man nbtscan 快速扫描

nbtscan(1) scan networks searching for NetBIOS information nbtscan(1)

NAME
nbtscan - scan networks for NetBIOS name information

SYNOPSIS
nbtscan [-v] [-d] [-e] [-l] [-t timeout] [-b bandwidth] [-r] [-q]
[-s separator] [-h] [-m retransmits] [-f filename | target]

DESCRIPTION
NBTscan is a program for scanning IP networks for NetBIOS name information. It sends NetBIOS status query to each
address in supplied range and lists received information in human readable form. For each responded host it lists
IP address, NetBIOS computer name, logged-in user name and MAC address (such as Ethernet).

   NBTscan produces a report like that:

       IP address       NetBIOS Name     Server    User             MAC address
       ------------------------------------------------------------------------------
       192.168.1.2      MYCOMPUTER                 JDOE             00-a0-c9-12-34-56
       192.168.1.5      WIN98COMP        <server>  RROE             00-a0-c9-78-90-00
       192.168.1.123    DPTSERVER        <server>  ADMINISTRATOR    08-00-09-12-34-56

   First  column  lists IP address of responded host. Second column is computer name. Third column indicates if this
   computer shares or is able to share files or printers. For NT machine it means that Server Service is running  on
   this  computer.  For Windows 95 it means that "I want to be able to give others access to my files" or "I want to
   be able to allow others to print on my printer(s)" checkbox is ticked (in Control  Panel/Network/File  and  Print
   Sharing).  Most often it means that this computer shares files. Third column shows user name. If no one is logged
   on from this computer it is same as computer name. Last column shows adapter MAC address.

   If run with -v switch NBTscan lists whole NetBIOS name table for each responded address. The  output  looks  like
   that:

       NetBIOS Name Table for Host 192.168.1.123:

       Name             Service          Type
       ----------------------------------------
       DPTSERVER        <00>             UNIQUE
       DPTSERVER        <20>             UNIQUE
       DEPARTMENT       <00>             GROUP
       DEPARTMENT       <1c>             GROUP
       DEPARTMENT       <1b>             UNIQUE
       DEPARTMENT       <1e>             GROUP
       DPTSERVER        <03>             UNIQUE
       DEPARTMENT       <1d>             UNIQUE
       ??__MSBROWSE__?  <01>             GROUP
       INet~Services    <1c>             GROUP
       IS~DPTSERVER     <00>             UNIQUE
       DPTSERVER        <01>             UNIQUE

       Adapter address: 00-a0-c9-12-34-56
       ----------------------------------------

OPTIONS
A summary of options is included below.

   -v     Verbose output. Print all names received from each host.

   -d     Dump packets. Print whole packet contents. Cannot be used with -v, -s or -h options.

   -e     Format output in /etc/hosts format.

   -l     Format output in lmhosts format.

   -t <timeout>
          Wait timeout seconds for response. Default 1.

   -b <bandwidth>
          Output   throttling. Slow down output so that it uses no more that bandwidth bps. Useful on slow links, so
          that outgoing queries don't get dropped.

   -r     Use local port 137 for scans. Win95 boxes respond to this only. You need to be root to use this option.

   -q     Suppress banners and error messages.

   -s <separator>
          Script-friendly output. Don't print column and record headers, separate fields with separator.

   -h     Print human-readable names for services. Can only be used with -v option.

   -m <retransmits>
          Number of retransmits. Default 0.

   -f <filename>
          Take IP addresses to scan from file "filename"

   target NBTscan is a command-line tool. You have to supply at least one argument, the address  range,  in  one  of
          three forms:

          xxx.xxx.xxx.xxx
                 Single IP in dotted-decimal notation. Example: 192.168.1.1

          xxx.xxx.xxx.xxx/xx
                 Net address and subnet mask. Example: 192.168.1.0/24

          xxx.xxx.xxx.xxx-xxx
                 Address  range.  Example:  192.168.1.1-127.  This  will  scan  all  addresses  from  192.168.1.1 to
                 192.168.1.127

EXAMPLES
Scans the whole C-class network:

       nbtscan -r 192.168.1.0/24

   Scans a range from 192.168.1.25 to 192.168.1.137:

       nbtscan 192.168.1.25-137

   Scans C-class network. Prints results in script-friendly format using colon as field separator:

       nbtscan -v -s : 192.168.1.0/24

   The last command produces output like that:

       192.168.0.1:NT_SERVER:00U
       192.168.0.1:MY_DOMAIN:00G
       192.168.0.1:ADMINISTRATOR:03U
       192.168.0.2:OTHER_BOX:00U
       ...

   Scans IP addresses specified in file iplist:

       nbtscan -f iplist

NETBIOS SUFFIXES
NetBIOS Suffix, aka NetBIOS End Character (endchar), indicates service type for the registered name. The most
known codes are listed below. (U = Unique Name, G = Group Name)

       Name                Number(h)  Type  Usage
       --------------------------------------------------------------------------

       <computername>         00       U    Workstation Service
       <computername>         01       U    Messenger Service
       <\--__MSBROWSE__>      01       G    Master Browser
       <computername>         03       U    Messenger Service
       <computername>         06       U    RAS Server Service
       <computername>         1F       U    NetDDE Service
       <computername>         20       U    File Server Service
       <computername>         21       U    RAS Client Service
       <computername>         22       U    Exchange Interchange(MSMail Connector)
       <computername>         23       U    Exchange Store
       <computername>         24       U    Exchange Directory
       <computername>         30       U    Modem Sharing Server Service
       <computername>         31       U    Modem Sharing Client Service
       <computername>         43       U    SMS Clients Remote Control
       <computername>         44       U    SMS Administrators Remote Control Tool
       <computername>         45       U    SMS Clients Remote Chat
       <computername>         46       U    SMS Clients Remote Transfer
       <computername>         87       U    Microsoft Exchange MTA
       <computername>         6A       U    Microsoft Exchange IMC
       <computername>         BE       U    Network Monitor Agent
       <computername>         BF       U    Network Monitor Application
       <username>             03       U    Messenger Service
       <domain>               00       G    Domain Name
       <domain>               1B       U    Domain Master Browser
       <domain>               1C       G    Domain Controllers
       <domain>               1D       U    Master Browser
       <domain>               1E       G    Browser Service Elections
       <INet~Services>        1C       G    IIS
       <IS~computer name>     00       U    IIS

FAQ
1. NBTscan lists my Windows boxes just fine but does not list my Unixes or routers. Why?

   R:  That  is the way it is supposed to work. NBTscan uses NetBIOS for scanning and NetBIOS is only implemented by
   Windows (and some software on Unix such as Samba).

   2.  Why do I get "Connection reset by peer" errors on Windows 2000?

   R: NBTscan uses port 137 UDP for sending queries. If the port is closed on destination host destination will  re‐
   ply with ICMP "Port unreachable" message. Most operating system will ignore this message. Windows 2000 reports it
   to the application as "Connection reset by peer" error. Just ignore it.

   3.  Why NBTscan doesn't scan for shares? Are you going to add share scanning to NBTscan?

   R: No. NBTscan uses UDP for what it does. That makes it very fast. Share scanning requires TCP. For one thing, it
   will make nbtscan more slow. Also adding share scanning means adding a lot of new code to nbtscan. There is a lot
   of good share scanners around, so there is no reason to duplicate that work.

   4.  Why do I get 00-00-00-00-00-00 instead of MAC address when I scan a Samba box?

   R: Because that's what Samba send in response to the query. Nbtscan just prints out what it gets.

AUTHOR
NBTscan was created by Alla Bezroutchko alla@inetcat.org. Currently is maintained by some volunteers at
https://github.com/resurrecting-open-source-projects/nbtscan

   This  manual page was written for the first time by Ryszard Lach <rla@debian.org> and rewritten, from scratch, by
   Joao Eriberto Mota Filho <eriberto@debian.org> for the Debian GNU/Linux system (but may be used by others).

nbtscan-1.6 14 Nov 2019 nbtscan(1)

软件介绍: gui是图形界面下的扫描器COMMAND里的是nbtscan(附:基本的使用方法)注意码任意输入即可。MAC扫描器&nbsp;是用于批量获取远程计算机网卡的物理地址(即MAC地址)的一款绿色软件。下载后解压到一个目录,直接运行即可。本软件可以在win9x/2000/xp等操作系统中&nbsp;用户界面主要分为下面的几个部分:&nbsp;IP&nbsp;范围第一个输入框输入开始的IP地址,第二个输入框输入结束的IP地址。如界面所示的192.168.0.1&nbsp;&nbsp;&nbsp;192.168.0.255&nbsp;。您在输入开始IP地址的时候,结束的IP地址会自动填充和开始的一样。&nbsp;选项本机所在IP地址段扫描&nbsp;&nbsp;:如果你想扫描本机所在的局域网,可以选择这一项,IP范围会自动填充您的机器所在局域网的起始IP和终止IP。自定义IP段扫描:&nbsp;如果你想随意扫描一个地址段,那可以选择这一项。&nbsp;暂停扫描:&nbsp;&nbsp;你在扫描的过程中想让扫描停止,但又不想让它从头再来的话,你可以使用这个暂停功能。&nbsp;延时时间:&nbsp;&nbsp;这里显示的这个数字是一个毫秒数,它的意思是向两个IP地址之间发送数据包的延时毫秒数。这里的默认值是100毫秒。这是我在宽带测试的值,你可以根据你的网络速度来选择这个数值。可以手工输入,范围是0-9999。&nbsp;本机IP:&nbsp;这里显示的是你的计算机其中的一个IP地址。(如果是有多个IP的话)&nbsp;扫描进度:显示当前扫描的完成情况。&nbsp;扫描结果:显示的是已经返回mac地址的计算机IP,还包括计算机名称、工作组。&nbsp;修改本机MAC地址:&nbsp;一看就会,就不多说了。&nbsp;
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值