nmap扫描
1. nmap基本使用
- nmap 192.168.100.240
扫描100.240主机开放端口的信息
┌──(root㉿kail)-[~]
└─# nmap 192.168.100.240
Starting Nmap 7.93 ( https://nmap.org ) at 2023-02-13 09:36 CST
Nmap scan report for localhost (192.168.100.240)
Host is up (0.00013s latency).
Not shown: 997 closed tcp ports (reset)
PORT STATE SERVICE
22/tcp open ssh
8080/tcp open http-proxy
8081/tcp open blackice-icecap
MAC Address: 00:0C:29:0A:FC:F7 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 0.27 seconds
上面扫描出来的是打开的端口以及服务名称等
- nmap 192.168.100.240,230
同时扫面240和230主机的端口信息
// 同时扫面240和230主机的端口信息
┌──(root㉿kail)-[~]
└─# nmap 192.168.100.240,230
Starting Nmap 7.93 ( https://nmap.org ) at 2023-02-13 09:44 CST
Nmap scan report for localhost (192.168.100.230)
Host is up (0.00047s latency).
Not shown: 994 closed tcp ports (reset)
PORT STATE SERVICE
22/tcp open ssh
80/tcp filtered http
111/tcp open rpcbind
179/tcp open bgp
443/tcp filtered https
2049/tcp open nfs
MAC Address: 00:0C:29:B0:FC:CE (VMware)
Nmap scan report for 192.168.100.240
Host is up (0.00056s latency).
Not shown: 997 closed tcp ports (reset)
PORT STATE SERVICE
22/tcp open ssh
8080/tcp open http-proxy
8081/tcp open blackice-icecap
MAC Address: 00:0C:29:0A