Nmap使用教程 - 一

0x01 Nmap介绍linux

Nmap是一款网络扫描和主机检测的很是有用的工具。Nmap是不局限于仅仅收集信息和枚举,同时能够用来做为一个漏洞探测器或安全扫描器。它能够适用于winodws,linux,mac等操做系统,笔者这里建议直接使用Kali Linux,由于已经预装好了Nmap,能够省去安装步骤。安全

Nmap是一款很是强大的实用工具,可用于:网络

1.检测活在网络上的主机(主机发现)dom

2.检测主机上开放的端口(端口发现或枚举)ssh

3.检测到相应的端口(服务发现)tcp

4.软件版本检测脆弱性的漏洞(Nmap的脚本)工具

虽然Nmap更新了这么多年依旧没有什么太大的进步,但至今仍是信息搜集/主机扫描中的一个有着极其重要地位的工具
学习

本套教程笔者将以Nmap为中心,为你们分层次介绍Nmap,让读者由简入深的了解Nmap的扫描方法测试

Nmap下载地址:https://nmap.org/网站

0x02 入门扫描(无参数)

咱们在简单了解过nmap以后,咱们就直接切入正题,开始咱们的nmap扫描之旅

咱们打开一种终端,在终端中直接使用nmap来扫描一台主机:

 

root@kali-linux:~# nmap 192.168.1.1

Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-08 20:59 CST
Nmap scan report for 192.168.1.1
Host is up (0.012s latency).
Not shown: 997 filtered ports
PORT    STATE SERVICE
22/tcp  open  ssh
80/tcp  open  http
443/tcp open  https

Nmap done: 1 IP address (1 host up) scanned in 24.37 seconds

 

这里咱们直接使用了nmap <目标主机>这一基础语句来对一个主机进行扫描,很快便获取了这个主机开放的端口信息

固然,咱们除了能够直接扫描IP,也能够扫描网站:

root@kali-linux:~# nmap www.baidu.com

Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-08 21:02 CST
Nmap scan report for www.baidu.com (220.181.112.244)
Host is up (0.024s latency).
Other addresses for www.baidu.com (not scanned): 220.181.111.188
Not shown: 998 filtered ports
PORT    STATE SERVICE
80/tcp  open  http
443/tcp open  https

Nmap done: 1 IP address (1 host up) scanned in 11.35 seconds

这里咱们用百度作示范,扫描了百度的开放端口,也是使用了nmap <目标主机>的扫描语句

以上就是Nmap简单扫描单一主机的方法,那么当咱们想要扫描多个主机,或者是某个IP段内的主机时,咱们应该怎么办呢?

Nmap固然也支持了扫描多个IP/主机的扫描方式了:

root@kali-linux:~# nmap 220.181.112.244 220.181.112.243

Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-08 21:07 CST
Nmap scan report for 220.181.112.244
Host is up (0.027s latency).
Not shown: 998 filtered ports
PORT    STATE SERVICE
80/tcp  open  http
443/tcp open  https

Nmap scan report for 220.181.112.243
Host is up (0.032s latency).
Not shown: 999 filtered ports
PORT   STATE SERVICE
80/tcp open  http

Nmap done: 2 IP addresses (2 hosts up) scanned in 43.12 seconds

如上,这里咱们扫描了220.181.112.244与220.181.112.243这两个IP,

Nmap也按照顺序输出了扫描结果,这里咱们使用的语法是nmap <目标主机1> <目标主机2>

咱们要将扫描的主机用空格隔开,好比nmap 192.168.1.1<空格>192.168.1.100 ,这样就能够扫描192.168.1.1和192.168.1.100两台主机的信息了

而后咱们来测试一下扫描两个网站的主机信息:

 

root@kali-linux:~# nmap www.baidu.com www.bing.com

Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-08 21:13 CST
Nmap scan report for www.baidu.com (220.181.112.244)
Host is up (0.033s latency).
Other addresses for www.baidu.com (not scanned): 220.181.111.188
Not shown: 998 filtered ports
PORT    STATE SERVICE
80/tcp  open  http
443/tcp open  https

Nmap scan report for www.bing.com (202.89.233.104)
Host is up (0.034s latency).
Other addresses for www.bing.com (not scanned): 202.89.233.103
Not shown: 997 filtered ports
PORT    STATE  SERVICE
53/tcp  closed domain
80/tcp  open   http
443/tcp open   https

Nmap done: 2 IP addresses (2 hosts up) scanned in 45.69 seconds

 

这里咱们同时扫描了www.baidu.com与www.bing.com两个网站,也一样输出了主机信息

那么若是咱们想扫描一个网段的主机信息该怎么扫描呢?

root@kali-linux:~# nmap 192.168.1.0/24
Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-11 01:43 CST
Stats: 0:00:44 elapsed; 0 hosts completed (2 up), 256 undergoing Ping Scan

Nmap scan report for 192.168.1.101
Host is up (0.064s latency).
Not shown: 98 filtered ports
PORT     STATE  SERVICE
22/tcp   open   ssh
3389/tcp closed ms-wbt-server

Nmap scan report for 192.168.1.105
Host is up (0.056s latency).
Not shown: 97 filtered ports
PORT     STATE  SERVICE
22/tcp   open   ssh
80/tcp   open   http
3389/tcp closed ms-wbt-server

Nmap done: 256 IP addresses (2 hosts up) scanned in 91.04 seconds

咱们只须要更改一下搜索的目标就能够扫描,这里笔者扫描了192.168.1.0-255这一整个网段,利用的指令仍是nmap 192.168.1.0/24<目标网段>

这里须要注意的是,扫描一整个网段须要的时间较长,若是想要查看扫描进度能够在终端中按下Tab键即可以查看扫描进度

若是咱们不须要扫描整个网段,只须要扫描某个范围内的存活主机该怎么扫描呢?

root@kali-linux:~# nmap 192.168.1.100-200
Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-11 01:46 CST
Stats: 0:00:44 elapsed; 0 hosts completed (2 up), 100 undergoing Ping Scan

Nmap scan report for 192.168.1.101
Host is up (0.064s latency).
Not shown: 98 filtered ports
PORT     STATE  SERVICE
22/tcp   open   ssh
3389/tcp closed ms-wbt-server

Nmap scan report for 192.168.1.105
Host is up (0.056s latency).
Not shown: 97 filtered ports
PORT     STATE  SERVICE
22/tcp   open   ssh
80/tcp   open   http
3389/tcp closed ms-wbt-server

Nmap done: 100 IP addresses (2 hosts up) scanned in 43.01 seconds

这里咱们使用了nmap 192.168.1.100-200的指令,意思是扫描192.168.1.100到192.168.1.200这一IP段中存活的主机,咱们只须要将搜索目标的IP增长范围便可

 

小结:

在咱们的Nmap扫描教程第一节中,咱们学习了如何扫描单个主机/多个主机/整个网段以及某个IP段的存活主机信息

可是Nmap中还有许多有趣的扫描方式,这里咱们暂且不提,在下一节的教程中,咱们将学习不一样协议的扫描方式

对于本文的教程若是有问题能够加做者QQ:2245998470或者直接在本文下留言来询问,笔者将尽力解答

未完待续...

相关文章
相关标签/搜索