0x01 Nmap介绍linux
Nmap是一款网络扫描和主机检测的很是有用的工具。Nmap是不局限于仅仅收集信息和枚举,同时能够用来做为一个漏洞探测器或安全扫描器。它能够适用于winodws,linux,mac等操做系统,笔者这里建议直接使用Kali Linux,由于已经预装好了Nmap,能够省去安装步骤。安全
Nmap是一款很是强大的实用工具,可用于:网络
1.检测活在网络上的主机(主机发现)dom
2.检测主机上开放的端口(端口发现或枚举)ssh
3.检测到相应的端口(服务发现)tcp
4.软件版本检测脆弱性的漏洞(Nmap的脚本)工具
虽然Nmap更新了这么多年依旧没有什么太大的进步,但至今仍是信息搜集/主机扫描中的一个有着极其重要地位的工具
学习
本套教程笔者将以Nmap为中心,为你们分层次介绍Nmap,让读者由简入深的了解Nmap的扫描方法测试
Nmap下载地址:https://nmap.org/网站
0x02 入门扫描(无参数)
咱们在简单了解过nmap以后,咱们就直接切入正题,开始咱们的nmap扫描之旅
咱们打开一种终端,在终端中直接使用nmap来扫描一台主机:
root@kali-linux:~# nmap 192.168.1.1 Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-08 20:59 CST Nmap scan report for 192.168.1.1 Host is up (0.012s latency). Not shown: 997 filtered ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 443/tcp open https Nmap done: 1 IP address (1 host up) scanned in 24.37 seconds
这里咱们直接使用了nmap <目标主机>这一基础语句来对一个主机进行扫描,很快便获取了这个主机开放的端口信息
固然,咱们除了能够直接扫描IP,也能够扫描网站:
root@kali-linux:~# nmap www.baidu.com Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-08 21:02 CST Nmap scan report for www.baidu.com (220.181.112.244) Host is up (0.024s latency). Other addresses for www.baidu.com (not scanned): 220.181.111.188 Not shown: 998 filtered ports PORT STATE SERVICE 80/tcp open http 443/tcp open https Nmap done: 1 IP address (1 host up) scanned in 11.35 seconds
这里咱们用百度作示范,扫描了百度的开放端口,也是使用了nmap <目标主机>的扫描语句
以上就是Nmap简单扫描单一主机的方法,那么当咱们想要扫描多个主机,或者是某个IP段内的主机时,咱们应该怎么办呢?
Nmap固然也支持了扫描多个IP/主机的扫描方式了:
root@kali-linux:~# nmap 220.181.112.244 220.181.112.243 Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-08 21:07 CST Nmap scan report for 220.181.112.244 Host is up (0.027s latency). Not shown: 998 filtered ports PORT STATE SERVICE 80/tcp open http 443/tcp open https Nmap scan report for 220.181.112.243 Host is up (0.032s latency). Not shown: 999 filtered ports PORT STATE SERVICE 80/tcp open http Nmap done: 2 IP addresses (2 hosts up) scanned in 43.12 seconds
如上,这里咱们扫描了220.181.112.244与220.181.112.243这两个IP,
Nmap也按照顺序输出了扫描结果,这里咱们使用的语法是nmap <目标主机1> <目标主机2>
咱们要将扫描的主机用空格隔开,好比nmap 192.168.1.1<空格>192.168.1.100 ,这样就能够扫描192.168.1.1和192.168.1.100两台主机的信息了
而后咱们来测试一下扫描两个网站的主机信息:
root@kali-linux:~# nmap www.baidu.com www.bing.com Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-08 21:13 CST Nmap scan report for www.baidu.com (220.181.112.244) Host is up (0.033s latency). Other addresses for www.baidu.com (not scanned): 220.181.111.188 Not shown: 998 filtered ports PORT STATE SERVICE 80/tcp open http 443/tcp open https Nmap scan report for www.bing.com (202.89.233.104) Host is up (0.034s latency). Other addresses for www.bing.com (not scanned): 202.89.233.103 Not shown: 997 filtered ports PORT STATE SERVICE 53/tcp closed domain 80/tcp open http 443/tcp open https Nmap done: 2 IP addresses (2 hosts up) scanned in 45.69 seconds
这里咱们同时扫描了www.baidu.com与www.bing.com两个网站,也一样输出了主机信息
那么若是咱们想扫描一个网段的主机信息该怎么扫描呢?
root@kali-linux:~# nmap 192.168.1.0/24 Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-11 01:43 CST Stats: 0:00:44 elapsed; 0 hosts completed (2 up), 256 undergoing Ping Scan Nmap scan report for 192.168.1.101 Host is up (0.064s latency). Not shown: 98 filtered ports PORT STATE SERVICE 22/tcp open ssh 3389/tcp closed ms-wbt-server Nmap scan report for 192.168.1.105 Host is up (0.056s latency). Not shown: 97 filtered ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 3389/tcp closed ms-wbt-server Nmap done: 256 IP addresses (2 hosts up) scanned in 91.04 seconds
咱们只须要更改一下搜索的目标就能够扫描,这里笔者扫描了192.168.1.0-255这一整个网段,利用的指令仍是nmap 192.168.1.0/24<目标网段>
这里须要注意的是,扫描一整个网段须要的时间较长,若是想要查看扫描进度能够在终端中按下Tab键即可以查看扫描进度
若是咱们不须要扫描整个网段,只须要扫描某个范围内的存活主机该怎么扫描呢?
root@kali-linux:~# nmap 192.168.1.100-200 Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-11 01:46 CST Stats: 0:00:44 elapsed; 0 hosts completed (2 up), 100 undergoing Ping Scan Nmap scan report for 192.168.1.101 Host is up (0.064s latency). Not shown: 98 filtered ports PORT STATE SERVICE 22/tcp open ssh 3389/tcp closed ms-wbt-server Nmap scan report for 192.168.1.105 Host is up (0.056s latency). Not shown: 97 filtered ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 3389/tcp closed ms-wbt-server Nmap done: 100 IP addresses (2 hosts up) scanned in 43.01 seconds
这里咱们使用了nmap 192.168.1.100-200的指令,意思是扫描192.168.1.100到192.168.1.200这一IP段中存活的主机,咱们只须要将搜索目标的IP增长范围便可
小结:
在咱们的Nmap扫描教程第一节中,咱们学习了如何扫描单个主机/多个主机/整个网段以及某个IP段的存活主机信息
可是Nmap中还有许多有趣的扫描方式,这里咱们暂且不提,在下一节的教程中,咱们将学习不一样协议的扫描方式
对于本文的教程若是有问题能够加做者QQ:2245998470或者直接在本文下留言来询问,笔者将尽力解答
未完待续...