官术网_书友最值得收藏!

The network mapper (Nmap)

Nmap is the top dog in port scanning and enumeration. Covering all options and modules of Nmap in this guide is outside the scope of this book; instead, we will cover the scans that I mostly use when testing. But first, here's some info on port states:

  • Open: An application on the target machine is listening for connections/packets on that port
  • Closed: Ports have no application listening on them, though they could open up at any time
  • Filtered: A firewall, filter, or other network obstacle is blocking the port so that Nmap cannot tell whether it is open or closed


The following are the Nmap options available:

  • O: OS detection
  • p: Port scan
  • p-: Scan all ports (1-65535)
  • p 80,443: Scan port 80 and 443
  • p 22-1024: Scan ports 22 through 1024
  • top-ports X: X is a number and it will scan X number of the top popular ports; I usually use 100 for a quick scan
  • sV: Service-detection
  • Tx: Set scan speed
  • T1: Really slow port scan
  • T5: Really fast port scan (really noisy)
  • sS: Stealth scan
  • sU: UDP scan
  • A: OS-detection, version-detection, script-scanning, and traceroute
主站蜘蛛池模板: 旺苍县| 邵阳市| 屯门区| 朝阳区| 砀山县| 保亭| 新田县| 屯昌县| 军事| 新田县| 普安县| 盐源县| 柳州市| 桂平市| 会泽县| 长岛县| 嘉祥县| 金山区| 武乡县| 海安县| 普格县| 乐清市| 松阳县| 中超| 益阳市| 岫岩| 舞阳县| 秦安县| 扎赉特旗| 清丰县| 庐江县| 宝山区| 沙坪坝区| 紫阳县| 正定县| 张掖市| 沙坪坝区| 昭苏县| 阳城县| 仲巴县| 武鸣县|