29 Hagnýt dæmi um NMAP skipanir fyrir Linux kerfis-/netkerfisstjóra
Nmap aka Network Mapper er opinn uppspretta og mjög fjölhæfur tól fyrir Linux kerfi/netkerfisstjóra. Nmap er notað til að kanna netkerfi, framkvæma öryggisskannanir, netúttekt og finna opnar hafnir á ytri vél. Það leitar að lifandi gestgjöfum, stýrikerfum, pakkasíur og opnum gáttum sem keyra á ytri gestgjöfum.
Ég mun fjalla um mest af NMAP notkun í tveimur mismunandi hlutum og þetta er fyrsti hluti nmap alvarlegur. Hér í þessari uppsetningu hef ég notað tvo netþjóna án eldveggs til að prófa virkni Nmap skipunarinnar.
- 192.168.0.100 – server1.linux-console.net
- 192.168.0.101 – server2.linux-console.net
# nmap [Scan Type(s)] [Options] {target specification}
Hvernig á að setja upp NMAP í Linux
Flestar Linux dreifingar í dag eins og Red Hat, CentOS, Fedoro, Debian og Ubuntu hafa innihaldið Nmap í sjálfgefnum pakkastjórnunargeymslum sínum sem kallast APT. Bæði verkfærin eru notuð til að setja upp og stjórna hugbúnaðarpökkum og uppfærslum. Til að setja upp Nmap á dreifingu, notaðu eftirfarandi skipun.
# yum install nmap [on Red Hat based systems] $ sudo apt-get install nmap [on Debian based systems]
Þegar þú hefur sett upp nýjasta nmap forritið geturðu fylgst með leiðbeiningunum í þessari grein.
1. Skannaðu kerfi með hýsingarheiti og IP tölu
Nmap tólið býður upp á ýmsar aðferðir til að skanna kerfi. Í þessu dæmi er ég að framkvæma skönnun með því að nota hýsingarnafn sem server2.linux-console.net til að komast að öllum opnum höfnum, þjónustu og MAC vistfangi á kerfinu.
nmap server2.linux-console.net Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 15:42 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.415 seconds You have new mail in /var/spool/mail/root
nmap 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-18 11:04 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 958/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.465 seconds You have new mail in /var/spool/mail/root
2. Skannaðu með „-v“ valkostinum
Þú getur séð að skipunin hér að neðan með -v valkostinum gefur ítarlegri upplýsingar um ytri vélina.
nmap -v server2.linux-console.net Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 15:43 EST Initiating ARP Ping Scan against 192.168.0.101 [1 port] at 15:43 The ARP Ping Scan took 0.01s to scan 1 total hosts. Initiating SYN Stealth Scan against server2.linux-console.net (192.168.0.101) [1680 ports] at 15:43 Discovered open port 22/tcp on 192.168.0.101 Discovered open port 80/tcp on 192.168.0.101 Discovered open port 8888/tcp on 192.168.0.101 Discovered open port 111/tcp on 192.168.0.101 Discovered open port 3306/tcp on 192.168.0.101 Discovered open port 957/tcp on 192.168.0.101 The SYN Stealth Scan took 0.30s to scan 1680 total ports. Host server2.linux-console.net (192.168.0.101) appears to be up ... good. Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.485 seconds Raw packets sent: 1681 (73.962KB) | Rcvd: 1681 (77.322KB)
Skannaðu marga gestgjafa
Þú getur skannað marga gestgjafa með því einfaldlega að skrifa IP-tölur þeirra eða hýsilnöfn með Nmap.
nmap 192.168.0.101 192.168.0.102 192.168.0.103 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:06 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 3 IP addresses (1 host up) scanned in 0.580 seconds
4. Skannaðu allt undirnet
Þú getur skannað allt undirnet eða IP svið með Nmap með því að gefa * algildisstaf með því.
nmap 192.168.0.* Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:11 EST Interesting ports on server1.linux-console.net (192.168.0.100): Not shown: 1677 closed ports PORT STATE SERVICE 22/tcp open ssh 111/tcp open rpcbind 851/tcp open unknown Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 256 IP addresses (2 hosts up) scanned in 5.550 seconds You have new mail in /var/spool/mail/root
Á úttakinu hér að ofan geturðu séð að nmap skannaði allt undirnet og gaf upplýsingar um þá véla sem eru uppi á netinu.
5. Skannaðu marga netþjóna með síðasta áttundu IP tölu
Þú getur framkvæmt skannanir á mörgum IP-tölum með því að tilgreina síðasta áttund af IP-tölu. Til dæmis, hér er ég að framkvæma skönnun á IP tölum 192.168.0.101, 192.168.0.102 og 192.168.0.103.
nmap 192.168.0.101,102,103 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:09 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 3 IP addresses (1 host up) scanned in 0.552 seconds You have new mail in /var/spool/mail/root
6. Skannaðu lista yfir vélar úr skrá
Ef þú hefur fleiri vélar til að skanna og allar hýsingarupplýsingar eru skrifaðar í skrá, geturðu beint beðið nmap um að lesa þá skrá og framkvæma skannanir. Við skulum sjá hvernig á að gera það.
Búðu til textaskrá sem kallast „nmaptest.txt“ og skilgreindu allar IP tölur eða hýsingarheiti þjónsins sem þú vilt skanna.
cat > nmaptest.txt localhost server2.linux-console.net 192.168.0.101
Næst skaltu keyra eftirfarandi skipun með „iL“ valmöguleikanum með nmap skipuninni til að skanna allar skráðar IP tölur í skránni.
nmap -iL nmaptest.txt Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-18 10:58 EST Interesting ports on localhost.localdomain (127.0.0.1): Not shown: 1675 closed ports PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 111/tcp open rpcbind 631/tcp open ipp 857/tcp open unknown Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 958/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 958/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 3 IP addresses (3 hosts up) scanned in 2.047 seconds
7. Skannaðu IP-tölusvið
Þú getur tilgreint IP svið á meðan þú gerir skönnun með Nmap.
nmap 192.168.0.101-110 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:09 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 10 IP addresses (1 host up) scanned in 0.542 seconds
8. Skanna netkerfi að fjarlægum gestgjöfum undanskildum
Þú getur útilokað suma véla á meðan þú framkvæmir fulla netskönnun eða þegar þú ert að skanna með jokertáknum með „–útiloka“ valkostinum.
nmap 192.168.0.* --exclude 192.168.0.100 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:16 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 255 IP addresses (1 host up) scanned in 5.313 seconds You have new mail in /var/spool/mail/root
9. Skannaðu OS upplýsingar og Traceroute
Með Nmap geturðu greint hvaða stýrikerfi og útgáfa er í gangi á ytri vélinni. Til að virkja uppgötvun stýrikerfis og útgáfu, handritaskönnun og traceroute, getum við notað „-A“ valkostinn með NMAP.
nmap -A 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:25 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 4.3 (protocol 2.0) 80/tcp open http Apache httpd 2.2.3 ((CentOS)) 111/tcp open rpcbind 2 (rpc #100000) 957/tcp open status 1 (rpc #100024) 3306/tcp open mysql MySQL (unauthorized) 8888/tcp open http lighttpd 1.4.32 MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=4.11%P=i686-redhat-linux-gnu%D=11/11%Tm=52814B66%O=22%C=1%M=080027) TSeq(Class=TR%IPID=Z%TS=1000HZ) T1(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW) T2(Resp=N) T3(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW) T4(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T7(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) PU(Resp=Y%DF=N%TOS=C0%IPLEN=164%RIPTL=148%RID=E%RIPCK=E%UCK=E%ULEN=134%DAT=E) Uptime 0.169 days (since Mon Nov 11 12:22:15 2013) Nmap finished: 1 IP address (1 host up) scanned in 22.271 seconds You have new mail in /var/spool/mail/root
Í úttakinu hér að ofan geturðu séð að nmap kom með TCP/IP fingrafar af stýrikerfinu sem keyrir á ytri vélum og er nákvæmari um höfnina og þjónustuna sem keyra á ytri vélunum.
10. Virkja OS uppgötvun með Nmap
Notaðu valkostinn -O og -osscan-giska hjálpar einnig við að uppgötva OS upplýsingar.
nmap -O server2.linux-console.net Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:40 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=4.11%P=i686-redhat-linux-gnu%D=11/11%Tm=52815CF4%O=22%C=1%M=080027) TSeq(Class=TR%IPID=Z%TS=1000HZ) T1(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW) T2(Resp=N) T3(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW) T4(Resp=Y%DF=Y%W=0%ACK=O%Flags=Option -O and -osscan-guess also helps to discover OS R%Ops=) T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T7(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) PU(Resp=Y%DF=N%TOS=C0%IPLEN=164%RIPTL=148%RID=E%RIPCK=E%UCK=E%ULEN=134%DAT=E) Uptime 0.221 days (since Mon Nov 11 12:22:16 2013) Nmap finished: 1 IP address (1 host up) scanned in 11.064 seconds You have new mail in /var/spool/mail/root
11. Skannaðu gestgjafa til að greina eldvegg
Neðangreind skipun mun framkvæma skönnun á ytri hýsil til að greina hvort einhverjar pakkasíur eða eldveggur er notaður af hýsil.
nmap -sA 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:27 EST All 1680 scanned ports on server2.linux-console.net (192.168.0.101) are UNfiltered MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.382 seconds You have new mail in /var/spool/mail/root
12. Skannaðu gestgjafa til að athuga hvort hann er varinn af eldvegg
Til að skanna gestgjafa ef hann er varinn af einhverjum pakkasíunarhugbúnaði eða eldveggjum.
nmap -PN 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:30 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.399 seconds
13. Finndu út lifandi gestgjafa í neti
Með hjálp „-sP“ valmöguleikans getum við einfaldlega athugað hvaða gestgjafar eru í beinni og uppi á netinu, með þessum valkosti sleppir nmap gáttaskynjun og öðru.
nmap -sP 192.168.0.* Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-18 11:01 EST Host server1.linux-console.net (192.168.0.100) appears to be up. Host server2.linux-console.net (192.168.0.101) appears to be up. MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 256 IP addresses (2 hosts up) scanned in 5.109 seconds
14. Framkvæmdu hraðskönnun
Þú getur framkvæmt hraðskönnun með „-F“ valmöguleikanum til að leita að höfnunum sem skráðar eru í nmap-services skránum og skilja eftir allar aðrar hafnir.
nmap -F 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:47 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1234 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.322 seconds
15. Finndu Nmap útgáfu
Þú getur fundið út Nmap útgáfu sem þú ert að keyra á vélinni þinni með -V valkostinum.
nmap -V Nmap version 4.11 ( http://www.insecure.org/nmap/ ) You have new mail in /var/spool/mail/root
16. Skannaðu höfn í röð
Notaðu -r fánann til að slemba ekki.
nmap -r 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:52 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.363 seconds
17. Prenta Host tengi og leiðir
Þú getur fundið út hýsilviðmót og leiðarupplýsingar með nmap með því að nota „–iflist“ valkostinn.
nmap --iflist Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:07 EST ************************INTERFACES************************ DEV (SHORT) IP/MASK TYPE UP MAC lo (lo) 127.0.0.1/8 loopback up eth0 (eth0) 192.168.0.100/24 ethernet up 08:00:27:11:C7:89 **************************ROUTES************************** DST/MASK DEV GATEWAY 192.168.0.0/0 eth0 169.254.0.0/0 eth0
Í úttakinu hér að ofan geturðu séð að kortið sýnir tengi sem eru tengd við kerfið þitt og viðkomandi leiðir.
18. Leitaðu að tiltekinni höfn
Það eru ýmsir möguleikar til að uppgötva höfn á ytri vél með Nmap. Þú getur tilgreint gáttina sem þú vilt að nmap skanni með -p valmöguleikanum, sjálfgefið skannar nmap aðeins TCP tengi.
nmap -p 80 server2.linux-console.net Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:12 EST Interesting ports on server2.linux-console.net (192.168.0.101): PORT STATE SERVICE 80/tcp open http MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) sca
19. Skannaðu TCP tengi
Þú getur líka tilgreint sérstakar gáttargerðir og númer með nmap til að skanna.
nmap -p T:8888,80 server2.linux-console.net Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:15 EST Interesting ports on server2.linux-console.net (192.168.0.101): PORT STATE SERVICE 80/tcp open http 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.157 seconds
20. Skannaðu UDP tengi
nmap -sU 53 server2.linux-console.net Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:15 EST Interesting ports on server2.linux-console.net (192.168.0.101): PORT STATE SERVICE 53/udp open http 8888/udp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.157 seconds
21. Skannaðu margar hafnir
Þú getur líka skannað margar tengi með því að nota valkostinn -p.
nmap -p 80,443 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-18 10:56 EST Interesting ports on server2.linux-console.net (192.168.0.101): PORT STATE SERVICE 80/tcp open http 443/tcp closed https MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.190 seconds
22. Skannaðu tengi eftir netsviði
Þú getur skannað gáttir með sviðum með því að nota tjáningar.
nmap -p 80-160 192.168.0.101
23. Finndu útgáfunúmer Host Services
Við getum fundið út útgáfur þjónustunnar sem keyra á ytri gestgjöfum með „-sV“ valkostinum.
nmap -sV 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:48 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 4.3 (protocol 2.0) 80/tcp open http Apache httpd 2.2.3 ((CentOS)) 111/tcp open rpcbind 2 (rpc #100000) 957/tcp open status 1 (rpc #100024) 3306/tcp open mysql MySQL (unauthorized) 8888/tcp open http lighttpd 1.4.32 MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 12.624 seconds
24. Skannaðu ytri gestgjafa með TCP ACK (PA) og TCP Syn (PS)
Stundum lokar pakkasíunareldveggir á staðlaðar ICMP ping beiðnir, í því tilviki getum við notað TCP ACK og TCP Syn aðferðir til að skanna fjarstýri.
nmap -PS 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:51 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.360 seconds You have new mail in /var/spool/mail/root
25. Skannaðu fjarhýsil fyrir tilteknar höfn með TCP ACK
nmap -PA -p 22,80 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 18:02 EST Interesting ports on server2.linux-console.net (192.168.0.101): PORT STATE SERVICE 22/tcp open ssh 80/tcp open http MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.166 seconds You have new mail in /var/spool/mail/root
26. Skannaðu fjarhýsil fyrir tilteknar höfn með TCP Syn
nmap -PS -p 22,80 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 18:08 EST Interesting ports on server2.linux-console.net (192.168.0.101): PORT STATE SERVICE 22/tcp open ssh 80/tcp open http MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.165 seconds You have new mail in /var/spool/mail/root
27. Framkvæmdu laumuskönnun
nmap -sS 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 18:10 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.383 seconds You have new mail in /var/spool/mail/root
28. Athugaðu algengustu tengi með TCP Syn
nmap -sT 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 18:12 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.406 seconds You have new mail in /var/spool/mail/root
29. Framkvæmdu tcp núllskönnun til að blekkja eldvegg
nmap -sN 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 19:01 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open|filtered ssh 80/tcp open|filtered http 111/tcp open|filtered rpcbind 957/tcp open|filtered unknown 3306/tcp open|filtered mysql 8888/tcp open|filtered sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 1.584 seconds You have new mail in /var/spool/mail/root
Það er það með NMAP í bili, ég mun koma með fleiri skapandi valkosti NMAP í seinni hluta okkar af þessu alvarlega. Þangað til, fylgstu með okkur og ekki gleyma að deila dýrmætum athugasemdum þínum.