對一個大範圍的網絡或活躍的主機進行滲透測試,必需要了解這些主機上所打開的端口號。在Kali Linux中默認提供了Nmap和Zenmap兩個掃描端口工具。爲了訪問目標系統中打開的TCP和UDP端口,本節將介紹Nmap和Zenmap工具的使用。mysql
使用Nmap工具查看目標主機192.168.41.136上開放的端口號。執行命令以下所示:ios
root@kali:~# nmap 192.168.41.136 Starting Nmap 6.40 ( http://nmap.org ) at 2014-04-19 16:21 CST Nmap scan report for www.benet.com (192.168.41.136) Host is up (0.00022s latency). Not shown: 996 closed ports PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 23/tcp open telnet 25/tcp opne smtp 53/tcp open domain 80/tcp open http 111/tcp open rpcbind 139/tcp open netbios-ssn 445/tcp open microsoft-ds 512/tcp open exec 513/tcp open login 514/tcp open shell 1099/tcp open rmiregistry 1524/tcp open ingreslock 2049/tcp open nfs 2121/tcp open ccproxy-ftp 3306/tcp open mysql 5432/tcp open postgresql 5900/tcp open vnc 6000/tcp open X11 6667/tcp open irc 8009/tcp open ajp13 8180/tcp open unknown MAC Address: 00:0C:29:31:02:17 (VMware) Nmap done: 1 IP address (1 host up) scanned in 0.28 seconds
輸出的信息顯示了主機192.168.41.136上開放的全部端口,如2二、5三、80和111等。sql
1. 指定掃描端口範圍shell
若是目標主機上打開的端口較多時,用戶查看起來可能有點困難。這時候用戶能夠使用Nmap指定掃描的端口範圍,如指定掃描端口號在1~1000之間的端口號,執行命令以下所示:安全
root@kali:~# nmap -p 1-1000 192.168.41.136 Starting Nmap 6.40 ( http://nmap.org ) at 2014-04-19 16:27 CST Nmap scan report for www.benet.com (192.168.41.136) Host is up (0.00020s latency). Not shown: 49 closed ports PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 23/tcp open telnet 25/tcp opne smtp 53/tcp open domain 80/tcp open http 111/tcp open rpcbind 139/tcp open netbios-ssn 445/tcp open microsoft-ds 512/tcp open exec 513/tcp open login 514/tcp open shell MAC Address: 00:0C:29:31:02:17 (VMware) Nmap done: 1 IP address (1 host up) scanned in 0.35 seconds
輸出的信息顯示了主機192.168.41.136上端口在1~1000之間所開放的端口號。網絡
2. 掃描特定端口dom
Nmap工具還能夠指定一個特定端口號來掃描。ssh
【實例4-2】使用Nmap工具指定掃描在192.168.41.*網段內全部開啓TCP端口22的主機。執行命令以下所示:tcp
root@kali:~# nmap -p 22 192.168.41.* Starting Nmap 6.40 ( http://nmap.org ) at 2014-04-21 09:44 CST Nmap scan report for 192.168.41.1 Host is up (0.00029s latency). PORT STATE SERVICE 22/tcp closed ssh MAC Address: 00:50:56:C0:00:08 (VMware) Nmap scan report for 192.168.41.2 Host is up (0.00032s latency). PORT STATE SERVICE 22/tcp closed ssh MAC Address: 00:50:56:E9:AF:47 (VMware) Nmap scan report for www.benet.com (192.168.41.136) Host is up (0.00056s latency). PORT STATE SERVICE 22/tcp open ssh MAC Address: 00:0C:29:31:02:17 (VMware) Nmap scan report for 192.168.41.254 Host is up (0.00027s latency). PORT STATE SERVICE 22/tcp filtered ssh MAC Address: 00:50:56:E1:5E:75 (VMware) Nmap scan report for 192.168.41.234 Host is up (0.000052s latency). PORT STATE SERVICE 22/tcp open ssh Nmap done: 256 IP addresses (5 hosts up) scanned in 2.81 seconds
輸出的結果顯示了192.168.41.*網段內全部開啓22端口的主機信息。從輸出的信息中能夠看到,總共有五臺主機上打開了22號端口。工具
使用Nmap工具還能夠指定掃描端口22結果的輸出格式。執行命令以下所示:
root@kali:~# nmap -p 22 192.168.41.* -oG /tmp/nmap-targethost-tcp445.txt
執行以上命令後輸出的信息與第三步中輸出的結果相似,這裏就再也不列舉。可是執行該命令後,Nmap會將輸出的信息保存到/tmp/ nmap-targethost-tcp445.txt文件中。
Zenmap是Nmap官方推出的一款基於Nmap的安全掃描圖形用戶界面。它的設計目標是快速地掃描大型網絡,固然也能夠使用它掃描單個主機。下面將介紹Zenmap工具的使用。
啓動Zenmap工具。在Kali圖形界面依次選擇「應用程序」|Kali Linux|「信息收集」|「DNS分析」|Zenmap命令,將打開如圖4.2所示的界面。
圖4.2 Zenmap起始界面
在該界面Target文本框中輸入目標主機地址,在Profile文本框中選擇掃描類型。設置完後,單擊Scan按鈕,掃描結果如圖4.3所示。
圖4.3 掃描界面
該界面顯示了掃描192.168.41.*網段內全部主機啓動的全部端口信息。在左側欄中能夠切換以主機或服務的形式分別顯示詳細掃描結果。在右側欄中,能夠分別查看Namp輸出信息、端口/主機、拓撲結構、主機詳細信息和掃描信息等。