|
作者: gefujian [gefujian] 论坛用户 | 登录 |
可以给我提供相关网站或资料,谢谢! 在CMD命令行的! |
地主 发表时间: 01/07 16:08 |
回复: cookiy [cookiy_lei] 论坛用户 | 登录 |
http://www.chinaitlab.com/www/news/article_show.asp?id=6871 |
B1层 发表时间: 01/07 21:08 |
回复: vishx [vishx] 论坛用户 | 登录 |
用XSCAN吧 |
B2层 发表时间: 01/08 16:48 |
回复: xmgu [xmgu] 论坛用户 | 登录 |
Nmap V. 2.54BETA36 Usage: nmap [Scan Type(s)] [Options] <host or net list> Some Common Scan Types ('*' options require root privileges) -sT TCP connect() port scan (default) * -sS TCP SYN stealth port scan (best all-around TCP scan) * -sU UDP port scan -sP ping scan (Find any reachable machines) * -sF,-sX,-sN Stealth FIN, Xmas, or Null scan (experts only) -sR/-I RPC/Identd scan (use with other scan types) Some Common Options (none are required, most can be combined): * -O Use TCP/IP fingerprinting to guess remote operating system -p <range> ports to scan. Example range: '1-1024,1080,6666,31337' -F Only scans ports listed in nmap-services -v Verbose. Its use is recommended. Use twice for greater effect. -P0 Don't ping hosts (needed to scan www.microsoft.com and others) * -Ddecoy_host1,decoy2[,...] Hide scan using many decoys -T <Paranoid|Sneaky|Polite|Normal|Aggressive|Insane> General timing polic -n/-R Never do DNS resolution/Always resolve [default: sometimes resolve] -oN/-oX/-oG <logfile> Output normal/XML/grepable scan logs to <logfile> -iL <inputfile> Get targets from file; Use '-' for stdin * -S <your_IP>/-e <devicename> Specify source address or network interface --interactive Go into interactive mode (then press h for help) --win_help Windows-specific features Example: nmap -v -sS -O www.my.com 192.168.0.0/16 '192.88-90.*.*' SEE THE MAN PAGE FOR MANY MORE OPTIONS, DESCRIPTIONS, AND EXAMPLES |
B3层 发表时间: 01/09 11:17 |
回复: hl82 [hl82] 论坛用户 | 登录 |
就是! |
B4层 发表时间: 01/09 18:37 |
回复: sadboy [chiruwn] 论坛用户 | 登录 |
NMAP的参数: -sT TCP : connect()扫描 -sS : TCP SYN扫描 -sF -sX -sN : FIN扫描,Xmas Tree扫描,NULL扫描 -sP : ping扫描 -sR : RPC扫描 -PO : 扫描前不尝试ping主机 -PT : 用TCP的ping来确定主机是否打开 -v : 详细模式,可带来更多的信息 -h : 帮助 -o <logfilename> : 用来指定一个放置扫描结果的文件参数 |
B5层 发表时间: 01/10 12:33 |
回复: bking [bking] 版主 | 登录 |
太酷了! |
B6层 发表时间: 01/10 14:12 |
回复: xmgu [xmgu] 论坛用户 | 登录 |
一般的用法:nmap -sT -O 192.168.0.1 |
B7层 发表时间: 01/10 15:41 |
|
20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon
粤ICP备05087286号