當用戶對Nmap工具瞭解後,便可使用該工具實施掃描。經過上一章的介紹,用戶可知Nmap工具能夠分別對主機、端口、版本、操做系統等實施掃描。可是,在實施這些掃描工做以前,須要先簡單瞭解下Nmap工具的使用,以方便後面實施掃描。因此,本章將經過使用Nmap工具實施基礎的掃描,來幫助用戶瞭解該工具。mysql
在實施基本的掃描以前,須要先了解一些Nmap網絡掃描的基本知識,及須要考慮的一些法律邊界問題。本節將對網絡基本掃描進行一個簡單介紹。linux
1.網絡掃描基礎知識ios
在使用網絡掃描以前,須要先理解如下內容:算法
q 當目標主機上使用了防火牆、路由器、代理服務或其它安全設備時,使用Nmap掃描結果可能會存在一些誤差。或者當掃描的遠程目標主機不在本地網絡內時,也有可能會出現誤導信息。sql
q 在使用Nmap實施掃描時,一些選項須要提高權限。在Unix和Linux系統中,必須使用root登陸或者使用sudo命令執行Nmap命令。shell
2.法律邊界問題api
在實施網絡掃描時,須要考慮一些法律邊界問題。以下所示:安全
q 在掃描互聯網服務提供商網絡時(如政府或祕密服務器網站),若是沒有被容許的話,不要進行掃描。不然,會惹上法律麻煩。服務器
q 全面掃描某些主機時,可能會致使主機崩潰、停機或數據丟失等不良結果。因此,在掃描關鍵任務時要當心謹慎。網絡
當用戶有明確的掃描目標時,能夠直接使用Nmap工具實施掃描。根據掃描目標的多少,能夠分爲掃描單個目標、多個目標及目標列表三種狀況。本節將依次講解這三種狀況的掃描方式。
經過指定單個目標,使用Nmap工具能夠實現一個基本的掃描。指定的目標能夠是一個IP地址,也能夠是主機名(Nmap會自動解析其主機名)。其中,語法格式以下所示:
nmap [目標]
其中,參數[目標]能夠是一個IP地址,也能夠是一個主機名。
【示例2-4】掃描局域網中IP地址爲192.168.1.105的主機。執行命令以下所示:
root@localhost :~# nmap 192.168.1.105
Starting Nmap 6.47 ( http://nmap.org ) at 2015-05-05 18:44 CST
Nmap scan report for localhost (192.168.1.105)
Host is up (0.00010s latency).
Not shown: 995 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
111/tcp open rpcbind
445/tcp open microsoft-ds
MAC Address: 00:0C:29:31:02:17 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 0.87 seconds
從輸出信息中,能夠看到目標主機192.168.1.105上開啓的端口有21、22、23、111、445,及這些端口所對應的服務。並且,還能夠看到該目標主機的MAC地址爲00:0C:29:31:02:17。從最後一行信息,能夠看出目標主機是活動的(up),而且掃描該目標主機共用了0.87秒。
提示:Nmap工具默認掃描前1000個端口,即1-1000。若是用戶想掃描1000以上端口的話,須要使用-p選項來指定。關於如何使用Nmap的一些選項,將在後面章節介紹。
因爲IP地址分爲IPv4和IPv6兩類。因此,使用Nmap工具掃描單個目標時,指定的IP地址能夠是IPv4,也能夠是IPv6。上例中指定掃描的目標是使用IPv4類地址。若是用戶指定掃描目標地址是IPv6類地址時,須要使用-6選項。例如,掃描IP地址爲fe80::20c:29ff:fe31:217的目標主機,則執行命令以下所示:
[root@router ~]# nmap -6 fe80::20c:29ff:fe31:217
執行以上命令後,將顯示以下所示的信息:
Starting Nmap 6.47 ( http://nmap.org ) at 2015-05-06 15:07 CST
Nmap scan report for fe80::20c:29ff:fe31:217
Host is up (0.000017s latency).
Not shown: 995 closed ports
PORT STATE SERVICE
22/tcp open ssh
23/tcp open telnet
111/tcp open rpcbind
139/tcp open netbios-ssn
445/tcp open microsoft-ds
Nmap done: 1 IP address (1 host up) scanned in 0.16 seconds
從以上輸出信息中,能夠看到IPv6地址爲fe80::20c:29ff:fe31:217的主機是活動的,而且開放了22、23、111、139、445端口。
提示:若是要使用IPv6類地址做爲目標時,則掃描主機和目標主機都必須支持IPv6協議。不然,沒法實施掃描。
Nmap能夠用來同時掃描多個主機。當用戶須要掃描多個目標時,能夠在命令行中同時指定多個目標,每一個目標之間使用空格分割。其中,語法格式以下所示:
nmap [目標1 目標2 ...]
【示例2-5】使用Nmap工具同時掃描主機192.168.1.1、192.168.1.101和192.168.1.105。執行命令以下所示:
root@localhost :~# nmap 192.168.1.1 192.168.1.101 192.168.1.105
Starting Nmap 6.47 ( http://nmap.org ) at 2015-05-05 19:07 CST
Nmap scan report for localhost (192.168.1.1)
Host is up (0.00094s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
80/tcp open http
1900/tcp open upnp
49152/tcp open unknown
MAC Address: 14:E6:E4:84:23:7A (Tp-link Technologies CO.)
Nmap scan report for localhost (192.168.1.101)
Host is up (0.0060s latency).
All 1000 scanned ports on localhost (192.168.1.101) are closed
MAC Address: 14:F6:5A:CE:EE:2A (Xiaomi)
Nmap scan report for localhost (192.168.1.105)
Host is up (0.00038s latency).
Not shown: 995 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
111/tcp open rpcbind
445/tcp open microsoft-ds
MAC Address: 00:0C:29:31:02:17 (VMware)
Nmap done: 3 IP addresses (3 hosts up) scanned in 1.00 seconds
從以上輸出信息,能夠看到共掃描了三臺主機,而且依次顯示了每臺主機的掃描結果。在以上信息中,將掃描的每臺主機地址行已加粗,方便用戶瞭解其掃描結果。下面分別介紹這三臺主機的掃描結果,以下所示:
q 192.168.1.1:從輸出信息中能夠看到該主機開啓了三個端口,MAC地址爲14:E6:E4:84:23:7A。根據MAC地址後面括號中的信息,能夠推斷出該主機是一個Tp-link路由器。
q 192.168.1.101:從輸出信息中,能夠看到該主機上前1000個端口是關閉的。可是,能夠看到該主機的MAC地址爲14:F6:5A:CE:EE:2A,設備類型爲Xiaomi。由此能夠判斷出,該主機是一個小米手機設備。
q 192.168.1.105:從輸出信息中,能夠看到該主機上995個端口是關閉的,五個端口是開啓的。其中,MAC地址爲00:0C:29:31:02:17,並且是一臺VMware(虛擬機)操做系統。
提示:當用戶同時指定掃描的目標太多時,可使用簡化符號來獲取掃描結果。其中,目標地址之間使用逗號(,)分割。例如,同時掃描以上三臺主機,則可使用以下命令:
nmap 192.168.1.1,101,105
當用戶有大量主機須要掃描時,能夠將這些主機的IP地址(或主機名)寫入到一個文本文件中。而後,使用Nmap工具進行掃描。這樣避免在命令行中手工輸入目標。其中,語法格式以下所示:
nmap -iL [IP地址列表文件]
以上語法中的-iL選項,就是用來從IP地址列表文件中提取全部地址的。其中,IP地址列表文件中包含了一列被掃描的主機IP地址。而且,在IP地址列表文件中的每一個條目必須使用空格、Tab鍵或換行符分割。
【示例2-6】使用Nmap工具掃描list.txt文件中全部的主機。具體操做步驟以下所示:
(1)建立list.txt文本文件,並將掃描的主機IP地址寫入到該文本文件中。以下所示:
root@localhost :~# vi list.txt
192.168.1.1
192.168.1.100
192.168.1.101
192.168.1.102
192.168.1.103
192.168.1.104
192.168.1.105
以上就是在list.txt文件中,指定將要掃描的目標地址。
(2)掃描list.txt文件中指定的全部主機。執行命令以下所示:
root@localhost :~# nmap -iL list.txt
Starting Nmap 6.47 ( http://nmap.org ) at 2015-05-06 10:53 CST
Nmap scan report for localhost (192.168.1.1)
Host is up (0.00045s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
80/tcp open http
1900/tcp open upnp
49152/tcp open unknown
MAC Address: 14:E6:E4:84:23:7A (Tp-link Technologies CO.)
Nmap scan report for localhost (192.168.1.100)
Host is up (0.00023s latency).
Not shown: 986 closed ports
PORT STATE SERVICE
135/tcp open msrpc
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
902/tcp open iss-realsecure
912/tcp open apex-mesh
1033/tcp open netinfo
1034/tcp open zincite-a
1035/tcp open multidropper
1038/tcp open mtqp
1040/tcp open netsaint
1075/tcp open rdrmshc
2869/tcp open icslap
5357/tcp open wsdapi
MAC Address: 00:E0:1C:3C:18:79 (Cradlepoint)
Nmap scan report for localhost (192.168.1.103)
Host is up (0.00028s latency).
Not shown: 977 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
25/tcp open smtp
53/tcp open domain
80/tcp open http
111/tcp open rpcbind
139/tcp open netbios-ssn
445/tcp open microsoft-ds
512/tcp open exec
513/tcp open login
514/tcp open shell
1099/tcp open rmiregistry
1524/tcp open ingreslock
2049/tcp open nfs
2121/tcp open ccproxy-ftp
3306/tcp open mysql
5432/tcp open postgresql
5900/tcp open vnc
6000/tcp open X11
6667/tcp open irc
8009/tcp open ajp13
8180/tcp open unknown
MAC Address: 00:0C:29:F8:2B:38 (VMware)
Nmap scan report for localhost (192.168.1.104)
Host is up (0.00028s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
443/tcp open https
MAC Address: 00:0C:29:C3:1F:D7 (VMware)
Nmap scan report for localhost (192.168.1.105)
Host is up (0.00034s latency).
Not shown: 995 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
111/tcp open rpcbind
445/tcp open microsoft-ds
MAC Address: 00:0C:29:31:02:17 (VMware)
Nmap scan report for localhost (192.168.1.102)
Host is up (0.0000080s latency).
Not shown: 998 closed ports
PORT STATE SERVICE
80/tcp open http
9876/tcp open sd
Nmap done: 7 IP addresses (6 hosts up) scanned in 1.05 seconds
從輸出的信息中,能夠看到依次掃描了list.txt文件中的每臺主機,而且顯示了每臺主機的掃描結果。從最後一行信息,能夠看到共掃描了七個IP地址。其中,六個主機是活動的,而且整個掃描過程共用了1.05秒。
Nmap工具提供了一個-iR選項,能夠用來選擇隨機的互聯網主機來掃描。Nmap工具將會隨機的生成指定數量的目標進行掃描。其中,語法格式以下所示:
nmap -iR [主機數量]
【示例2-7】使用Nmap工具隨機選擇兩個目標主機進行掃描。執行命令以下所示:
root@localhost:~# nmap -iR 2
Starting Nmap 6.47 ( http://nmap.org ) at 2015-05-06 11:07 CST
Nmap scan report for suncokret.vguk.hr (161.53.173.3)
Host is up (0.43s latency).
Not shown: 984 closed ports
PORT STATE SERVICE
21/tcp open ftp
25/tcp open smtp
53/tcp open domain
80/tcp open http
81/tcp open hosts2-ns
110/tcp open pop3
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
143/tcp open imap
443/tcp open https
444/tcp open snpp
445/tcp filtered microsoft-ds
593/tcp filtered http-rpc-epmap
2002/tcp open globe
3306/tcp open mysql
4444/tcp filtered krb524
Nmap done: 3 IP addresses (1 host up) scanned in 29.64 seconds
從輸出信息中,能夠看到Nmap工具隨機生成了三個IP地址。可是,只有主機161.53.137.3是活動的,而且顯示了對該主機的掃描結果。
提示:通常狀況下,不建議用戶實施隨機掃描。除非,你是在作一個研究項目。不然,常常實施隨機掃描可能會給本身的互聯網服務提供商帶來麻煩。
當用戶不肯定掃描主機的地址時,能夠經過指定一個地址範圍實施掃描。經過指定掃描範圍,從掃描結果中能夠獲取到活動的主機及相關信息。用戶在指定一個掃描範圍時,還能夠排除單個或多個掃描目標。本節將介紹使用Nmap工具實施指定地址範圍的掃描方法。
用戶在指定掃描範圍時,能夠經過IP地址或子網的方式來實現。下面將介紹使用IP地址指定掃描範圍的方法。其中,語法格式以下所示:
nmap [IP地址範圍]
在以上語法中,IP地址範圍之間使用短連字符(-)。
【示例2-8】使用Nmap工具掃描192.168.1.1到100之間的全部主機。執行命令以下所示:
root@localhost:~# nmap 192.168.1.1-100
Starting Nmap 6.47 ( http://nmap.org ) at 2015-05-05 19:40 CST
Nmap scan report for localhost (192.168.1.1)
Host is up (0.0014s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
80/tcp open http
1900/tcp open upnp
49152/tcp open unknown
MAC Address: 14:E6:E4:84:23:7A (Tp-link Technologies CO.)
Nmap scan report for localhost (192.168.1.100)
Host is up (0.00025s latency).
Not shown: 986 closed ports
PORT STATE SERVICE
135/tcp open msrpc
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
902/tcp open iss-realsecure
912/tcp open apex-mesh
1033/tcp open netinfo
1034/tcp open zincite-a
1035/tcp open multidropper
1037/tcp open ams
1039/tcp open sbl
1041/tcp open danf-ak2
2869/tcp open icslap
5357/tcp open wsdapi
MAC Address: 00:E0:1C:3C:18:79 (Cradlepoint)
Nmap done: 100 IP addresses (2 hosts up) scanned in 3.34 seconds
從以上輸出信息中,能夠看到192.168.1-100之間,只有192.168.1.1和192.168.1.100兩臺主機是活動的。
用戶也能夠指定掃描多個網絡/子網範圍的主機。例如,掃描C類IP網絡192.168.1.*到192.168.100.*之間的全部主機。則執行命令以下所示:
nmap 192.168.1-100.*
以上命令中星號(*)是一個通配符,表示0-255之間全部有效的主機。
Nmap也可使用CIDR(無類別域間路由,Classless Inter-Domain Routing)格式來掃描整個子網。CIDR將多個IP網絡結合在一塊兒,使用一種無類別的域際路由選擇算法,能夠減小由核心路由器運載的路由選擇信息的數量。其中,語法格式以下所示:
nmap [CIDR格式的網絡地址]
以上語法中的CIDR是由網絡地址和子網掩碼兩部分組成,而且中間使用斜槓(/)分割。其中,CIDR和子網掩碼對照表如表2-1所示。
表2-3 CIDR對照表
【示例2-9】使用Nmap掃描192.168.1.1/24整個子網中的全部主機。執行命令以下所示:
root@localhost:~# nmap 192.168.1.1/24
Starting Nmap 6.47 ( http://nmap.org ) at 2015-05-05 19:41 CST
Nmap scan report for localhost (192.168.1.1)
Host is up (0.00064s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
80/tcp open http
1900/tcp open upnp
49152/tcp open unknown
MAC Address: 14:E6:E4:84:23:7A (Tp-link Technologies CO.)
Nmap scan report for localhost (192.168.1.100)
Host is up (0.00022s latency).
Not shown: 986 closed ports
PORT STATE SERVICE
135/tcp open msrpc
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
902/tcp open iss-realsecure
912/tcp open apex-mesh
1033/tcp open netinfo
2869/tcp open icslap
5357/tcp open wsdapi
MAC Address: 00:E0:1C:3C:18:79 (Cradlepoint)
Nmap scan report for localhost (192.168.1.101)
Host is up (0.0041s latency).
All 1000 scanned ports on localhost (192.168.1.101) are closed
MAC Address: 14:F6:5A:CE:EE:2A (Xiaomi)
Nmap scan report for localhost (192.168.1.103)
Host is up (0.00027s latency).
Not shown: 977 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
25/tcp open smtp
53/tcp open domain
80/tcp open http
111/tcp open rpcbind
139/tcp open netbios-ssn
445/tcp open microsoft-ds
512/tcp open exec
513/tcp open login
......
49157/tcp open unknown
MAC Address: 00:0C:29:DE:7E:04 (VMware)
Nmap scan report for localhost (192.168.1.102)
Host is up (0.0000040s latency).
Not shown: 998 closed ports
PORT STATE SERVICE
80/tcp open http
9876/tcp open sd
Nmap done: 256 IP addresses (9 hosts up) scanned in 3.39 seconds
從輸出信息中,能夠看到共掃描了256個地址。其中,九臺主機是活動的,而且共用時間爲3.39秒。因爲章節的緣由,以上只列舉了五臺主機的掃描結果。其中,中間部份內容,使用省略號(......)代替了。
當用戶指定一個掃描範圍時(如局域網),在該範圍內可能會包括本身的主機,或者是本身搭建的一些服務等。這時,用戶爲了安全及節約時間,可能不但願掃描這些主機。此時,用戶就可使用--exclude命令將這些主機排除。其中,排除單個目標的語法格式以下所示:
nmap [目標] --exclude [目標]
【示例2-10】掃描192.168.1.1/24網絡內除192.168.1.101之外的全部主機。執行命令以下所示:
root@localhost:~# nmap 192.168.1.1/24 --exclude 192.168.1.101
Starting Nmap 6.47 ( http://nmap.org ) at 2015-05-05 19:44 CST
Nmap scan report for localhost (192.168.1.1)
Host is up (0.00068s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
80/tcp open http
1900/tcp open upnp
49152/tcp open unknown
MAC Address: 14:E6:E4:84:23:7A (Tp-link Technologies CO.)
Nmap scan report for localhost (192.168.1.100)
Host is up (0.00025s latency).
Not shown: 986 closed ports
PORT STATE SERVICE
135/tcp open msrpc
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
902/tcp open iss-realsecure
912/tcp open apex-mesh
1033/tcp open netinfo
1034/tcp open zincite-a
1035/tcp open multidropper
1037/tcp open ams
1039/tcp open sbl
1041/tcp open danf-ak2
2869/tcp open icslap
5357/tcp open wsdapi
MAC Address: 00:E0:1C:3C:18:79 (Cradlepoint)
Nmap scan report for localhost (192.168.1.103)
Host is up (0.00036s latency).
Not shown: 977 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
25/tcp open smtp
53/tcp open domain
80/tcp open http
111/tcp open rpcbind
139/tcp open netbios-ssn
445/tcp open microsoft-ds
512/tcp open exec
513/tcp open login
514/tcp open shell
......
Nmap scan report for localhost (192.168.1.105)
Host is up (0.00026s latency).
Not shown: 995 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
111/tcp open rpcbind
445/tcp open microsoft-ds
MAC Address: 00:0C:29:31:02:17 (VMware)
Nmap scan report for localhost (192.168.1.106)
Host is up (0.00039s latency).
Not shown: 996 closed ports
PORT STATE SERVICE
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
1025/tcp open NFS-or-IIS
MAC Address: 00:0C:29:C7:6A:2A (VMware)
......
Nmap scan report for localhost (192.168.1.102)
Host is up (0.0000030s latency).
Not shown: 998 closed ports
PORT STATE SERVICE
80/tcp open http
9876/tcp open sd
Nmap done: 255 IP addresses (8 hosts up) scanned in 3.05 seconds
從輸出信息中,能夠看到共掃描了255個IP地址。其中,八個主機是活動的。因爲章節的緣由,中間省略了一部份內容。
用戶使用--exclude選項,能夠指定排除單個主機、範圍或者整個網絡塊(使用CIDR格式)。例如,掃描192.168.1.1/24網絡內,除192.168.1.100-192.168.1.103以外的全部主機。則執行命令以下所示:
root@localhost:~# nmap 192.168.1.1/24 --exclude 192.168.1.100-103
Starting Nmap 6.47 ( http://nmap.org ) at 2015-05-05 19:45 CST
Nmap scan report for localhost (192.168.1.1)
Host is up (0.0012s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
80/tcp open http
1900/tcp open upnp
49152/tcp open unknown
MAC Address: 14:E6:E4:84:23:7A (Tp-link Technologies CO.)
Nmap scan report for localhost (192.168.1.104)
Host is up (0.00028s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
443/tcp open https
MAC Address: 00:0C:29:C3:1F:D7 (VMware)
Nmap scan report for localhost (192.168.1.105)
Host is up (0.00019s latency).
Not shown: 995 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
111/tcp open rpcbind
445/tcp open microsoft-ds
MAC Address: 00:0C:29:31:02:17 (VMware)
Nmap scan report for localhost (192.168.1.106)
Host is up (0.00017s latency).
Not shown: 996 closed ports
PORT STATE SERVICE
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
1025/tcp open NFS-or-IIS
MAC Address: 00:0C:29:C7:6A:2A (VMware)
Nmap scan report for localhost (192.168.1.107)
Host is up (0.0014s latency).
Not shown: 984 closed ports
PORT STATE SERVICE
135/tcp open msrpc
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
554/tcp open rtsp
902/tcp open iss-realsecure
912/tcp open apex-mesh
2869/tcp open icslap
5357/tcp open wsdapi
10243/tcp open unknown
49152/tcp open unknown
49153/tcp open unknown
49154/tcp open unknown
49155/tcp open unknown
49156/tcp open unknown
49157/tcp open unknown
MAC Address: 00:0C:29:DE:7E:04 (VMware)
Nmap done: 252 IP addresses (5 hosts up) scanned in 2.27 seconds
從以上輸出信息中,能夠看到共掃描了252個主機。其中,有五個主機是活動的,其地址分別是192.168.1.1、192.168.1.104、192.168.1.105、192.168.1.106和192.168.1.107。根據輸出的信息,能夠發現沒有對192.168.1.100-103之間主機進行掃描。
當用戶排除掃描的目標不少時,也能夠將這些目標主機的IP地址寫入到一個文本文件中。而後,使用--excludefile選項來指定排除掃描的目標。其中,排除掃描列表中目標的語法格式以下所示:
nmap [目標] --excludefile [目標列表]
【示例2-11】使用Nmap掃描192.168.1.0/24網絡內主機,可是排除list.txt文件列表中指定的目標。具體操做步驟以下所示:
(1)建立list.txt文件,並寫入要排除掃描目標的IP地址。以下所示:
root@localhost:~#vi list.txt
192.168.102
192.168.1.103
192.168.1.104
192.168.1.105
在以上列表文件中,指定排除掃描以上四個IP地址的主機。
(2)實施掃描。執行命令以下所示:
root@localhost:~# nmap 192.168.1.0/24 --excludefile list.txt
Starting Nmap 6.47 ( http://nmap.org ) at 2015-05-05 19:46 CST
Nmap scan report for localhost (192.168.1.1)
Host is up (0.0014s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
80/tcp open http
1900/tcp open upnp
49152/tcp open unknown
MAC Address: 14:E6:E4:84:23:7A (Tp-link Technologies CO.)
Nmap scan report for localhost (192.168.1.100)
Host is up (0.00021s latency).
Not shown: 986 closed ports
PORT STATE SERVICE
135/tcp open msrpc
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
902/tcp open iss-realsecure
912/tcp open apex-mesh
1033/tcp open netinfo
1034/tcp open zincite-a
MAC Address: 00:E0:1C:3C:18:79 (Cradlepoint)
Nmap scan report for localhost (192.168.1.106)
Host is up (0.00014s latency).
Not shown: 996 closed ports
PORT STATE SERVICE
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
1025/tcp open NFS-or-IIS
MAC Address: 00:0C:29:C7:6A:2A (VMware)
Nmap scan report for localhost (192.168.1.107)
Host is up (0.0010s latency).
Not shown: 984 closed ports
PORT STATE SERVICE
135/tcp open msrpc
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
554/tcp open rtsp
902/tcp open iss-realsecure
912/tcp open apex-mesh
2869/tcp open icslap
5357/tcp open wsdapi
10243/tcp open unknown
49152/tcp open unknown
49153/tcp open unknown
MAC Address: 00:0C:29:DE:7E:04 (VMware)
Nmap scan report for localhost (192.168.1.102)
Host is up (0.0000030s latency).
Not shown: 998 closed ports
PORT STATE SERVICE
80/tcp open http
9876/tcp open sd
Nmap done: 253 IP addresses (5 hosts up) scanned in 3.31 seconds
從以上輸出信息中,能夠看到掃描的全部目標中,共有五臺主機是活動的。
在使用Nmap工具實施掃描時,使用不一樣的選項,則掃描結果不一樣。用戶可使用不一樣的選項,單獨掃描目標主機上的端口、應用程序版本或操做系統類型等。可是,大部分人又不太喜歡記這些選項。這時候,用戶只須要記一個選項-A便可。該選項能夠對目標主機實施全面掃描,掃描結果中包括各類類型的信息。其中,實施全面掃描的語法格式以下所示:
nmap -A [目標]
【示例2-12】使用Nmap工具對目標主機192.168.1.105實施全面掃描。則執行命令以下所示:
root@localhost:~# nmap -A 192.168.1.105
Starting Nmap 6.47 ( http://nmap.org ) at 2015-05-06 15:20 CST
Nmap scan report for localhost (192.168.1.105)
Host is up (0.00028s latency).
Not shown: 995 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 2.2.2 #FTP服務版本爲2.2.2,供應商是Vsftpd
| ftp-anon: Anonymous FTP login allowed (FTP code 230) #容許匿名登陸
|_drwxr-xr-x 2 14 0 4096 Apr 03 06:10 pub #FTP服務的根目錄爲pub
22/tcp open ssh OpenSSH 5.3 (protocol 2.0) #SSH服務版本是5.3,供應商是OpenSSH
| ssh-hostkey: #SSH服務密鑰
| 1024 83:9f:d0:8e:29:3c:7f:d9:11:da:a8:bb:b5:5a:4d:69 (DSA)
|_ 2048 2e:ea:ee:63:03:fd:9c:ae:39:9b:4c:e0:49:a9:8f:5d (RSA)
23/tcp open telnet Linux telnetd #Telnet服務
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo: #RPC詳細信息
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100024 1 34525/tcp status
|_ 100024 1 51866/udp status
445/tcp open netbios-ssn Samba smbd 3.X (workgroup: MYGROUP)#Samba服務版本爲3.X,供應商爲smbd
MAC Address: 00:0C:29:31:02:17 (VMware) #目標主機的MAC地址
Device type: general purpose #設備類型
Running: Linux 2.6.X|3.X #正在運行的系統
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 #操做系統中央處理單元
OS details: Linux 2.6.32 - 3.10 #操做系統詳細信息
Network Distance: 1 hop #網絡距離
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel #服務信息
Host script results:
| smb-os-discovery: #SMB操做系統發現
| OS: Unix (Samba 3.6.9-151.el6) #操做系統爲Unix,Samba版本爲3.6.9
| Computer name: router #計算機名
| NetBIOS computer name: #NetBIOS計算機名
| Domain name: #域名
| FQDN: router #徹底合格域名(FQDN)
|_ System time: 2015-05-06T15:20:28+08:00 #系統時間
| smb-security-mode:
| Account that was used for smb scripts: <blank>
| User-level authentication
| SMB Security: Challenge/response passwords supported
|_ Message signing disabled (dangerous, but default)
|_smbv2-enabled: Server doesn't support SMBv2 protocol
TRACEROUTE
HOP RTT ADDRESS
1 0.28 ms localhost (192.168.1.105)
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.51 seconds
從以上輸出的信息,能夠明顯看出比前面例子掃描結果更詳細。在以上輸出信息中,能夠看到目標主機上開啓的端口、服務器、版本、操做系統版本、內核、系統類型等。根據分析輸出的信息,可知目標主機上運行了FTP、SSH、Telnet等服務,而且能夠看到各服務的版本及權限信息。並且,還能夠知道目標主機的操做系統是Linux,內核版本爲2.6.32等。
本文選自:Nmap掃描基礎教程大學霸內部資料,轉載請註明出處,尊重技術尊重IT人!