- Applied Network Security
- Arthur Salmon Warun Levesque Michael McLafferty
- 166字
- 2021-07-02 23:30:59
Lab 3-scanning
The following demonstration will be a more detailed Nmap lab to reinforce what you have learned earlier in the chapter. This lab uses Kali Linux running in VMware:
- Open Nmap in Kali.
- Open a terminal in Kali and type nmap.
When you do so, Nmap will display its help screen, as shown in the following screenshot:

- Let's try to use the -sS and -sT scans.
Using Nmap's basic syntax, type in the following:
nmap <scantype> IP address
We get results like those shown in the following screenshot, showing all of the TCP ports that are open on our target machine and the default service for each port:

- Next, we can scan for a specific port or port range.
Nmap uses the -p switch to designate a port or port range. So, if we were only looking for ports 100-200, we could use the following:
kali > nmap 192.168.10.70 -p100-200

As you can see, this command scans and reveals only the ports in that port range.
推薦閱讀
- 數(shù)據(jù)恢復(fù)方法及案例分析
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- Kali Linux Social Engineering
- 黑客攻防入門秘笈
- 安全實戰(zhàn)之滲透測試
- 軟件開發(fā)安全之道:概念、設(shè)計與實施
- 網(wǎng)絡(luò)安全三十六計:人人該懂的防黑客技巧
- 網(wǎng)絡(luò)安全技術(shù)與實訓(xùn)(第4版)(微課版)
- Falco云原生安全:Falco原理、實踐與擴展
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- 網(wǎng)絡(luò)安全大數(shù)據(jù)分析與實戰(zhàn)
- Hands-On Artificial Intelligence for Cybersecurity
- 從實踐中學(xué)習(xí)Nmap滲透測試
- Kali Linux無線網(wǎng)絡(luò)滲透測試詳解
- Metasploit 5.0 for Beginners