Use Nmap collection
Thank bloggers: VVVinson article link: https://www.cnblogs.com/Vinson404/p/7784829.html
Participation number |
Description |
-sT |
TCP connect () scan, and in this way a large number of connection request information is recorded in the error log in the target host. |
-sS |
Half-open scanning, few systems can write it into the system log. However, the need Root privileges. |
-sF -sN |
Secret FIN packet scanning, Xmas Tree, Null scan mode |
-sP |
ping scan, Nmap scan in port, the default will use ping sweeps, only the host survival, Nmap will continue to scan. |
-its |
UDP scanning, but scanning is unreliable UDP |
-to |
This advanced scanning method is usually used to pass through the firewall rulesets. |
-en |
Port version detection service |
-Pn |
You do not need to use the ping command before scanning, some firewall blocks ping command. You can use this option to scan |
-v |
Show the scanning process, it is recommended to use |
-h |
Help options, is clearly the most help documentation |
-p |
Designated ports, such as "1-65535,1433,135,22,80" etc. |
-THE |
Enable remote operating system detection, false positives |
-A |
Comprehensive and systematic detection, enabled detection script, scan |
-one / -oX / guide, |
The report written documents, namely normal, XML, grepable three formats |
-T4 |
Prohibit dynamic scan delay of more than 10ms for TCP ports |
-the |
Read the list of hosts, for example, "- iL C: \ ip.txt" |