Nmap 是開源的網路掃描與檢測工具, 對於系統管理員十分實用, 以下是 nmap 的實用例子。
如果系統內沒有安裝 nmap, 可以用系統的套件管理工具安裝:
RHEL, CentOS, Fedora:
Debian, Ubuntu:
安裝 nmap 後, 便可以開始使用 nmap.
掃瞄 IP 地址或 Hostname:
[root@server1 ~]# nmap server2.tecmint.com
Starting Nmap 5.51 ( http://nmap.org ) at 2015-08-26 14:29 HKT
Nmap scan report for phpini.com (104.27.168.11)
Host is up (0.0016s latency).
Other addresses for phpini.com (not scanned): 104.27.169.11
Not shown: 996 filtered ports
PORT STATE SERVICE
80/tcp open http
443/tcp open https
8080/tcp open http-proxy
8443/tcp open https-alt
改成 IP 地址:
Starting Nmap 5.51 ( http://nmap.org ) at 2015-08-26 14:30 HKT
Nmap scan report for 104.27.169.11
Host is up (0.0020s latency).
Not shown: 996 filtered ports
PORT STATE SERVICE
80/tcp open http
443/tcp open https
8080/tcp open http-proxy
8443/tcp open https-alt
Nmap done: 1 IP address (1 host up) scanned in 4.65 seconds
如果加上 -v 參數, 會顯示更為詳細的資訊:
Starting Nmap 5.51 ( http://nmap.org ) at 2015-08-26 14:33 HKT
Initiating Ping Scan at 14:33
Scanning phpini.com (104.27.169.11) [4 ports]
Completed Ping Scan at 14:33, 0.02s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 14:33
Completed Parallel DNS resolution of 1 host. at 14:33, 0.01s elapsed
Initiating SYN Stealth Scan at 14:33
Scanning phpini.com (104.27.169.11) [1000 ports]
Discovered open port 80/tcp on 104.27.169.11
Discovered open port 8080/tcp on 104.27.169.11
Discovered open port 443/tcp on 104.27.169.11
Discovered open port 8443/tcp on 104.27.169.11
Completed SYN Stealth Scan at 14:33, 4.73s elapsed (1000 total ports)
Nmap scan report for phpini.com (104.27.169.11)
Host is up (0.0018s latency).
Other addresses for phpini.com (not scanned): 104.27.168.11
Not shown: 996 filtered ports
PORT STATE SERVICE
80/tcp open http
443/tcp open https
8080/tcp open http-proxy
8443/tcp open https-alt
Read data files from: /usr/share/nmap
Nmap done: 1 IP address (1 host up) scanned in 4.84 seconds
Raw packets sent: 2002 (88.064KB) | Rcvd: 7 (308B)
掃瞄多台主機
例如要掃瞄多台主機, 指令是這樣:
掃瞄整個 class C 網路:
或
掃瞄 192.168.1.121, 192.168.1.125 及 192.168.1.130 三台主機:
從檔案讀取主機掃瞄:
掃瞄作業系統及服務的版本資訊:
掃瞄主機是否有防火牆:
掃瞄有開機的主機:
掃瞄埠號, 例如想掃瞄埠號 80:
掃瞄多個埠號, 例如掃瞄 80 及 443 埠號: