<ruby id="bdb3f"></ruby>

    <p id="bdb3f"><cite id="bdb3f"></cite></p>

      <p id="bdb3f"><cite id="bdb3f"><th id="bdb3f"></th></cite></p><p id="bdb3f"></p>
        <p id="bdb3f"><cite id="bdb3f"></cite></p>

          <pre id="bdb3f"></pre>
          <pre id="bdb3f"><del id="bdb3f"><thead id="bdb3f"></thead></del></pre>

          <ruby id="bdb3f"><mark id="bdb3f"></mark></ruby><ruby id="bdb3f"></ruby>
          <pre id="bdb3f"><pre id="bdb3f"><mark id="bdb3f"></mark></pre></pre><output id="bdb3f"></output><p id="bdb3f"></p><p id="bdb3f"></p>

          <pre id="bdb3f"><del id="bdb3f"><progress id="bdb3f"></progress></del></pre>

                <ruby id="bdb3f"></ruby>

                ThinkChat2.0新版上線,更智能更精彩,支持會話、畫圖、視頻、閱讀、搜索等,送10W Token,即刻開啟你的AI之旅 廣告
                ## 掃描工具 ### 常用掃描工具 ~~~ Nmap Masscan masnmapscan ZMap 御劍高速TCP端口掃描工具 御劍高速端口掃描工具 IISPutScanner IISPutScanner增強版-DotNetScan v1.1 Beta ~~~ ### 常用掃描工具使用 #### Nmap 項目地址:`https://github.com/nmap/nmap` * 掃描多個IP ~~~ 掃描整個子網 nmap 192.168.6.1/24 nmap 192.168.1.1/16 nmap 192.168.1-30.1-254 nmap 192.168.1-254.6 掃描多個主機 namp 192.168.6.2 192.168.6.6 掃描一個小范圍 nmap 192.168.6.2-10 掃描txt內的ip列表 nmap -iL text.txt 掃描除某個目標外 nmap 192.168.6.1/24 -exclude 192.168.6.25 ~~~ * 繞過Firewalld掃描主機端口 通過不同的協議(TCP半連接、TCP全連接、ICMP、UDP等)的掃描繞過Firewalld的限制 ~~~ nmap -sP 192.33.6.128 nmap -sT 192.33.6.128 nmap -sS 192.33.6.128 nmap -sU 192.33.6.128 nmap -sF 192.33.6.128 nmap -sX 192.33.6.128 nmap -sN 192.33.6.128 ~~~ * 初步掃描端口信息 ~~~ nmap -T4 -A -v -Pn 192.168.1.1/24 -p 21,22,23,25,80,81,82,83,88,110,143,443,445,512,513,514,1433,1521,2082,2083,2181,2601,2604,3128,3306,3389,3690,4848,5432,5900,5984,6379,7001,7002,8069,8080,8081,8086,8088,9200,9300,11211,10000,27017,27018,50000,50030,50070 -oN nmap_result.txt ~~~ ![](https://qftm.github.io/Information_Collection_Handbook/port_info/tool_scan/1594459-20200119150735085-1154381786.png) * 掃描端口并且標記可以爆破的服務 ~~~ nmap 127.0.0.1 --script=ftp-brute,imap-brute,smtp-brute,pop3-brute,mongodb-brute,redis-brute,ms-sql-brute,rlogin-brute,rsync-brute,mysql-brute,pgsql-brute,oracle-sid-brute,oracle-brute,rtsp-url-brute,snmp-brute,svn-brute,telnet-brute,vnc-brute,xmpp-brute ~~~ ![](https://qftm.github.io/Information_Collection_Handbook/port_info/tool_scan/1594459-20200119142721442-1575053305.png) * 判斷常見的漏洞并掃描端口 ~~~ nmap 127.0.0.1 --script=auth,vuln ~~~ ![](https://qftm.github.io/Information_Collection_Handbook/port_info/tool_scan/1594459-20200119142731949-1278292617.png) * 精確判斷漏洞并掃描端口 ~~~ nmap 127.0.0.1 --script=dns-zone-transfer,ftp-anon,ftp-proftpd-backdoor,ftp-vsftpd-backdoor,ftp-vuln-cve2010-4221,http-backup-finder,http-cisco-anyconnect,http-iis-short-name-brute,http-put,http-php-version,http-shellshock,http-robots.txt,http-svn-enum,http-webdav-scan,iis-buffer-overflow,iax2-version,memcached-info,mongodb-info,msrpc-enum,ms-sql-info,mysql-info,nrpe-enum,pptp-version,redis-info,rpcinfo,samba-vuln-cve-2012-1182,smb-vuln-ms08-067,smb-vuln-ms17-010,snmp-info,sshv1,xmpp-info,tftp-enum,teamspeak2-version ~~~ #### Masscan 項目地址:`https://github.com/robertdavidgraham/masscan` Masscan主要是真對全網進行端口掃描 #### Masscan+Nmap 有些時候網站的入口點屬于非常規端口,因此是必須要做全端口掃描,做全端口掃描的時候由于**namp**發包量大經常出現各種問題,如端口掃描不全、獲得信息不準等等,為了解決上述問題,這里提供一個**masscan+nmap**結合的方式進行快速掃描。 原理:使用masscan做全端口開放檢測,檢測出來端口信息后,用nmap進行服務信息識別。 使用:終端輸入以下命令執行即可 ~~~ # masscan 192.33.6.145 -p1-65535 --rate 1000 -oL ports # ports=$(cat ports | awk -F " " '{print $3}' | sort -n | tr '\n' ',' | sed 's/,$//' | sed 's/^,,//') # nmap -sV -p $ports 192.33.6.145 ~~~ #### masnmapscan 項目地址:`https://github.com/hellogoldsnakeman/masnmapscan-V1.0` masnmapscan整合了masscan和nmap兩款掃描器,masscan掃描端口,nmap掃描端口對應服務,二者結合起來實現了又快又好地掃描。并且加入了針對目標資產有防火墻的應對措施。 #### Zmap 項目地址:`https://github.com/zmap/zmap` Zmap主要是真對全網進行端口掃描 #### 御劍高速TCP端口掃描工具 ![](https://qftm.github.io/Information_Collection_Handbook/port_info/tool_scan/1594459-20200119142744950-434617774.png) #### 御劍高速端口掃描工具 ![](https://qftm.github.io/Information_Collection_Handbook/port_info/tool_scan/1594459-20200119142757545-1040489796.png)
                  <ruby id="bdb3f"></ruby>

                  <p id="bdb3f"><cite id="bdb3f"></cite></p>

                    <p id="bdb3f"><cite id="bdb3f"><th id="bdb3f"></th></cite></p><p id="bdb3f"></p>
                      <p id="bdb3f"><cite id="bdb3f"></cite></p>

                        <pre id="bdb3f"></pre>
                        <pre id="bdb3f"><del id="bdb3f"><thead id="bdb3f"></thead></del></pre>

                        <ruby id="bdb3f"><mark id="bdb3f"></mark></ruby><ruby id="bdb3f"></ruby>
                        <pre id="bdb3f"><pre id="bdb3f"><mark id="bdb3f"></mark></pre></pre><output id="bdb3f"></output><p id="bdb3f"></p><p id="bdb3f"></p>

                        <pre id="bdb3f"><del id="bdb3f"><progress id="bdb3f"></progress></del></pre>

                              <ruby id="bdb3f"></ruby>

                              哎呀哎呀视频在线观看