精华内容
下载资源
问答
  • Qt+nmap存活主机发现

    2018-11-05 19:53:37
    Qt和nmap存活主机发现示例。主机发现迅速,一个网段大约2s。先通过进程调用namp输出xml文件,再用Qt解析得到结果。
  • nmap命令扫描存活主机

    万次阅读 2019-09-24 12:04:15
    1、ping扫描扫描192.168.0.0/24网段上有哪些主机存活的; [root@laolinux ~]#nmap -sP 192.168.0.0/24 Starting Nmap 4.11 (http://www.insecure.org/nmap/) at 2009-04-25 06:59 CSTHost laolinux (192.168...
    1、ping扫描:扫描192.168.0.0/24网段上有哪些主机是存活的;
     
    [root@laolinux ~]# nmap -sP 192.168.0.0/24
    Starting Nmap 4.11 (  http://www.insecure.org/nmap/ ) at 2009-04-25 06:59 CST
    Host laolinux (192.168.0.3) appears to be up.
    Host 192.168.0.20 appears to be up.
    MAC Address: 00:1E:4F:CD:C6:0E (Unknown)
    Host 192.168.0.108 appears to be up.
    MAC Address: 00:E3:74:27:05:B7 (Unknown)
    Host 192.168.0.109 appears to be up.
    MAC Address: 00:E0:E4:A6:14:6F (Fanuc Robotics North America)
    Host 192.168.0.111 appears to be up.
    MAC Address: 00:E0:E4:A6:1C:91 (Fanuc Robotics North America)
    Host 192.168.0.114 appears to be up.
    MAC Address: 00:11:1A:35:38:65 (Motorola BCS)
    Host 192.168.0.118 appears to be up.
    MAC Address: 00:E0:2A:51:AC:5B (Tandberg Television AS)
    Host 192.168.0.119 appears to be up.
    MAC Address: 00:EA:E5:C1:21:D6 (Unknown)
    Host 192.168.0.124 appears to be up.
    MAC Address: 00:E0:4C:39:05:81 (Realtek Semiconductor)
    Host 192.168.0.127 appears to be up.
    MAC Address: 00:11:1A:35:38:62 (Motorola BCS)
    Host 192.168.0.128 appears to be up.
    MAC Address: 00:E0:E4:A6:1C:96 (Fanuc Robotics North America)
    Host 192.168.0.134 appears to be up.
    MAC Address: 00:E0:2A:51:AC:5F (Tandberg Television AS)
    Host 192.168.0.135 appears to be up.
    MAC Address: 00:11:1A:35:38:60 (Motorola BCS)
    Host 192.168.0.137 appears to be up.
    MAC Address: 00:1F:06:D6:3E:BA (Unknown)
    Host 192.168.0.139 appears to be up.
    MAC Address: 00:E0:E4:A6:1C:92 (Fanuc Robotics North America)
    Host 192.168.0.140 appears to be up.
    MAC Address: 00:1F:1A:39:1B:8D (Unknown)
    Host 192.168.0.155 appears to be up.
    MAC Address: 00:1C:23:4C:DB:A0 (Unknown)
    Host 192.168.0.211 appears to be up.
    MAC Address: 00:1D:72:98:A2:8C (Unknown)
    Host 192.168.0.220 appears to be up.
    MAC Address: 00:40:45:20:8C:93 (Twinhead)
    Host 192.168.0.221 appears to be up.
    MAC Address: 00:09:6B:50:71:26 (IBM)
    Nmap finished: 256 IP addresses (20 hosts up) scanned in 3.818 seconds
     
    2、端口扫描:扫描192.168.0.3这台主机开放了哪些端口;
     
    [root@laolinux ~]# nmap -sT 192.168.0.3
    Starting Nmap 4.11 (  http://www.insecure.org/nmap/ ) at 2009-04-25 07:02 CST
    Interesting ports on laolinux (192.168.0.3):
    Not shown: 1667 closed ports
    PORT      STATE SERVICE
    21/tcp    open  ftp
    22/tcp    open  ssh
    25/tcp    open  smtp
    53/tcp    open  domain
    80/tcp    open  http
    110/tcp   open  pop3
    111/tcp   open  rpcbind
    143/tcp   open  imap
    964/tcp   open  unknown
    993/tcp   open  imaps
    995/tcp   open  pop3s
    3306/tcp  open  mysql
    10000/tcp open  snet-sensor-mgmt
    Nmap finished: 1 IP address (1 host up) scanned in 4.755 seconds
    3、隐藏扫描,只在目标主机上留下很少的日志信息:隐藏扫描192.168.0.220
     
    [root@laolinux ~]# nmap -sS 192.168.0.127
    Starting Nmap 4.11 (  http://www.insecure.org/nmap/ ) at 2009-04-25 07:08 CST
    Interesting ports on 192.168.0.127:
    Not shown: 1675 closed ports
    PORT    STATE SERVICE
    21/tcp  open  ftp
    135/tcp open  msrpc
    139/tcp open  netbios-ssn
    445/tcp open  microsoft-ds
    912/tcp open  unknown
    MAC Address: 00:11:1A:35:38:62 (Motorola BCS)
    Nmap finished: 1 IP address (1 host up) scanned in 3.121 seconds
    4、UDP端口扫描:扫描192.168.0.127开放了哪些UDP端口;
     
    [root@laolinux ~]# nmap -sU 192.168.0.127
    Starting Nmap 4.11 (  http://www.insecure.org/nmap/ ) at 2009-04-25 07:08 CST
    Interesting ports on 192.168.0.127:
    Not shown: 1480 closed ports
    PORT     STATE         SERVICE
    123/udp  open|filtered ntp
    137/udp  open|filtered netbios-ns
    138/udp  open|filtered netbios-dgm
    445/udp  open|filtered microsoft-ds
    500/udp  open|filtered isakmp
    1900/udp open|filtered UPnP
    4500/udp open|filtered sae-urn
    MAC Address: 00:11:1A:35:38:62 (Motorola BCS)
    Nmap finished: 1 IP address (1 host up) scanned in 2.947 seconds
    5、操作系统识别:
     
    [root@laolinux ~]# nmap -sS -O  192.168.0.127
    Starting Nmap 4.11 (  http://www.insecure.org/nmap/ ) at 2009-04-25 07:09 CST
    Interesting ports on 192.168.0.127:
    Not shown: 1675 closed ports
    PORT    STATE SERVICE
    21/tcp  open  ftp
    135/tcp open  msrpc
    139/tcp open  netbios-ssn
    445/tcp open  microsoft-ds
    912/tcp open  unknown
    MAC Address: 00:11:1A:35:38:62 (Motorola BCS)
    Device type: general purpose
    Running: Microsoft Windows 2003/.NET|NT/2K/XP
    OS details: Microsoft Windows 2003 Server or XP SP2
    Nmap finished: 1 IP address (1 host up) scanned in 5.687 seconds

    转载于:https://www.cnblogs.com/xxxyz/p/11567531.html

    展开全文
  • python调用nmap扫描局域网存活主机和端口 文章目录python调用nmap扫描局域网存活主机和端口操作环境运行代码关键代码1. nm.scan(ip,port,args)2. 字典的解析运行结果参考文章 操作环境 python2 sudo apt install ...

    python调用nmap扫描局域网存活主机和端口

    操作环境

    python2

    sudo apt install nmap

    pip install nmap json

    运行代码

    sudo python2 scan.py

    代码经过调试,使用root可直接运行

    #!python2 
    # scan.py must be sudo to run
    import nmap
    import json
    
    nm = nmap.PortScanner()
    iprange = raw_input("input ip range(eg:192.168.224.0/24)>")
    port = raw_input("input target port(eg:8888)>")
    if not port:
    	port = 8888
    if not iprange:
        iprange = "192.168.224.0/24"
    print("scan ip range " + iprange)
    a = nm.scan(iprange, str(port), '-sS -O')
    a = a.get("scan")
    
    target = 0
    for key, value in a.items():
        if value.get("tcp").get(port).get("state") == "open":
            print "target ip maybe :" + key
            print "some information"
            print value
            target = target + 1
    
    if target == 0:
        print "no target machine detectd...."
    

    关键代码

    1. nm.scan(ip,port,args)

    请查阅参考文档一,有详细的解释

    返回的结果a形式如下:a是个字典

    {'nmap': {'scanstats': {'uphosts': '4', 'timestr': 'Sat Jun 27 13:29:19 2020', 'downhosts': '252', 'totalhosts': '256', 'elapsed': '9.86'}, 'scaninfo': {'tcp': {'services': '8888', 'method': 'syn'}}, 'command_line': 'nmap -oX - -p 8888 -sS -O 192.168.224.0/24'}, 'scan': {'192.168.224.132': {'status': {'state': 'up', 'reason': 'localhost-response'}, 'uptime': {'seconds': '1999559', 'lastboot': 'Thu Jun  4 10:03:20 2020'}, 'vendor': {}, 'addresses': {'ipv4': '192.168.224.132'}, 'tcp': {8888: {'product': '', 'state': 'open', 'version': '', 'name': 'sun-answerbook', 'conf': '3', 'extrainfo': '', 'reason': 'syn-ack', 'cpe': ''}}, 'hostnames': [{'type': '', 'name': ''}], 'osmatch': [{'osclass': [{'osfamily': 'Linux', 'vendor': 'Linux', 'cpe': ['cpe:/o:linux:linux_kernel:2.6.32'], 'type': 'general purpose', 'osgen': '2.6.X', 'accuracy': '100'}], 'line': '50174', 'name': 'Linux 2.6.32', 'accuracy': '100'}], 'portused': [{'state': 'open', 'portid': '8888', 'proto': 'tcp'}, {'state': 'closed', 'portid': '34334', 'proto': 'udp'}]}, '192.168.224.1': {'status': {'state': 'up', 'reason': 'arp-response'}, 'vendor': {'00:50:56:C0:00:08': 'VMware'}, 'addresses': {'mac': '00:50:56:C0:00:08', 'ipv4': '192.168.224.1'}, 'tcp': {8888: {'product': '', 'state': 'filtered', 'version': '', 'name': 'sun-answerbook', 'conf': '3', 'extrainfo': '', 'reason': 'no-response', 'cpe': ''}}, 'hostnames': [{'type': '', 'name': ''}], 'osmatch': [], 'portused': []}, '192.168.224.2': {'status': {'state': 'up', 'reason': 'arp-response'}, 'vendor': {'00:50:56:E8:9C:1A': 'VMware'}, 'addresses': {'mac': '00:50:56:E8:9C:1A', 'ipv4': '192.168.224.2'}, 'tcp': {8888: {'product': '', 'state': 'closed', 'version': '', 'name': 'sun-answerbook', 'conf': '3', 'extrainfo': '', 'reason': 'reset', 'cpe': ''}}, 'hostnames': [{'type': '', 'name': ''}], 'osmatch': [{'osclass': [{'osfamily': 'embedded', 'vendor': 'Aethra', 'cpe': ['cpe:/h:aethra:starvoice_1042'], 'type': 'broadband router', 'osgen': None, 'accuracy': '91'}], 'line': '1615', 'name': 'Aethra Starvoice 1042 ADSL router', 'accuracy': '91'}, {'osclass': [{'osfamily': 'AOS', 'vendor': 'APC', 'cpe': ['cpe:/o:apc:aos:5'], 'type': 'power-device', 'osgen': '5.X', 'accuracy': '91'}], 'line': '2920', 'name': 'APC AOS 5', 'accuracy': '91'}, {'osclass': [{'osfamily': 'SuperDOS', 'vendor': 'Bluebird', 'cpe': ['cpe:/o:bluebird:superdos'], 'type': 'general purpose', 'osgen': None, 'accuracy': '91'}], 'line': '9384', 'name': 'Bluebird SuperDOS', 'accuracy': '91'}, {'osclass': [{'osfamily': 'embedded', 'vendor': 'Brother', 'cpe': ['cpe:/h:brother:nc-130h'], 'type': 'print server', 'osgen': None, 'accuracy': '91'}], 'line': '9587', 'name': 'Brother NC-130h print server', 'accuracy': '91'}, {'osclass': [{'osfamily': 'embedded', 'vendor': 'Brother', 'cpe': ['cpe:/h:brother:hl-1870n'], 'type': 'printer', 'osgen': None, 'accuracy': '91'}], 'line': '9767', 'name': 'Brother HL-1870N printer', 'accuracy': '91'}, {'osclass': [{'osfamily': 'embedded', 'vendor': 'Brother', 'cpe': ['cpe:/h:brother:hl-2070n', 'cpe:/h:brother:mfc-5460cn'], 'type': 'printer', 'osgen': None, 'accuracy': '91'}], 'line': '9786', 'name': 'Brother HL-2070N or MFC-5460CN printer', 'accuracy': '91'}, {'osclass': [{'osfamily': 'embedded', 'vendor': 'Brother', 'cpe': ['cpe:/h:brother:hl-2070n'], 'type': 'printer', 'osgen': None, 'accuracy': '91'}], 'line': '9805', 'name': 'Brother HL-2070N printer', 'accuracy': '91'}, {'osclass': [{'osfamily': 'embedded', 'vendor': 'Brother', 'cpe': ['cpe:/h:brother:hl-5070n'], 'type': 'printer', 'osgen': None, 'accuracy': '91'}], 'line': '10112', 'name': 'Brother HL-5070N printer', 'accuracy': '91'}, {'osclass': [{'osfamily': 'embedded', 'vendor': 'Brother', 'cpe': ['cpe:/h:brother:mfc-7820n'], 'type': 'printer', 'osgen': None, 'accuracy': '91'}], 'line': '10480', 'name': 'Brother MFC-7820N printer', 'accuracy': '91'}, {'osclass': [{'osfamily': 'embedded', 'vendor': 'Brother', 'cpe': ['cpe:/h:brother:mfc-9420cn'], 'type': 'printer', 'osgen': None, 'accuracy': '91'}], 'line': '10595', 'name': 'Brother MFC-9420CN printer', 'accuracy': '91'}], 'portused': [{'state': 'closed', 'portid': '8888', 'proto': 'tcp'}]}, '192.168.224.254': {'status': {'state': 'up', 'reason': 'arp-response'}, 'vendor': {'00:50:56:F5:F1:1D': 'VMware'}, 'addresses': {'mac': '00:50:56:F5:F1:1D', 'ipv4': '192.168.224.254'}, 'tcp': {8888: {'product': '', 'state': 'filtered', 'version': '', 'name': 'sun-answerbook', 'conf': '3', 'extrainfo': '', 'reason': 'no-response', 'cpe': ''}}, 'hostnames': [{'type': '', 'name': ''}], 'osmatch': [], 'portused': []}}}
    

    2. 字典的解析

    为了更好地测试,最好使用jupyter或控制台去单步执行,去使用dict的get方法去逐步解析,防止错误

    for key, value in a.items():
        if value.get("tcp").get(port).get("state") == "open":
            print "target ip maybe :" + key
            print "some information"
            print value
            target = target + 1
    

    运行结果

    zhao@zhao:~/Desktop/project$ sudo python scan.py
    [sudo] password for zhao:
    input ip range(eg:192.168.224.0/24)>
    input target port(eg:8888)>
    scan ip range 192.168.224.0/24
    target ip maybe :192.168.224.132
    some information
    {'status': {'state': 'up', 'reason': 'localhost-response'}, 'uptime': {'seconds': '2001774', 'lastboot': 'Thu Jun  4 10:03:22 2020'}, 'vendor': {}, 'addresses': {'ipv4': '192.168.224.132'}, 'tcp': {8888: {'product': '', 'state': 'open', 'version': '', 'name': 'sun-answerbook', 'conf': '3', 'extrainfo': '', 'reason': 'syn-ack', 'cpe': ''}}, 'hostnames': [{'type': '', 'name': ''}], 'osmatch': [{'osclass': [{'osfamily': 'Linux', 'vendor': 'Linux', 'cpe': ['cpe:/o:linux:linux_kernel:2.6.32'], 'type': 'general purpose', 'osgen': '2.6.X', 'accuracy': '100'}], 'line': '50174', 'name': 'Linux 2.6.32', 'accuracy': '100'}], 'portused': [{'state': 'open', 'portid': '8888', 'proto': 'tcp'}, {'state': 'closed', 'portid': '30317', 'proto': 'udp'}]}
    
    

    参考文章

    1. Python中python-nmap模块的使用

    2. nmap命令扫描存活主机

    展开全文
  • nmap扫描主机存活情况

    千次阅读 2019-03-26 16:18:00
    nmap -sP --min-hostgroup 1024 --min-parallelism 1024 -iL ip.txt -oG ip_output1113.txt –min-hostgroup 1024(调整并行扫描组的大小,最小分组设置为1024) –min-parallelism 1024(调整探测报文的并行度,...
    nmap -sP -iL ip.txt -oG ip_output.txt
    

    -sP (Ping扫描)

    -iL(从列表中输入)

    -oG (Grep输出)

     nmap -sP --min-hostgroup 1024 --min-parallelism 1024 -iL ip.txt -oG ip_output1113.txt
    

    –min-hostgroup 1024(调整并行扫描组的大小,最小分组设置为1024)

    –min-parallelism 1024(调整探测报文的并行度,最小并行度设置为1024)

    转载于:https://my.oschina.net/u/1771419/blog/3028091

    展开全文
  • 利用nmap批量扫描存活主机 知识储备:grep,nmap 一、安装nmap 1.安装编译环境 [root@arppinging nmap-7.01]# yum install gcc g++ gcc-c++ -y 2.使用wget下载nmap [root@arppinging nmap-7.01]# wget ...

    利用nmap批量扫描存活主机

    知识储备:grep,nmap

    一、安装nmap

    1.安装编译环境

    [root@arppinging nmap-7.01]# yum install gcc g++ gcc-c++ -y

    2.使用wget下载nmap

    [root@arppinging nmap-7.01]# wget http://nmap.org/dist/nmap-7.01.tar.bz2

    3.解压下载的安装包

    [root@arppinging nmap-7.01]# tar -vxf nmap-7.01.tar.bz2 

    4.进入文件夹编译安装

    [root@arppinging nmap-7.01]# cd nmap-7.01
    [root@arppinging nmap-7.01]# ./configure 
    [root@arppinging nmap-7.01]# make
    [root@arppinging nmap-7.01]# make install

    5.检查安装是否成功

    [root@arppinging nmap-7.01]# nmap -v

    使用nmap

    1.sn参数
    -sn: Ping Scan - disable port scan #ping探测扫描主机, 不进行端口扫描
    2.扫描不存在的主机

    Starting Nmap 7.01 ( https://nmap.org ) at 2018-05-24 00:30 CST
    Warning: File ./nmap-payloads exists, but Nmap is using /usr/local/bin/../share/nmap/nmap-payloads for security and consistency reasons.  set NMAPDIR=. to give priority to files in your local directory (may affect the other data files too).
    Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
    Nmap done: 1 IP address (0 hosts up) scanned in 0.49 seconds
    [root@arppinging nmap-7.01]# 

    3.扫描存在的主机

    [root@arppinging nmap-7.01]# nmap -sn 172.25.65.100
    .
    Starting Nmap 7.01 ( https://nmap.org ) at 2018-05-24 00:31 CST
    Warning: File ./nmap-payloads exists, but Nmap is using /usr/local/bin/../share/nmap/nmap-payloads for security and consistency reasons.  set NMAPDIR=. to give priority to files in your local directory (may affect the other data files too).
    Stats: 0:00:00 elapsed; 0 hosts completed (0 up), 1 undergoing ARP Ping Scan
    ARP Ping Scan Timing: About 100.00% done; ETC: 00:31 (0:00:00 remaining)
    Nmap scan report for 172.25.65.100
    Host is up (0.00025s latency).
    MAC Address: 2C:FD:A1:E1:EA:DB (Unknown)
    Nmap done: 1 IP address (1 host up) scanned in 0.17 seconds

    对比发现,存在的主机都有Nmap scan report for字段

    创建脚本

    1.脚本如下

    [root@arppinging scripts]# cat host.sh 
    #/bin/bash -
    read -p "Please input scan host or network:" host
    nmap -sn $host | grep "Nmap scan report for" >/dev/null &>/dev/null
    [ $? -ne 0 ] && echo "host $host is down." && exit 1
    nmap -sn $host  | grep "Nmap scan report for" | awk '{print $5}' > /scripts/host.txt
    while read uphost
    do
     echo "host $uphost is up."
    done</scripts/host.txt
    [root@arppinging scripts]# 

    2.运行脚本(真实环境下)

    [root@localhost scripts]# bash host.sh
    Please input scan host or network:172.25.65.0/24
    host 172.25.65.1 is up.
    host 172.25.65.2 is up.
    host 172.25.65.50 is up.
    host 172.25.65.100 is up.
    host 172.25.65.101 is up.
    host 172.25.65.102 is up.
    host 172.25.65.103 is up.
    host 172.25.65.104 is up.
    host 172.25.65.105 is up.
    host 172.25.65.106 is up.
    host 172.25.65.107 is up.
    host 172.25.65.108 is up.
    host 172.25.65.109 is up.
    host 172.25.65.110 is up.
    host 172.25.65.111 is up.
    host 172.25.65.112 is up.
    host 172.25.65.113 is up.
    host 172.25.65.114 is up.
    host 172.25.65.115 is up.
    host 172.25.65.116 is up.
    host 172.25.65.117 is up.
    host 172.25.65.118 is up.
    host 172.25.65.119 is up.
    host 172.25.65.120 is up.
    host 172.25.65.121 is up.
    host 172.25.65.122 is up.
    host 172.25.65.123 is up.
    host 172.25.65.124 is up.
    host 172.25.65.125 is up.
    host 172.25.65.126 is up.
    host 172.25.65.127 is up.
    host 172.25.65.128 is up.
    host 172.25.65.129 is up.
    host 172.25.65.130 is up.
    host 172.25.65.131 is up.
    host 172.25.65.132 is up.
    host 172.25.65.133 is up.
    host 172.25.65.134 is up.
    host 172.25.65.135 is up.
    host 172.25.65.136 is up.
    host 172.25.65.137 is up.
    host 172.25.65.138 is up.
    host 172.25.65.139 is up.
    host 172.25.65.141 is up.
    host 172.25.65.143 is up.
    host 172.25.65.145 is up.
    host 172.25.65.146 is up.
    host 172.25.65.147 is up.
    host 172.25.65.148 is up.
    host 172.25.65.149 is up.
    host 172.25.65.150 is up.
    host 172.25.65.151 is up.
    host 172.25.65.152 is up.
    host 172.25.65.10 is up.
    
    主机不存在的情况
    [root@localhost scripts]# bash host.sh
    Please input scan host or network:172.25.65.199
    host 172.25.65.199 is down.
    [root@localhost scripts]# 

    有问题的话请评论吧,谢谢

    arppinging技术社区
    欢迎关注的我的个人微信公众号

    二维码

    展开全文
  • Python之nmap-ping扫描探测主机存活

    千次阅读 2018-11-24 21:35:41
    其实在这篇文章之前本人已讲述一篇关于ICMP协议探测主机的文章...但是功能不比scapy少,因为nmap不但可以探测主机存活、端口等功能,还可以发送大量数据包探测主机开放端口号下的版本或...
  • Nmap主机端口扫描

    2020-04-19 20:30:40
    主机端口扫描 前言 一、nmap简介 Nmap是一个网络连接端扫描软件,用来扫描网上电脑开放的网络连接端。确定哪服务运行在那些连接端,并且推断哪个操作系统计算机运行(这是亦称fingerprinting)。 它是网络管理员必用...
  • 局域网主机存活发现主机发现使用命令结果输出 主机发现 一个局域网之中存在多台设备,获取哪些设备处于开机状态可以使用ping IP地址一个ip一个ip的去实验,但是如果一个网络很大的情况下,这样手工探测会非常耗时和...
  • 关键词:主机扫描,主机存活,纯python版本,非nmap 时间: 2014/1/21 在内网渗透的时候,如果贸然安装安装namp等扫描工具,则很容易被发现,我抽时间写了个python脚本,使用ping工具来监测主机存活情况。我写的...
  • 使用环境:Raspberry 3b+ +netifaces+python-nmap+nmap 调用netifaces自动获取ip地址: def get_gateways(): return netifaces.gateways()['default'][netifaces.AF_INET][0] 将ip地址生成一个网段中所有ip...
  • nmap是一个网络连接端扫描软件,用来扫描网上电脑开放的网络连接端。确定哪些服务运行在哪些连接端,并且推断计算机运行哪个操作系统(这是亦称 fingerprinting)。它是网络管理员必用的软件之一,以及用以评估网络...
  • 主机扫描类型 1.-sL(列表扫描) 不对目标主机的端口发送数据的请求 2.-sP(Ping扫描) 发送一个ping请求,判断主机是否存活 3.-P0(无Ping扫描) 在扫描的过程中,不管对方主机是否存活,可以执行其他任务,比如操作系统...
  • nmap查看局域网存活主机

    千次阅读 2019-10-03 21:06:16
    nmap是一个非常强大的扫描工具一个著名的扫描大王 用nmap进行局域网扫描 先用查看一下ip段 ifconfig 然后用 nmap -sP 192.168.43.0/24 -sP是ping扫描,24是扫描到255 ...
  • nmap其基本功能有三个,一是探测一组主机是否在线;其次是扫描主机端口,嗅探所提供的网络服务;还可以推断主机所用的操作系统 。 这是百度给的介绍:...
  • Nmap——端口扫描

    2020-10-12 10:47:28
    TCP扫描 nmap -sT 扫描流程: 发送SYN 回复ACK则是LISTEN,回复RST则CLOSED 回复ACK 扫描特征:容易被察觉 SYN半开放扫描 nmap -sS 扫描流程: 发送SYN 回复ACK+SYN 则LISTEN 回复RST 则CLOSED 不回复 则过滤了 ...
  • nmap安装和扫描测试

    2019-06-20 09:46:24
    扫描发现存活的目标主机 识别操作系统 识别目标主机的服务及版本 绕过防火墙扫描端口 实验环境简述图: 一、Nmap安装和扫描安装 (1)在Win7系统中安装Nmap 登陆官网进行下载 找到指定的下载链接 在win7下下载...
  • Python 局域网扫描存活主机开放端口

    千次阅读 2019-01-07 14:19:08
    ''' Python 局域网扫描存活主机开放端口 by 郑...3、nmap扫描存活主机开放端口 #注: 若在Linux系统下 ping -n 改为 ping -c 若在windows系统下 ping -n 不变 ''' import nmap import socket import os import t...
  • nmap扫描内网主机

    千次阅读 2015-10-10 13:34:59
    无论是内网***测试、外网***...扫描的目的分为几步:1、确认主机是否存活;2、确认主机的操作系统;3、确认主机所运行的组件;4、针对组件上的版本的漏洞展开***。下面是操作步骤:1、确认主机是否存活nmap - sP IP...
  • 在使用 nmap 扫描时,得到如下结果: 结果1: Interesting ports on 172.22.43.23: PORT STATE SERVICE 22/tcp open ssh Interesting ports on 172.22.43.24: PORT STATE SERVICE 22/tcp open ssh ...
  • nmap快速扫描大量主机端口方法

    千次阅读 2020-03-16 22:04:28
    今天参加了某单位的风险评估项目,在做风险评估之前需要对目标进行信息收集,我使用msf对两个目标网段做了存活主机探测,之后发现了有70个存活主机,第二步需要对存活主机进行端口扫描,这一步最开始耽误了我不少...
  • 使用Nmap扫描目标主机

    2021-04-13 22:17:48
    端口扫描是指某些别有用心的人发送一组端口扫描消息,试图以此侵入某台计算机,并...目前在市面上主要的端口扫描工具是X_Scan、SuperScan、nmap,其中在这里主推的是nmap Nmap包含四项基本功能: 主机发现(Host .
  • Nmap主机发现

    2020-11-06 20:34:14
    文章目录0x00 主机发现原理0x01 基本扫描0x02 Ping扫描0x03 无Ping扫描0x04 TCP SYN Ping扫描0x05 TCP ACK Ping扫描0x06 UDP Ping扫描0x07 ICMP Ping Types扫描0x08 ARP Ping扫描0x09 列表扫描0x10 禁止反向域名解析...
  • 存活主机发现(基于nmap和Qt)

    千次阅读 2018-11-05 19:56:03
    1.下载nmap并安装。下载地址:nmap。 2.nmap可以将输出结果定向为xml文件。...nmap主机发现命令:nmap -sn -PE -n --min-hostgroup 1024 --min-parallelism 1024 -PE 1-254 -oX nmap_output.xml。一个网段大概2s...
  • 第5章 批量主机扫描批量主机服务扫描目的: 1、批量主机存活扫描。 2、针对主机服务扫描作用:1、能更方便快捷获取网络中主机的存活状态。2、更加细致、智能获取主机服务侦査情况。典型命令:nmap、ncatnmap命令的...
  • 本文通过介绍三款工具(nmap、fping、ettercap)分别对网络存活主机进行探测,让我们一起学习! 二、资源装备 1.安装好Kali Linux的虚拟机一台; 2.整装待发的小白一个。 三、战略安排 3.1 查看nmap帮助信息,寻找...
  • Nmap是一款网络扫描主机检测的非常有用的工具。Nmap是不局限于仅仅收集信息和枚举,同时可以用来作为一个漏洞探测器或安全扫描器。它可以适用于winodws,linux,mac等操作系统 Nmap是一款非常强大的实用工具,可用于...

空空如也

空空如也

1 2 3 4 5 ... 20
收藏数 4,175
精华内容 1,670
关键字:

nmap存活主机扫描