nmap 192.168.1.63
Starting Nmap 5.21 ( http://nmap.org ) at 2015-08-16 20:38 CST Nmap scan report for xuegod63.cn (192.168.1.63) Host is up (0.000029s latency). Not shown: 998 closed ports PORT STATE SERVICE 22/tcp open ssh 111/tcp open rpcbind
nmap -v 192.168.1.63 #查看以下相关信息。
Starting Nmap 6.40 ( http://nmap.org ) at 2018-12-12 10:07 CST Initiating ARP Ping Scan at 10:07 Scanning 192.168.1.63 [1 port] Completed ARP Ping Scan at 10:07, 0.01s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 10:07 Completed Parallel DNS resolution of 1 host. at 10:07, 0.04s elapsed Initiating SYN Stealth Scan at 10:07 Scanning 192.168.1.63 [1000 ports] Discovered open port 111/tcp on 192.168.1.63 Discovered open port 22/tcp on 192.168.1.63 Completed SYN Stealth Scan at 10:07, 0.05s elapsed (1000 total ports) Nmap scan report for 192.168.1.63 Host is up (0.00025s latency). Not shown: 998 closed ports PORT STATE SERVICE 22/tcp open ssh 111/tcp open rpcbind MAC Address: 00:0C:29:F0:FC:4F (VMware)
systemctl stop rpcbind
lsof -i :22 #查看 22 端口正在被哪个进程使用 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME sshd 1089 root 3u IPv4 21779 0t0 TCP *:ssh (LISTEN)
ps -axu | grep 1089 root 1089 0.0 0.1 105996 3744 ? Ss 10:52 0:00 /usr/sbin/sshd -D
which vim /usr/bin/vim
kill -9 1781
nmap -sS -O www.xuegod.cn
Not shown: 996 filtered ports PORT STATE SERVICE 21/tcp open ftp 80/tcp open http 443/tcp closed https 3306/tcp open mysql Aggressive OS guesses: Linux 2.6.28 (93%), Linux 2.6.9 - 2.6.27 (93%), Riverbed Steelhead 200 proxy server (93%), Linux 2.6.9 (93%), Linux 2.6.30 (92%), Linux 2.6.9 (CentOS 4.4) (92%), Linux 2.6.11 (90%), Linux 2.6.18 (CentOS 5.1, x86) (89%), FreeBSD 6.2-RELEASE (89%), Linux 2.6.18 (89%) No exact OS matches for host (test conditions non-ideal).
nmap -sS -O 192.168.1.0/24
nmap -v -p 80 192.168.1.62-67
--randomize_hosts # 随机扫描,对目标主机的顺序随机划分
--scan-delay #延时扫描,单位秒,调整探针之间的延迟
nmap -v --randomize-hosts -p 80 192.168.1.62-69
Nmap scan report for 192.168.1.69 [host down] Nmap scan report for 192.168.1.68 [host down] Nmap scan report for 192.168.1.67 [host down] Nmap scan report for 192.168.1.65 [host down] Nmap scan report for 192.168.1.66 [host down]
nmap -v --randomize-hosts --scan-delay 3000ms -p 80 192.168.1.62-69
nmap -v --randomize-hosts --scan-delay 30 -p 80 1.*.2.3-8
用户在服务器端设定好 nmap 执行的命令,dnmap 会自动的分配给客户端进行扫描,并将扫描结果提交给服务器。dnmap 有两个可执行文件,分别是 dnmap_client 和 dnmap_server。在进行一个分布式 nmap扫描之前,我们可以用 dnmap_server 来生成一个 dnmap 的服务端,然后在其他机器用 dnmap_client进行连接。然后就能进行分布式的 nmap 扫描了。
原文:https://www.cnblogs.com/updown/p/14408168.html