- Applied Network Security
- Arthur Salmon Warun Levesque Michael McLafferty
- 166字
- 2021-07-02 23:30:59
Lab 3-scanning
The following demonstration will be a more detailed Nmap lab to reinforce what you have learned earlier in the chapter. This lab uses Kali Linux running in VMware:
- Open Nmap in Kali.
- Open a terminal in Kali and type nmap.
When you do so, Nmap will display its help screen, as shown in the following screenshot:

- Let's try to use the -sS and -sT scans.
Using Nmap's basic syntax, type in the following:
nmap <scantype> IP address
We get results like those shown in the following screenshot, showing all of the TCP ports that are open on our target machine and the default service for each port:

- Next, we can scan for a specific port or port range.
Nmap uses the -p switch to designate a port or port range. So, if we were only looking for ports 100-200, we could use the following:
kali > nmap 192.168.10.70 -p100-200

As you can see, this command scans and reveals only the ports in that port range.
推薦閱讀
- Extending Symfony2 Web Application Framework
- 工業互聯網安全防護與展望
- 零信任網絡:在不可信網絡中構建安全系統
- 網絡空間安全:管理者讀物
- 黑客攻防技巧
- 網絡安全技術與實訓(第4版)(微課版)
- 網絡運維親歷記 (網絡運維紀實文學)
- 數據安全領域指南
- Kerberos域網絡安全從入門到精通
- 華為防火墻實戰指南
- Bug Bounty Hunting Essentials
- 華為Anti-DDoS技術漫談
- Web代碼安全漏洞深度剖析
- CPK通向賽博安全之路:理論與實踐CPK Solution to Cyber Security:Theory and Practice
- 計算機網絡安全與應用技術(第2版)