如何使用Nmap发现网络主机?

Hi. We started with Nmap target specification. Now we resume with host discovery options. Host discovery is detecting hosts in the same or remote network. Generally, we send a packet to the target host and then we get a response or not but some times we just listen and get packets from hosts. We decide host status according to response if we get it. There are some different ways to send packets. Nmap default (if no option is given) action for host discovery is ICMP echo and time stamp, sync to 443 (https) and ack to TCP 80 (HTTP).

你好我们从Nmap目标规范开始。 现在,我们继续使用主机发现选项。 主机发现正在检测同一或远程网络中的主机。 通常,我们将数据包发送到目标主机,然后我们是否收到响应,但有时我们只是侦听并从主机获取数据包。 如果得到响应,我们将根据响应确定主机状态。 有几种不同的发送数据包的方式。 主机发现的Nmap默认(如果未提供任何选项)操作是ICMP回显和时间戳,同步到443(https)和ack到TCP 80(HTTP)。

ARP扫描 (ARP Scan)

-PR option is used for arp inspection so it just sends arp request. In the second block, we see the target host network dump. The -sn option disable port scan.

-PR选项用于arp检查,因此它仅发送arp请求。 在第二块中,我们看到目标主机网络转储。 -sn选项禁用端口扫描。

$ nmap -PR -sn u1

清单扫描 (List Scan)

The list scan is a passive scan so we do not send packets to the network we just listen. As you can see output there is one host which is up but the scan shows no one is up.

列表扫描是被动扫描,因此我们不会将包发送到仅侦听的网络。 如您所见,输出中有一台主机处于启动状态,但扫描显示没有一台主机处于启动状态。

$ nmap -sL 192.168.122.0/24

没有Ping扫描 (No Ping Scan)

No ping scan disables ping stage of the scan. Normally a scan starts with ping to find live hosts and then start heavy port scan to the live hosts. But if you set these options it st

  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值