Anúncio
Anúncio

Mais conteúdo relacionado

Destaque(17)

Anúncio

Mais de n|u - The Open Security Community(20)

Anúncio

Último(20)

NMAP - The Network Scanner

  1. Written By Fyodor
  2. http://insecure.org
  3. Free!
  4. TCP – Transmission Control Protocol
  5. UDP – User datagram protocol
  6. (Unless you u an IP address)
  7. Step 2 :Nmap “Pings” the remote device
  8. (This is not an ICMP echo Request)
  9. Step 3: Reverse DNS lookup
  10. Step 4: Do the scan!
  11. TCP connect() scan (-sT)
  12. Ping scan (-sP)
  13. Excluding from command line or a file
  14. Using a file to list your targets
  15. Port Number options
  16. Limit your scans
  17. Command line only
  18. Must specify each time
  19. --excludefile <exclude_filename>
  20. One option excludes many hosts
  21. -p<port range>
  22. Default pings
  23. ARP ping
  24. ICMP and TCP ACK ping
  25. TCP SYN ping
  26. UDP ping
  27. An Nmap ping does not(necessarily) refers to an ICMP echo request
  28. For the remote ip subnet nmap uses
  29. ICMP echo request &
  30. Systems with Firewalls & Filter
  31. One port open ,one port closed.
  32. Often called “stealth” scans
  33. One frame transmitted, one frame received
  34. Thesestealth scans never appears in application logs.
  35. -T1/sneaky
  36. -T2/Polite
  37. -T3/Normal
  38. -T4/Aggressive
  39. Rearrange the Nmap hosts in an Nmap scan
  40. Makes it difficult to see a pattern
  41. Completely random target addresses
  42. (-iR <num _host>)
  43. Useful for finding specific services
Anúncio