kalo mau lengkap beli buku nya tentang scan nmap yang di karang oleh fyodor Here are some really cool scanning techniques using Nmap 1) Get info about remote host ports and OS detection
Code:
nmap -sS -P0 -sV -O <target> -sS TCP SYN scanning (also known as half-open, or stealth scanning) -P0 option allows you to switch off ICMP pings. -sV option enables version detection -O flag attempt to identify the remote operating system Other option: -A option enables both OS fingerprinting and version detection -v use -v twice for more verbosity. nmap -sS -P0 -A -v < target > 2) Get list of servers with a specific port open
Code:
nmap -sT -p 80 -oG – 192.168.1.* | grep open 3) Find all active IP addresses in a network
Code:
nmap -sP 192.168.0.* Another option is:
Code:
nmap -sP 192.168.0.0/24 4) Ping a range of IP addresses
Code:
nmap -sP 192.168.1.100-254 5) Find unused IPs on a given subnet
Code:
nmap -T4 -sP 192.168.2.0/24 && egrep “00:00:00:00:00:00″ /proc/net/arp
Code:
nmap -PN -T4 -p139,445 -n -v –script=smb-check-vulns –script-args safe=1 192.168.0.1-254 7) Scan Network for Rogue APs.
Code:
nmap -A -p1-85,113,443,8080-8100 -T4 –min-hostgroup 50 –max-rtt-timeout 2000 –initial-rtt-timeout 300 –max-retries 3 –host-timeout 20m –max-scan-delay 1000 -oA wapscan 10.0.0.0/8 8) Use a decoy while scanning ports to avoid getting caught by the sys admin
Code:
sudo nmap -sS 192.168.0.10 -D 192.168.0.2 9) List of reverse DNS records for a subnet
Code:
nmap -R -sL 209.85.229.99/27 | awk ‘{if($3==”not”)print”(“$2″) no PTR”;else print$3″ is “$2}’ | grep ‘(‘ 10) How Many Linux And Windows Devices Are On Your Network?
Code:
sudo nmap -F -O 192.168.0.1-255 | grep “Running: ” > /tmp/os; echo “$(cat /tmp/os | grep Linux | wc -l) Linux device(s)”; echo “$(cat /tmp/os | grep Windows | wc -l) Window(s) devices” ref :
Code:
http://www.google.com/search?ie=UTF-8&oe=UTF-8&sourceid=navclient&gfns=1&q=nmap+scan+os+grep |
|
Sabtu, 27 April 2013
nmap scanning #1
Langganan:
Posting Komentar (Atom)
Tidak ada komentar:
Posting Komentar