0x01 Nmap介紹linux
Nmap是一款網絡掃描和主機檢測的很是有用的工具。Nmap是不侷限於僅僅收集信息和枚舉,同時能夠用來做爲一個漏洞探測器或安全掃描器。它能夠適用於winodws,linux,mac等操做系統,筆者這裏建議直接使用Kali Linux,由於已經預裝好了Nmap,能夠省去安裝步驟。安全
Nmap是一款很是強大的實用工具,可用於:網絡
1.檢測活在網絡上的主機(主機發現)dom
2.檢測主機上開放的端口(端口發現或枚舉)ssh
3.檢測到相應的端口(服務發現)tcp
4.軟件版本檢測脆弱性的漏洞(Nmap的腳本)工具
雖然Nmap更新了這麼多年依舊沒有什麼太大的進步,但至今仍是信息蒐集/主機掃描中的一個有着極其重要地位的工具
學習
本套教程筆者將以Nmap爲中心,爲你們分層次介紹Nmap,讓讀者由簡入深的瞭解Nmap的掃描方法測試
Nmap下載地址:https://nmap.org/網站
0x02 入門掃描(無參數)
咱們在簡單瞭解過nmap以後,咱們就直接切入正題,開始咱們的nmap掃描之旅
咱們打開一種終端,在終端中直接使用nmap來掃描一臺主機:
root@kali-linux:~# nmap 192.168.1.1 Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-08 20:59 CST Nmap scan report for 192.168.1.1 Host is up (0.012s latency). Not shown: 997 filtered ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 443/tcp open https Nmap done: 1 IP address (1 host up) scanned in 24.37 seconds
這裏咱們直接使用了nmap <目標主機>這一基礎語句來對一個主機進行掃描,很快便獲取了這個主機開放的端口信息
固然,咱們除了能夠直接掃描IP,也能夠掃描網站:
root@kali-linux:~# nmap www.baidu.com Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-08 21:02 CST Nmap scan report for www.baidu.com (220.181.112.244) Host is up (0.024s latency). Other addresses for www.baidu.com (not scanned): 220.181.111.188 Not shown: 998 filtered ports PORT STATE SERVICE 80/tcp open http 443/tcp open https Nmap done: 1 IP address (1 host up) scanned in 11.35 seconds
這裏咱們用百度作示範,掃描了百度的開放端口,也是使用了nmap <目標主機>的掃描語句
以上就是Nmap簡單掃描單一主機的方法,那麼當咱們想要掃描多個主機,或者是某個IP段內的主機時,咱們應該怎麼辦呢?
Nmap固然也支持了掃描多個IP/主機的掃描方式了:
root@kali-linux:~# nmap 220.181.112.244 220.181.112.243 Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-08 21:07 CST Nmap scan report for 220.181.112.244 Host is up (0.027s latency). Not shown: 998 filtered ports PORT STATE SERVICE 80/tcp open http 443/tcp open https Nmap scan report for 220.181.112.243 Host is up (0.032s latency). Not shown: 999 filtered ports PORT STATE SERVICE 80/tcp open http Nmap done: 2 IP addresses (2 hosts up) scanned in 43.12 seconds
如上,這裏咱們掃描了220.181.112.244與220.181.112.243這兩個IP,
Nmap也按照順序輸出了掃描結果,這裏咱們使用的語法是nmap <目標主機1> <目標主機2>
咱們要將掃描的主機用空格隔開,好比nmap 192.168.1.1<空格>192.168.1.100 ,這樣就能夠掃描192.168.1.1和192.168.1.100兩臺主機的信息了
而後咱們來測試一下掃描兩個網站的主機信息:
root@kali-linux:~# nmap www.baidu.com www.bing.com Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-08 21:13 CST Nmap scan report for www.baidu.com (220.181.112.244) Host is up (0.033s latency). Other addresses for www.baidu.com (not scanned): 220.181.111.188 Not shown: 998 filtered ports PORT STATE SERVICE 80/tcp open http 443/tcp open https Nmap scan report for www.bing.com (202.89.233.104) Host is up (0.034s latency). Other addresses for www.bing.com (not scanned): 202.89.233.103 Not shown: 997 filtered ports PORT STATE SERVICE 53/tcp closed domain 80/tcp open http 443/tcp open https Nmap done: 2 IP addresses (2 hosts up) scanned in 45.69 seconds
這裏咱們同時掃描了www.baidu.com與www.bing.com兩個網站,也一樣輸出了主機信息
那麼若是咱們想掃描一個網段的主機信息該怎麼掃描呢?
root@kali-linux:~# nmap 192.168.1.0/24 Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-11 01:43 CST Stats: 0:00:44 elapsed; 0 hosts completed (2 up), 256 undergoing Ping Scan Nmap scan report for 192.168.1.101 Host is up (0.064s latency). Not shown: 98 filtered ports PORT STATE SERVICE 22/tcp open ssh 3389/tcp closed ms-wbt-server Nmap scan report for 192.168.1.105 Host is up (0.056s latency). Not shown: 97 filtered ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 3389/tcp closed ms-wbt-server Nmap done: 256 IP addresses (2 hosts up) scanned in 91.04 seconds
咱們只須要更改一下搜索的目標就能夠掃描,這裏筆者掃描了192.168.1.0-255這一整個網段,利用的指令仍是nmap 192.168.1.0/24<目標網段>
這裏須要注意的是,掃描一整個網段須要的時間較長,若是想要查看掃描進度能夠在終端中按下Tab鍵即可以查看掃描進度
若是咱們不須要掃描整個網段,只須要掃描某個範圍內的存活主機該怎麼掃描呢?
root@kali-linux:~# nmap 192.168.1.100-200 Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-11 01:46 CST Stats: 0:00:44 elapsed; 0 hosts completed (2 up), 100 undergoing Ping Scan Nmap scan report for 192.168.1.101 Host is up (0.064s latency). Not shown: 98 filtered ports PORT STATE SERVICE 22/tcp open ssh 3389/tcp closed ms-wbt-server Nmap scan report for 192.168.1.105 Host is up (0.056s latency). Not shown: 97 filtered ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 3389/tcp closed ms-wbt-server Nmap done: 100 IP addresses (2 hosts up) scanned in 43.01 seconds
這裏咱們使用了nmap 192.168.1.100-200的指令,意思是掃描192.168.1.100到192.168.1.200這一IP段中存活的主機,咱們只須要將搜索目標的IP增長範圍便可
小結:
在咱們的Nmap掃描教程第一節中,咱們學習瞭如何掃描單個主機/多個主機/整個網段以及某個IP段的存活主機信息
可是Nmap中還有許多有趣的掃描方式,這裏咱們暫且不提,在下一節的教程中,咱們將學習不一樣協議的掃描方式
對於本文的教程若是有問題能夠加做者QQ:2245998470或者直接在本文下留言來詢問,筆者將盡力解答
未完待續...