The network mapper (Nmap)
Nmap is the top dog in port scanning and enumeration. Covering all options and modules of Nmap in this guide is outside the scope of this book; instead, we will cover the scans that I mostly use when testing. But first, here's some info on port states:
- Open: An application on the target machine is listening for connections/packets on that port
- Closed: Ports have no application listening on them, though they could open up at any time
- Filtered: A firewall, filter, or other network obstacle is blocking the port so that Nmap cannot tell whether it is open or closed
The following are the Nmap options available:
- O: OS detection
- p: Port scan
- p-: Scan all ports (1-65535)
- p 80,443: Scan port 80 and 443
- p 22-1024: Scan ports 22 through 1024
- top-ports X: X is a number and it will scan X number of the top popular ports; I usually use 100 for a quick scan
- sV: Service-detection
- Tx: Set scan speed
- T1: Really slow port scan
- T5: Really fast port scan (really noisy)
- sS: Stealth scan
- sU: UDP scan
- A: OS-detection, version-detection, script-scanning, and traceroute
推薦閱讀
- 科技安全:戰略實踐與展望
- SASE原理、架構與實踐
- 黑客大曝光:無線網絡安全(原書第3版)
- Metasploit Penetration Testing Cookbook(Third Edition)
- 大型互聯網企業安全架構
- API攻防:Web API安全指南
- 代碼審計:企業級Web代碼安全架構
- 諸神之眼:Nmap網絡安全審計技術揭秘
- 網絡運維親歷記 (網絡運維紀實文學)
- 移動APT:威脅情報分析與數據防護
- 可信計算3.0工程初步(第二版)
- Kerberos域網絡安全從入門到精通
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 華為防火墻實戰指南
- 網絡安全態勢感知