簡介
NMap,也就是Network Mapper,是Linux下的網(wǎng)絡(luò)掃描和嗅探工具包。文中均已Linux下Nmap
5.21為主,其他版本類似。
功能包括:
一是探測一組主機是否在線;
二是掃描 主機端口,嗅探所提供的網(wǎng)絡(luò)服務(wù);
三是推斷主機所用的操作系統(tǒng) [separator]
2.參數(shù)說明
1. 格式:nmap [Scan Type(s)] [Options]
{target specification}
(1)-sL:我們可以稱之為蠻力掃描,它將目標(biāo)ip一個一個掃描過去,等待回應(yīng),不推薦
(2)-sP:采用ping模式掃描網(wǎng)段,arp獲取MAC地址,效果不大理想
(3)-PS:探測指定目標(biāo)開放的端口,在目標(biāo)開防火墻情況效果不好
(4)-sS:SYN掃描,即半開放掃描,不是一個完全的TCP鏈接,執(zhí)行效率高,隱蔽性較好。
(5)-sU:指定目標(biāo)UDP端口開放情況
(6)-O/-A:探測服務(wù)器操作系統(tǒng)類型
3.操作應(yīng)用
(1)查看該網(wǎng)段存在的主機,參數(shù)-sP (Linux區(qū)分大小寫,這里P大寫)
1. sudo nmap -sP 192.168.8.0/24
說明:192.168.8.0是一個網(wǎng)段,24是子網(wǎng)頁碼位數(shù),c類,返回結(jié)果如下:
1. Nmap scan report for bogon
(192.168.8.1)
2. Host is up (0.0036s latency).
3. MAC Address: 00:1F:33:BA:9A:EE
(Netgear) # 網(wǎng)關(guān)
4. Nmap scan report for bogon
(192.168.8.3)
5. Host is up (0.0069s latency).
6. MAC Address: 78:E4:00:27:3D:38
(Unknown) # 未知,一臺裝win7
7. Nmap scan report for bogon
(192.168.8.6)
8. Host is up (0.0089s latency).
9. MAC Address: 00:0D:56:FB:13:12 (Dell Pcba
Test) # dell主機,win2k3服務(wù)器
10. Nmap scan report for xiaoc-Studio-1458
(192.168.8.8)
11. Host is up.
12. Nmap scan report for bogon (192.168.8.9)
13. Host is up (0.032s latency).
14. MAC Address: B4:82:FE:BC:55:DE
(Unknown) # 未知,一臺裝winxp
15. Nmap scan report for bogon (192.168.8.10)
16. Host is up (0.077s latency).
17. MAC Address: 00:0D:56:FA:E9:C0 (Dell Pcba Test) #
dell主機,我用ubuntu搭建的
18. Nmap done: 256 IP addresses (6 hosts up) scanned in
5.13 seconds
總共開放了6臺主機。
(2)查看自身打開端口
1. sudo nmap -sTU localhost
返回結(jié)果如下:
1. rDNS record for 127.0.0.1:
localhost.localdomain
2. Not shown: 1989 closed ports
3.
PORT
STATE
SERVICE
4. 22/tcp
open
ssh
# ssh遠程管理
5. 80/tcp
open
http
# nginx的web服務(wù)
6. 139/tcp
open
netbios-ssn # 局域網(wǎng)共享
7. 445/tcp
open
microsoft-ds # 與window共享
8. 631/tcp
open
ipp
9. 3306/tcp
open
mysql
# mysql服務(wù)
10. 9000/tcp
open
cslistener # fcgi服務(wù)
11. 68/udp open|filtered
dhcpc
12. 137/udp
open
netbios-ns
13. 138/udp open|filtered netbios-dgm
14. 5353/udp open|filtered zeroconf
本機開放端口列表與對應(yīng)服務(wù)列表
(3) 探測指定目標(biāo)開放端口
1. sudo nmap -PS 192.168.8.10
返回結(jié)果:
1. Host is up (0.0012s latency).
2. Not shown: 996 closed ports
3. PORT
STATE SERVICE
4. 22/tcp open ssh
5. 80/tcp open
http
6. 139/tcp open netbios-ssn
7. 445/tcp open microsoft-ds
8. MAC Address: 00:0D:56:FA:E9:C0 (Dell Pcba
Test)
當(dāng)對方開了window自帶的防火墻掃描到端口就不準(zhǔn)確了,或者說都是沒用端口
(4)探測服務(wù)器操作系統(tǒng)類型
1. sudo nmap -O 192.168.8.6
2. sudo nmap -A 192.168.8.6
返回結(jié)果:
1. OS details: Microsoft Windows Server
2003 SP1 or SP2
探測Linux主機,返回了內(nèi)核版本號,返回結(jié)果如下:
1. OS details: Linux 2.6.17 - 2.6.31
對于window xp也返回如下:
1. Running: Microsoft Windows XP
2. OS details: Microsoft Windows XP SP2
3. Network Distance: 1 hop
4. Service Info: OS: Windows
5.
6. Host script results:
7. |_nbstat: NetBIOS name: CODEHACK, NetBIOS
user: <unknown>, NetBIOS MAC: b4:82:fe:bc:55:de
8. | smb-os-discovery:
9. | OS: Windows XP
(Windows 2000 LAN Manager)
10. | Name: WORKGROUPCODEHACK
11. |_ System time: 2010-10-19 15:56:08
UTC+8
12. |_smbv2-enabled: Server doesn’t support SMBv2
protocol
但是有一個不好缺點,目標(biāo)開啟防火墻,又可能造成無法探測。