由於內部裝了一台 Wifi AP , 設定時候, 沒有設定這一台的固定IP ( dchp取得的 )
所以透過 nmap 可以知道網段
# apt-get install namp
# nmap -sP 192.168.11.0/24
# nmap -sP 192.168.11.1-254
Nmap scan report for 192.168.11.1
Host is up (0.017s latency).
Nmap scan report for 192.168.11.2
Host is up (0.019s latency).
Nmap scan report for 192.168.11.4
Host is up (0.0095s latency).
Nmap scan report for 192.168.11.14
Host is up (0.000071s latency).
Nmap done: 256 IP addresses (4 hosts up) scanned in 6.74 seconds
@作業系統 (需要先sudo權限)
# nmap -O 192.168.11.1
@ 某台主機詳細資訊
# nmap -A -T4 192.168.11.1
Starting Nmap 6.40 ( http://nmap.org ) at 2016-04-28 17:21 CST
Nmap scan report for 192.168.11.1
Host is up (0.18s latency).
Not shown: 995 closed ports
PORT STATE SERVICE VERSION
53/tcp open domain ISC BIND 9.X
| dns-nsid:
|_ bind.version:
80/tcp open http Buffalo AirStation http config
| http-auth:
| HTTP/1.0 401 Unauthorized
|_ Basic realm=AirStation
|_http-methods: No Allow or Public header in OPTIONS response (status code 501)
|_http-title: UNAUTHORIZED
2601/tcp open zebra Quagga routing software
2602/tcp open zebra Quagga routing software
49152/tcp open upnp Intel UPnP reference SDK 1.2 (Linux 2.4.20; UPnP 1.0)
Service Info: OS: Linux; Device: WAP; CPE: cpe:/o:linux:linux_kernel:2.4.20
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.16 seconds
沒有留言:
張貼留言