Chinaunix首页 | 论坛 | 博客
  • 博客访问: 550834
  • 博文数量: 116
  • 博客积分: 2063
  • 博客等级: 大尉
  • 技术积分: 1174
  • 用 户 组: 普通用户
  • 注册时间: 2007-10-26 16:44
个人简介

none

文章分类

全部博文(116)

文章存档

2023年(2)

2020年(3)

2019年(4)

2018年(7)

2017年(6)

2016年(17)

2015年(13)

2014年(19)

2013年(6)

2012年(13)

2011年(5)

2010年(11)

2008年(10)

分类: LINUX

2016-10-31 16:51:47

端口扫描:
nmap -v -sT localhost
SYN扫描:
sudo nmap -v -sS localhost

[root@localhost ~]# nmap -v -sT -p1-10000 10.4.13.105        #############  OUR 3531+3531 NVR

Starting Nmap 5.51 ( ) at 2016-10-31 16:19 CST
Initiating ARP Ping Scan at 16:19
Scanning 10.4.13.105 [1 port]
Completed ARP Ping Scan at 16:19, 0.01s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 16:19
Completed Parallel DNS resolution of 1 host. at 16:19, 5.50s elapsed
Initiating Connect Scan at 16:19
Scanning 10.4.13.105 [10000 ports]
Discovered open port 80/tcp on 10.4.13.105
Discovered open port 23/tcp on 10.4.13.105
Discovered open port 8002/tcp on 10.4.13.105
Discovered open port 8001/tcp on 10.4.13.105
Discovered open port 5050/tcp on 10.4.13.105
Discovered open port 6050/tcp on 10.4.13.105
Completed Connect Scan at 16:19, 0.24s elapsed (10000 total ports)
Nmap scan report for 10.4.13.105
Host is up (0.0032s latency).
Not shown: 9994 closed ports
PORT     STATE SERVICE
23/tcp   open  telnet
80/tcp   open  http
5050/tcp open  mmcc
6050/tcp open  arcserve
8001/tcp open  vcom-tunnel
8002/tcp open  teradataordbms
MAC Address: 00:00:45:1D:2A:3C (Ford Aerospace & COMM.)

Read data files from: /usr/share/nmap

Nmap done: 1 IP address (1 host up) scanned in 5.81 seconds
           Raw packets sent: 1 (28B) | Rcvd: 1 (28B)
[root@localhost ~]# 
[root@localhost ~]# 
[root@localhost ~]# nmap -v -sT -p1-10000 10.4.15.100           ##############  XM 3516A H265 IPC
Starting Nmap 5.51 ( ) at 2016-10-31 16:20 CST
Initiating ARP Ping Scan at 16:20
Scanning 10.4.15.100 [1 port]
Completed ARP Ping Scan at 16:20, 0.01s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 16:20
Completed Parallel DNS resolution of 1 host. at 16:20, 5.50s elapsed
Initiating Connect Scan at 16:20
Scanning 10.4.15.100 [10000 ports]
Discovered open port 80/tcp on 10.4.15.100
Discovered open port 23/tcp on 10.4.15.100
Discovered open port 554/tcp on 10.4.15.100
Discovered open port 8899/tcp on 10.4.15.100
Discovered open port 9527/tcp on 10.4.15.100
Completed Connect Scan at 16:20, 0.25s elapsed (10000 total ports)
Nmap scan report for 10.4.15.100
Host is up (0.0028s latency).
Not shown: 9995 closed ports
PORT     STATE SERVICE
23/tcp   open  telnet
80/tcp   open  http
554/tcp  open  rtsp
8899/tcp open  ospf-lite
9527/tcp open  unknown
MAC Address: 00:12:16:6F:D8:99 (ICP Internet Communication Payment AG)

Read data files from: /usr/share/nmap

Nmap done: 1 IP address (1 host up) scanned in 5.82 seconds
           Raw packets sent: 1 (28B) | Rcvd: 1 (28B)
[root@localhost ~]# 
[root@localhost ~]# 
[root@localhost ~]# 
[root@localhost ~]# 
[root@localhost ~]# nmap -v -sT -p1-10000 10.4.14.114    ##############  OUR 3516C H264 IPC
Starting Nmap 5.51 ( ) at 2016-10-31 16:21 CST
Initiating ARP Ping Scan at 16:21
Scanning 10.4.14.114 [1 port]
Completed ARP Ping Scan at 16:21, 0.02s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 16:21
Completed Parallel DNS resolution of 1 host. at 16:21, 5.50s elapsed
Initiating Connect Scan at 16:21
Scanning 10.4.14.114 [10000 ports]
Discovered open port 23/tcp on 10.4.14.114
Discovered open port 554/tcp on 10.4.14.114
Discovered open port 139/tcp on 10.4.14.114
Discovered open port 21/tcp on 10.4.14.114
Discovered open port 80/tcp on 10.4.14.114
Discovered open port 5050/tcp on 10.4.14.114
Discovered open port 6050/tcp on 10.4.14.114
Completed Connect Scan at 16:21, 1.75s elapsed (10000 total ports)
Nmap scan report for 10.4.14.114
Host is up (0.0083s latency).
Not shown: 9993 closed ports
PORT     STATE SERVICE
21/tcp   open  ftp
23/tcp   open  telnet
80/tcp   open  http
139/tcp  open  netbios-ssn
554/tcp  open  rtsp
5050/tcp open  mmcc
6050/tcp open  arcserve
MAC Address: 0E:0A:09:0D:26:14 (Unknown)

Read data files from: /usr/share/nmap
Nmap done: 1 IP address (1 host up) scanned in 7.32 seconds
           Raw packets sent: 1 (28B) | Rcvd: 1 (28B)
[root@localhost ~]#
阅读(1451) | 评论(1) | 转发(0) |
给主人留下些什么吧!~~

k_ewell2016-10-31 16:52:45

Hacking the IP camera (part 1)
https://www.pentestpartners.com/blog/hacking-the-ip-camera-part-1/

端口扫描之王——nmap入门精讲(一)
http://www.cnblogs.com/st-leslie/p/5115280.html