[root@localhost ~]# nmap -sO 192.168.1.10 | grep '^[0-9]' 1 open icmp 6 open tcp 7 open udp
探测目标系统: 扫描探测目标主机操作系统,这里结果仅供参考有时候并不准确.
[root@localhost ~]# nmap -O 192.168.1.10 | grep "Running:" Running: Microsoft Windows 2000 | XP
探测服务版本: 用于扫描目标主机服务的具体版本号.
[root@localhost ~]# nmap -sV 192.168.1.10 | grep '^[0-9]' 80/tcp open http Apache httpd 2.4.23 ((Win32) OpenSSL/1.0.2j PHP/5.4.45) 3306/tcp open mysql MySQL 5.5.53 139/tcp open netbios-ssn 443/tcp open ssl/http VMware VirtualCenter Web service 445/tcp closed microsoft-ds 912/tcp open vmware-auth VMware Authentication Daemon 1.0 (Uses VNC, SOAP)
跟踪报文(tracert): 跟踪发送和接收报文的数据流向.
[root@localhost ~]# nmap --packet-trace 192.168.1.10 SENT (4.7014s) TCP 192.168.1.30:50000 > 192.168.1.10:3527 S SENT (4.7100s) TCP 192.168.1.30:50000 > 192.168.1.10:4446 S
Starting Nmap 6.40 ( http://nmap.org ) at 2019-03-30 23:16 EDT Nmap scan report for localhost (127.0.0.1) Host is up (0.0000090s latency). Not shown: 995 closed ports PORT STATE SERVICE 21/tcp open ftp | ftp-anon: Anonymous FTP login allowed (FTP code 230) |_drwxr-xr-x 2 0 0 6 Oct 30 19:45 pub 22/tcp open ssh 25/tcp open smtp | smtp-enum-users: |_ root 80/tcp open http | http-domino-enum-passwords: |_ ERROR: No valid credentials were found 3306/tcp open mysql
Nmap done: 1 IP address (1 host up) scanned in 0.89 seconds
Starting Nmap 6.40 ( http://nmap.org ) at 2019-03-31 02:05 EDT Pre-scan script results: | broadcast-netbios-master-browser: | ip server domain |_192.168.1.2 Web-Server WORKGROUP Nmap scan report for 192.168.1.1 Host is up (0.0011s latency). Not shown: 998 closed ports PORT STATE SERVICE 80/tcp filtered http 1900/tcp open upnp MAC Address: 42:1C:1B:E7:B1:B2 (TP-Link)
Starting Nmap 6.40 ( http://nmap.org ) at 2019-03-31 02:16 EDT Nmap scan report for www.baidu.com (61.135.169.121) Host is up (0.017s latency). Other addresses for www.baidu.com (not scanned): 61.135.169.125 PORT STATE SERVICE 443/tcp open https |_http-date: Sun, 31 Mar 2019 06:16:53 GMT; 0s from local time.
Nmap done: 1 IP address (1 host up) scanned in 0.27 seconds
执行DOS攻击: dos攻击,对于处理能力较小的站点还挺好用的.
[root@localhost ~]# nmap --script http-slowloris --max-parallelism 1000 www.mkdirs.com Warning: Your max-parallelism (-M) option is extraordinarily high, which can hurt reliability
Starting Nmap 6.40 ( http://nmap.org ) at 2019-03-31 02:21 EDT
Starting Nmap 6.40 ( http://nmap.org ) at 2019-03-31 02:28 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating Ping Scan at 02:28 Scanning www.baidu.com (61.135.169.121) [4 ports] Completed Ping Scan at 02:28, 0.02s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 02:28 Completed Parallel DNS resolution of 1 host. at 02:28, 0.01s elapsed Initiating SYN Stealth Scan at 02:28 Scanning www.baidu.com (61.135.169.121) [1 port] Completed SYN Stealth Scan at 02:28, 0.20s elapsed (1 total ports) NSE: Script scanning 61.135.169.121. Nmap scan report for www.baidu.com (61.135.169.121) Host is up (0.016s latency). Other addresses for www.baidu.com (not scanned): 61.135.169.125 PORT STATE SERVICE 53/tcp filtered domain
NSE: Script Post-scanning. Read data files from: /usr/bin/../share/nmap Nmap done: 1 IP address (1 host up) scanned in 0.28 seconds Raw packets sent: 6 (240B) | Rcvd: 1 (28B)
Starting Nmap 6.40 ( http://nmap.org ) at 2019-03-31 02:29 EDT Nmap scan report for www.baidu.com (61.135.169.121) Host is up (0.017s latency). Other addresses for www.baidu.com (not scanned): 61.135.169.125 PORT STATE SERVICE 80/tcp open http
Host script results: | hostmap-ip2hosts: |_ hosts: Error: could not GET http://www.ip2hosts.com/csv.php?ip=61.135.169.121
Nmap done: 1 IP address (1 host up) scanned in 5.89 seconds
Starting Nmap 6.40 ( http://nmap.org ) at 2019-03-31 03:19 EDT Nmap scan report for www.baidu.com (61.135.169.125) Host is up (0.018s latency). Other addresses for www.baidu.com (not scanned): 61.135.169.121 Not shown: 998 filtered ports PORT STATE SERVICE 80/tcp open http 443/tcp open https