ] && echo "host $host is down." && exit 1
    nmap -sn $host  | grep "Nmap scan report for" | awk '{print $5}' > /scripts/host.txt
    while read uphost
    do
     echo "host $uphost is up."
    done</scripts/host.txt
    [root@arppinging scripts]# 

    2.运行脚本(真实环境下)

    [root@localhost scripts]# bash host.sh
    Please input scan host or network:172.25.65.0/24
    host 172.25.65.1 is up.
    host 172.25.65.2 is up.
    host 172.25.65.50 is up.
    host 172.25.65.100 is up.
    host 172.25.65.101 is up.
    host 172.25.65.102 is up.
    host 172.25.65.103 is up.
    host 172.25.65.104 is up.
    host 172.25.65.105 is up.
    host 172.25.65.106 is up.
    host 172.25.65.107 is up.
    host 172.25.65.108 is up.
    host 172.25.65.109 is up.
    host 172.25.65.110 is up.
    host 172.25.65.111 is up.
    host 172.25.65.112 is up.
    host 172.25.65.113 is up.
    host 172.25.65.114 is up.
    host 172.25.65.115 is up.
    host 172.25.65.116 is up.
    host 172.25.65.117 is up.
    host 172.25.65.118 is up.
    host 172.25.65.119 is up.
    host 172.25.65.120 is up.
    host 172.25.65.121 is up.
    host 172.25.65.122 is up.
    host 172.25.65.123 is up.
    host 172.25.65.124 is up.
    host 172.25.65.125 is up.
    host 172.25.65.126 is up.
    host 172.25.65.127 is up.
    host 172.25.65.128 is up.
    host 172.25.65.129 is up.
    host 172.25.65.130 is up.
    host 172.25.65.131 is up.
    host 172.25.65.132 is up.
    host 172.25.65.133 is up.
    host 172.25.65.134 is up.
    host 172.25.65.135 is up.
    host 172.25.65.136 is up.
    host 172.25.65.137 is up.
    host 172.25.65.138 is up.
    host 172.25.65.139 is up.
    host 172.25.65.141 is up.
    host 172.25.65.143 is up.
    host 172.25.65.145 is up.
    host 172.25.65.146 is up.
    host 172.25.65.147 is up.
    host 172.25.65.148 is up.
    host 172.25.65.149 is up.
    host 172.25.65.150 is up.
    host 172.25.65.151 is up.
    host 172.25.65.152 is up.
    host 172.25.65.10 is up.
    
    主机不存在的情况
    [root@localhost scripts]# bash host.sh
    Please input scan host or network:172.25.65.199
    host 172.25.65.199 is down.
    [root@localhost scripts]# 

    有问题的话请评论吧,谢谢

    arppinging技术社区
    欢迎关注的我的个人微信公众号

    二维码

    展开全文
  • python调用nmap扫描局域网存活主机和端口 文章目录python调用nmap扫描局域网存活主机和端口操作环境运行代码关键代码1. nm.scan(ip,port,args)2. 字典的解析运行结果参考文章 操作环境 python2 sudo apt install ...

    python调用nmap扫描局域网存活主机和端口

    操作环境

    python2

    sudo apt install nmap

    pip install nmap json

    运行代码

    sudo python2 scan.py

    代码经过调试,使用root可直接运行

    #!python2 
    # scan.py must be sudo to run
    import nmap
    import json
    
    nm = nmap.PortScanner()
    iprange = raw_input("input ip range(eg:192.168.224.0/24)>")
    port = raw_input("input target port(eg:8888)>")
    if not port:
    	port = 8888
    if not iprange:
        iprange = "192.168.224.0/24"
    print("scan ip range " + iprange)
    a = nm.scan(iprange, str(port), '-sS -O')
    a = a.get("scan")
    
    target = 0
    for key, value in a.items():
        if value.get("tcp").get(port).get("state") == "open":
            print "target ip maybe :" + key
            print "some information"
            print value
            target = target + 1
    
    if target == 0:
        print "no target machine detectd...."
    

    关键代码

    1. nm.scan(ip,port,args)

    请查阅参考文档一,有详细的解释

    返回的结果a形式如下:a是个字典

    {'nmap': {'scanstats': {'uphosts': '4', 'timestr': 'Sat Jun 27 13:29:19 2020', 'downhosts': '252', 'totalhosts': '256', 'elapsed': '9.86'}, 'scaninfo': {'tcp': {'services': '8888', 'method': 'syn'}}, 'command_line': 'nmap -oX - -p 8888 -sS -O 192.168.224.0/24'}, 'scan': {'192.168.224.132': {'status': {'state': 'up', 'reason': 'localhost-response'}, 'uptime': {'seconds': '1999559', 'lastboot': 'Thu Jun  4 10:03:20 2020'}, 'vendor': {}, 'addresses': {'ipv4': '192.168.224.132'}, 'tcp': {8888: {'product': '', 'state': 'open', 'version': '', 'name': 'sun-answerbook', 'conf': '3', 'extrainfo': '', 'reason': 'syn-ack', 'cpe': ''}}, 'hostnames': [{'type': '', 'name': ''}], 'osmatch': [{'osclass': [{'osfamily': 'Linux', 'vendor': 'Linux', 'cpe': ['cpe:/o:linux:linux_kernel:2.6.32'], 'type': 'general purpose', 'osgen': '2.6.X', 'accuracy': '100'}], 'line': '50174', 'name': 'Linux 2.6.32', 'accuracy': '100'}], 'portused': [{'state': 'open', 'portid': '8888', 'proto': 'tcp'}, {'state': 'closed', 'portid': '34334', 'proto': 'udp'}]}, '192.168.224.1': {'status': {'state': 'up', 'reason': 'arp-response'}, 'vendor': {'00:50:56:C0:00:08': 'VMware'}, 'addresses': {'mac': '00:50:56:C0:00:08', 'ipv4': '192.168.224.1'}, 'tcp': {8888: {'product': '', 'state': 'filtered', 'version': '', 'name': 'sun-answerbook', 'conf': '3', 'extrainfo': '', 'reason': 'no-response', 'cpe': ''}}, 'hostnames': [{'type': '', 'name': ''}], 'osmatch': [], 'portused': []}, '192.168.224.2': {'status': {'state': 'up', 'reason': 'arp-response'}, 'vendor': {'00:50:56:E8:9C:1A': 'VMware'}, 'addresses': {'mac': '00:50:56:E8:9C:1A', 'ipv4': '192.168.224.2'}, 'tcp': {8888: {'product': '', 'state': 'closed', 'version': '', 'name': 'sun-answerbook', 'conf': '3', 'extrainfo': '', 'reason': 'reset', 'cpe': ''}}, 'hostnames': [{'type': '', 'name': ''}], 'osmatch': [{'osclass': [{'osfamily': 'embedded', 'vendor': 'Aethra', 'cpe': ['cpe:/h:aethra:starvoice_1042'], 'type': 'broadband router', 'osgen': None, 'accuracy': '91'}], 'line': '1615', 'name': 'Aethra Starvoice 1042 ADSL router', 'accuracy': '91'}, {'osclass': [{'osfamily': 'AOS', 'vendor': 'APC', 'cpe': ['cpe:/o:apc:aos:5'], 'type': 'power-device', 'osgen': '5.X', 'accuracy': '91'}], 'line': '2920', 'name': 'APC AOS 5', 'accuracy': '91'}, {'osclass': [{'osfamily': 'SuperDOS', 'vendor': 'Bluebird', 'cpe': ['cpe:/o:bluebird:superdos'], 'type': 'general purpose', 'osgen': None, 'accuracy': '91'}], 'line': '9384', 'name': 'Bluebird SuperDOS', 'accuracy': '91'}, {'osclass': [{'osfamily': 'embedded', 'vendor': 'Brother', 'cpe': ['cpe:/h:brother:nc-130h'], 'type': 'print server', 'osgen': None, 'accuracy': '91'}], 'line': '9587', 'name': 'Brother NC-130h print server', 'accuracy': '91'}, {'osclass': [{'osfamily': 'embedded', 'vendor': 'Brother', 'cpe': ['cpe:/h:brother:hl-1870n'], 'type': 'printer', 'osgen': None, 'accuracy': '91'}], 'line': '9767', 'name': 'Brother HL-1870N printer', 'accuracy': '91'}, {'osclass': [{'osfamily': 'embedded', 'vendor': 'Brother', 'cpe': ['cpe:/h:brother:hl-2070n', 'cpe:/h:brother:mfc-5460cn'], 'type': 'printer', 'osgen': None, 'accuracy': '91'}], 'line': '9786', 'name': 'Brother HL-2070N or MFC-5460CN printer', 'accuracy': '91'}, {'osclass': [{'osfamily': 'embedded', 'vendor': 'Brother', 'cpe': ['cpe:/h:brother:hl-2070n'], 'type': 'printer', 'osgen': None, 'accuracy': '91'}], 'line': '9805', 'name': 'Brother HL-2070N printer', 'accuracy': '91'}, {'osclass': [{'osfamily': 'embedded', 'vendor': 'Brother', 'cpe': ['cpe:/h:brother:hl-5070n'], 'type': 'printer', 'osgen': None, 'accuracy': '91'}], 'line': '10112', 'name': 'Brother HL-5070N printer', 'accuracy': '91'}, {'osclass': [{'osfamily': 'embedded', 'vendor': 'Brother', 'cpe': ['cpe:/h:brother:mfc-7820n'], 'type': 'printer', 'osgen': None, 'accuracy': '91'}], 'line': '10480', 'name': 'Brother MFC-7820N printer', 'accuracy': '91'}, {'osclass': [{'osfamily': 'embedded', 'vendor': 'Brother', 'cpe': ['cpe:/h:brother:mfc-9420cn'], 'type': 'printer', 'osgen': None, 'accuracy': '91'}], 'line': '10595', 'name': 'Brother MFC-9420CN printer', 'accuracy': '91'}], 'portused': [{'state': 'closed', 'portid': '8888', 'proto': 'tcp'}]}, '192.168.224.254': {'status': {'state': 'up', 'reason': 'arp-response'}, 'vendor': {'00:50:56:F5:F1:1D': 'VMware'}, 'addresses': {'mac': '00:50:56:F5:F1:1D', 'ipv4': '192.168.224.254'}, 'tcp': {8888: {'product': '', 'state': 'filtered', 'version': '', 'name': 'sun-answerbook', 'conf': '3', 'extrainfo': '', 'reason': 'no-response', 'cpe': ''}}, 'hostnames': [{'type': '', 'name': ''}], 'osmatch': [], 'portused': []}}}
    

    2. 字典的解析

    为了更好地测试,最好使用jupyter或控制台去单步执行,去使用dict的get方法去逐步解析,防止错误

    for key, value in a.items():
        if value.get("tcp").get(port).get("state") == "open":
            print "target ip maybe :" + key
            print "some information"
            print value
            target = target + 1
    

    运行结果

    zhao@zhao:~/Desktop/project$ sudo python scan.py
    [sudo] password for zhao:
    input ip range(eg:192.168.224.0/24)>
    input target port(eg:8888)>
    scan ip range 192.168.224.0/24
    target ip maybe :192.168.224.132
    some information
    {'status': {'state': 'up', 'reason': 'localhost-response'}, 'uptime': {'seconds': '2001774', 'lastboot': 'Thu Jun  4 10:03:22 2020'}, 'vendor': {}, 'addresses': {'ipv4': '192.168.224.132'}, 'tcp': {8888: {'product': '', 'state': 'open', 'version': '', 'name': 'sun-answerbook', 'conf': '3', 'extrainfo': '', 'reason': 'syn-ack', 'cpe': ''}}, 'hostnames': [{'type': '', 'name': ''}], 'osmatch': [{'osclass': [{'osfamily': 'Linux', 'vendor': 'Linux', 'cpe': ['cpe:/o:linux:linux_kernel:2.6.32'], 'type': 'general purpose', 'osgen': '2.6.X', 'accuracy': '100'}], 'line': '50174', 'name': 'Linux 2.6.32', 'accuracy': '100'}], 'portused': [{'state': 'open', 'portid': '8888', 'proto': 'tcp'}, {'state': 'closed', 'portid': '30317', 'proto': 'udp'}]}
    
    

    参考文章

    1. Python中python-nmap模块的使用

    2. nmap命令扫描存活主机

    展开全文
  • nmap快速扫描大量主机端口方法

    千次阅读 2020-03-16 22:04:28
    今天参加了某单位的风险评估项目,在做风险评估之前需要对目标进行信息收集,我使用msf对两个目标网段做了存活主机探测,之后发现了有70个存活主机,第二步需要对存活主机进行端口扫描,这一步最开始耽误了我不少...

    今天参加了某单位的风险评估项目,在做风险评估之前需要对目标进行信息收集,我使用msf对两个目标网段做了存活主机探测,之后发现了有70个存活主机,第二步需要对存活主机进行端口扫描,这一步最开始耽误了我不少时间,最后查找各种资料,找到了一种亲测可以极大提高nmap扫描速度的参数设置,在这里分享一下,望在诸君用到之时能有所帮助。

    下图是实际的扫描效果,我们可以看到扫了70个IP仅仅用了12.41秒。

    在这里插入图片描述

    我觉得这速度比默认的快了无数倍,下面是我的扫描参数设置:

    sudo nmap -sS -Pn -n --open --min-hostgroup 4 --min-parallelism 1024 --host-timeout 30 -T4 -v -oG result.txt -iL ip.txt

    简单解释一下:
    -sS:使用SYN方式扫描,默认用的是-sT方式,即TCP方式,需要完成完整的三次握手,比较费时,SYN就比较快一些了;

    -Pn: 禁用PING检测,这样速度快,并且可以防止有些主机无法ping通而被漏掉不扫描;

    -n: 功能未知;

    –open: 只输出检测状态为open的端口,即开放的端口;

    –min-hostgroup 4:调整并行扫描组的大小;

    –min-parallelism 1024:调整探测报文的并行度;

    –host-timeout 30:检测超时的跳过

    -T4:总共有T0-T5,貌似T4比较折中

    -v:打印详细扫描过程

    -oG:输出为比较人性化的格式,一条记录一行,后期好处理

    -iL:载入ip段文件,批量扫,不用一条条执行了。

    展开全文
  • nmap扫描主机存活情况

    千次阅读 2019-03-26 16:18:00
    nmap -sP --min-hostgroup 1024 --min-parallelism 1024 -iL ip.txt -oG ip_output1113.txt –min-hostgroup 1024(调整并行扫描组的大小,最小分组设置为1024) –min-parallelism 1024(调整探测报文的并行度,...
  • 使用环境:Raspberry 3b+ +netifaces+python-nmap+nmap 调用netifaces自动获取ip地址: def get_gateways(): return netifaces.gateways()['default'][netifaces.AF_INET][0] 将ip地址生成一个网段中所有ip...
  • nmap查看局域网存活主机

    千次阅读 2019-10-03 21:06:16
    nmap是一个非常强大的扫描工具一个著名的扫描大王 用nmap进行局域网扫描 先用查看一下ip段 ifconfig 然后用 nmap -sP 192.168.43.0/24 -sP是ping扫描,24是扫描到255 ...
  • Nmap是一款网络扫描主机检测的非常有用的工具。Nmap是不局限于仅仅收集信息和枚举,同时可以用来作为一个漏洞探测器或安全扫描器。它可以适用于winodws,linux,mac等操作系统 Nmap是一款非常强大的实用工具,可用于...
  • nmap是一个网络连接端扫描软件,用来扫描网上电脑开放的网络连接端。确定哪些服务运行在哪些连接端,并且推断计算机运行哪个操作系统(这是亦称 fingerprinting)。它是网络管理员必用的软件之一,以及用以评估网络...
  • Python 局域网扫描存活主机开放端口

    千次阅读 2019-01-07 14:19:08
    ''' Python 局域网扫描存活主机开放端口 by 郑...3、nmap扫描存活主机开放端口 #注: 若在Linux系统下 ping -n 改为 ping -c 若在windows系统下 ping -n 不变 ''' import nmap import socket import os import t...
  • Python之nmap-ping扫描探测主机存活

    千次阅读 2018-11-24 21:35:41
    其实在这篇文章之前本人已讲述一篇关于ICMP协议探测主机的文章...但是功能不比scapy少,因为nmap不但可以探测主机存活、端口等功能,还可以发送大量数据包探测主机开放端口号下的版本或...
  • 局域网主机存活发现主机发现使用命令结果输出 主机发现 一个局域网之中存在多台设备,获取哪些设备处于开机状态可以使用ping IP地址一个ip一个ip的去实验,但是如果一个网络很大的情况下,这样手工探测会非常耗时和...
  • 关键词:主机扫描主机存活,纯python版本,非nmap 时间: 2014/1/21 在内网渗透的时候,如果贸然安装安装namp等扫描工具,则很容易被发现,我抽时间写了个python脚本,使用ping工具来监测主机存活情况。我写的...
  • Qt+nmap存活主机发现

    2018-11-05 19:53:37
    Qt和nmap存活主机发现示例。主机发现迅速,一个网段大约2s。先通过进程调用namp输出xml文件,再用Qt解析得到结果。
  • nmap扫描内网主机

    千次阅读 2015-10-10 13:34:59
    无论是内网***测试、外网***...扫描的目的分为几步:1、确认主机是否存活;2、确认主机的操作系统;3、确认主机所运行的组件;4、针对组件上的版本的漏洞展开***。下面是操作步骤:1、确认主机是否存活nmap - sP IP...
  • 使用Nmap扫描目标主机

    2021-04-13 22:17:48
    端口扫描是指某些别有用心的人发送一组端口扫描消息,试图以此侵入某台计算机,并...目前在市面上主要的端口扫描工具是X_Scan、SuperScan、nmap,其中在这里主推的是nmap Nmap包含四项基本功能: 主机发现(Host .
  • Nmap is a very useful tool for network administration and security. It is the most used tool in these areas. But a lot of people use it with very basic means. Here we will look more sophisticated usag...
  • 脚本如下,需要用到IPy模块,python-nmap模块,脚本执行后,以csv文档将结果输出到屏幕上 #!/usr/bin/env python3 ''' ...使用方法: nmap_scan.py 192.168.0.0/24 22,3389 支持单个IP,网段扫描 网段格...
  • 在使用 nmap 扫描时,得到如下结果: 结果1: Interesting ports on 172.22.43.23: PORT STATE SERVICE 22/tcp open ssh Interesting ports on 172.22.43.24: PORT STATE SERVICE 22/tcp open ssh ...
  • 本文通过介绍三款工具(nmap、fping、ettercap)分别对网络存活主机进行探测,让我们一起学习! 二、资源装备 1.安装好Kali Linux的虚拟机一台; 2.整装待发的小白一个。 三、战略安排 3.1 查看nmap帮助信息,寻找...
  • 主机扫描类型 1.-sL(列表扫描) ...在扫描的过程中,不管对方主机是否存活,可以执行其他任务,比如操作系统探测、服务探测 4.-PS(TCP SYN Ping扫描) 5.-PA(TCP ACK Ping扫描) 6.-PU(UDP Ping扫描) 7.-PR(ARP P...
  • Nmap端口扫描

    千次阅读 2020-06-16 14:33:52
    2、掌握Nmap扫描器的安装 3、针对特定扫描目的,掌握Nmap扫描器的参数用法 实验环境 1.、PC机一台 2、kali linux虚拟机一台 3、windows service 2008虚拟机一台 4、CentOS 7 虚拟机一台 实验内容 1、Nmap安装和扫描...
  • Nmap网络扫描

    2021-07-17 15:56:55
    nmap是一个网络探测和安全扫描程序,系统管理者和个人可以使用这个软件扫描大型的网络,获取主机正在运行以及提供什么服务等信息。nmap支持很多扫描技术 例如:UDP、TCP connect()、TCP SYN(半开扫描)、ftp代理...
  • nmap端口扫描

    2019-10-27 23:00:08
    什么是端口扫描?...参数-Pn:告诉nmap不使用ping命令判断主机是否存活。因为ping命令使用的是ICMP协议 很多网络不允许ping命令通行,但在内网中可以忽略掉这个参数 nmap -sS -Pn www.xiyou.edu.cn 最...
  • NMAP端口扫描

    千次阅读 2019-01-13 16:36:22
    参数 -s:指定扫描协议 U:udp协议 T:tcp协议 ...[root@lwh ~]# nmap -sU 127.0.0.1 ##检测主机开放的udp端口 [root@lwh ~]# nmap -sT 127.0.0.1 ##检测主机开放的tcp端口 [root@lwh ~]# nmap -sO...
  • Kali内Nmap端口扫描与高级扫描

    千次阅读 2021-08-28 20:09:54
    高级Nmap扫描:TCP空闲扫描 使用Nmap进行端口扫描 -sS代表使用nmap执行一次隐秘的TCP扫描 -Pn代表nmap不会使用ping命令预先判断主机是否存活 【-Pn是默认目标主机存活的,适用于internet渗透测试环境,由于...
  • nmap端口扫描与测试

    千次阅读 2019-08-27 09:20:37
    3.扫描发现存活的目标主机 4.识别操作系统 5.识别目标主机的服务及版本 6.绕过防火墙扫描端口 实验环境 实验内容与完成情况 一、Nmap安装和扫描安装 (1)在Win7系统中安装Nmap 登陆官网进行下载 找到指定的下载...
  • -sP ping扫描Nmap扫描端口时,默认会使用ping扫描,只有主机存活Nmap才会继续扫描 -sU UDP扫描(不可靠) -sA 高级扫描方式,用于穿过防火墙 -sV 探测端口服务版本 -P0 扫描之前不需要使用ping(有些防

空空如也

空空如也

1 2 3 4 5 ... 20
收藏数 4,220
精华内容 1,688
关键字:

nmap快速扫描存活主机