Discovered open port 3389/tcp on 192.168.230.128 Discovered open port 80/tcp on 192.168.230.128 Completed SYN Stealth Scan at 15:43, 1.10s elapsed (5 total ports) Initiating Service scan at 15:43 Scanning 3 services on 192.168.230.128 Completed Service scan at 15:43, 6.01s elapsed (3 servi...
Discovered open port 135/tcp on 192.168.1.2 Discovered open port 3306/tcp on 192.168.1.2 Discovered open port 139/tcp on 192.168.1.2 Discovered open port 5357/tcp on 192.168.1.2 Discovered open port 10001/tcp on 192.168.1.2 Completed SYN Stealth Scan at 18:19, 4.87s elapsed (1000 total po...
...Nmap scan report for WIN-ZMEXAGUBVGL.cn.ibm.com (9.123.239.108)Host is up (0.00s latency).Not shown: 996 filtered portsPORT STATE SERVICE135/tcp open msrpc139/tcp open netbios-ssn445/tcp open microsoft-ds5357/tcp open unknownMAC Address: 00:0C:29:E6:2C:F3 (V...
—port-ratio <ratio>: 扫描指定频率以上的端口。与上述—top-ports类似,这里以概率作为参数 —version-trace: 显示出详细的版本侦测过程信息 —osscan-limit: 限制Nmap只对确定的主机的进行OS探测(至少需确知该主机分别有一个open和closed的端口) —osscan-guess: 大胆猜测对方的主机的系统类型。由此准确性会下降...
-bash: nmap: command not found [root@CentOS7-1 ~]# yum install nmap -y 1. 2. 3. 语法格式 nmap [Scan Type...] [Options] {target specification} 1. 选项说明 -O #激活探测操作 -P0 #只进行扫描,不ping主机 -PT #是同TCP的ping ...
-sn: Ping Scan 只进行主机发现,不进行端口扫描。-Pn: 将所有指定的主机视作开启的,跳过主机发现的过程。-PS/PA/PU/PY[portlist]: 使用TCPSYN/ACK或SCTP INIT/ECHO方式进行发现。-PE/PP/PM: 使用ICMP echo, timestamp, and netmask 请求包发现主机。-PO[protocollist]: 使用IP协议包探测对方主机是否开启...
-sn: Ping Scan 只进行主机发现,不进行端口扫描。 -Pn: 将所有指定的主机视作开启的,跳过主机发现的过程。 -PS/PA/PU/PY[portlist]: 使用TCPSYN/ACK或SCTP INIT/ECHO方式进行发现。 -PE/PP/PM: 使用ICMP echo, timestamp, and netmask 请求包发现主机。-PO[protocollist]: 使用IP协议包探测对方主机是否...
-sn: Ping Scan 只进行主机发现,不进行端口扫描。 -Pn: 将所有指定的主机视作开启的,跳过主机发现的过程。 -PS/PA/PU/PY[portlist]: 使用TCPSYN/ACK或SCTP INIT/ECHO方式进行发现。 -PE/PP/PM: 使用ICMP echo, timestamp, and netmask 请求包发现主机。-PO[protocollist]: 使用IP协议包探测对方主机是否...
Discovered open port 8888/tcp on 192.168.0.101 Discovered open port 111/tcp on 192.168.0.101 Discovered open port 3306/tcp on 192.168.0.101 Discovered open port 957/tcp on 192.168.0.101 The SYN Stealth Scan took 0.30s to scan 1680 total ports. ...
-- The Head Section -- -- The Rule Section -- portrule = function(host, port) return port.protocol == "tcp" and port.number == 80 and port.state == "open" end -- The Action Section -- action = function(host, port) return "Hello world !" end...