Chinaunix首页 | 论坛 | 博客
  • 博客访问: 13473
  • 博文数量: 13
  • 博客积分: 475
  • 博客等级: 下士
  • 技术积分: 125
  • 用 户 组: 普通用户
  • 注册时间: 2010-07-09 11:20
文章分类

全部博文(13)

文章存档

2012年(4)

2010年(9)

我的朋友

分类:

2010-11-16 19:03:02

Nmap ("Network Mapper") an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts.  Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.

Usage: nmap [Scan Type(s)] [Options] {target specification}
TARGET SPECIFICATION:
  Can pass hostnames, IP addresses, networks, etc.
  Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254
  -iL : Input from list of hosts/networks
  -iR : Choose random targets
  --exclude : Exclude hosts/networks
  --excludefile : Exclude list from file

# nmap -A -T4 10.200.34.58
-A: enable OS and version detection, script scanning, and traceroute
-T4: for faster execution


阅读(325) | 评论(0) | 转发(0) |
0

上一篇:Sth about network scanning

下一篇:boost_foreach

给主人留下些什么吧!~~