2016年4月28日 星期四

[nmap] - 掃描網域內所需的資訊

由於內部裝了一台 Wifi AP , 設定時候, 沒有設定這一台的固定IP ( dchp取得的 )

所以透過 nmap 可以知道網段

# apt-get install namp

# nmap -sP 192.168.11.0/24
# nmap -sP 192.168.11.1-254
Nmap scan report for 192.168.11.1
Host is up (0.017s latency).
Nmap scan report for 192.168.11.2
Host is up (0.019s latency).
Nmap scan report for 192.168.11.4
Host is up (0.0095s latency).
Nmap scan report for 192.168.11.14
Host is up (0.000071s latency).
Nmap done: 256 IP addresses (4 hosts up) scanned in 6.74 seconds


@作業系統 (需要先sudo權限)
# nmap -O 192.168.11.1

@ 某台主機詳細資訊
# nmap -A -T4 192.168.11.1
Starting Nmap 6.40 ( http://nmap.org ) at 2016-04-28 17:21 CST
Nmap scan report for 192.168.11.1
Host is up (0.18s latency).
Not shown: 995 closed ports
PORT      STATE SERVICE VERSION
53/tcp    open  domain  ISC BIND 9.X
| dns-nsid:
|_  bind.version:
80/tcp    open  http    Buffalo AirStation http config
| http-auth:
| HTTP/1.0 401 Unauthorized
|_  Basic realm=AirStation
|_http-methods: No Allow or Public header in OPTIONS response (status code 501)
|_http-title: UNAUTHORIZED
2601/tcp  open  zebra   Quagga routing software
2602/tcp  open  zebra   Quagga routing software
49152/tcp open  upnp    Intel UPnP reference SDK 1.2 (Linux 2.4.20; UPnP 1.0)
Service Info: OS: Linux; Device: WAP; CPE: cpe:/o:linux:linux_kernel:2.4.20

Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.16 seconds

沒有留言:

張貼留言