掃描--nmapvim
語法格式
nmap [掃描類型] [選項] <掃描目標 ...>
掃描類型
-sS,TCP SYN掃描(半開)bash
-sT,TCP 鏈接掃描(全開)
-sU,UDP掃描
-sP,ICMP掃描
-A,目標系統全面分析( -O(OS檢測)、-sV(版本檢測)、-sC(腳本檢測)、traceroute跟蹤)網絡
-n 不作解析tcp
選項
-p 80
-p 21,23,25,53,80
-p 20-110
-p 20-110,3306,11211工具
目標地址的表示方式
172.40.55.110
172.40.55.110-120
172.40.55.111,131,117,127
172.40.55.100-200 --exclude 172.40.55.127,172.40.55.131命令行
vim /tmp/ipout.txt
172.40.55.127
172.40.55.131
172.40.55.191接口
172.40.55.100-200 --excludefile /tmp/ipout.txtip
vim /root/checkhttp.sh
#!/bin/bash
x=0
for host in 131 127 139 209 114 117
do
nmap -sS -p 80 172.40.55.$host | grep -q open
if [ $? -eq 0 ];then
echo "172.40.55.$host httpd running"
else
echo "172.40.55.$host httpd stopped"
let x++
fi
done
echo "httpd down is $x"
+++++++++++++++++++++++++++++++++++++++++++++
抓包--tcpdump
tcpdump 一款提取TCP數據包的命令行工具監控
命令格式
tcpdump [選項] [過濾條件] ftp
選項
-i,指定監控的網絡接口 默認抓eth0
-A,轉換爲 ACSII 碼,以方便閱讀
-w,將數據包信息保存到指定文件
-r,從指定文件讀取數據包信息
-c 指定抓包個數
tcpdump的過濾條件
類型:host、net、port、portrange
方向:src(源地址)、dst(目標地址)
協議:tcp、udp、ip、wlan、arp
多個條件組合:and、or、not
+++++++++++++++++++++++++++++++++++++++++++++
#tcpdump -A dst host 192.168.4.100 and tcp port 110
#tcpdump -A -w ftp007.cap host 192.168.4.5 and tcp port 21
#tcpdump -A -r ftp007.cap(讀這個文件)
+++++++++++++++++++++++++++++++++++++++協議分析 WireShark