Use Nmap command

Use Nmap collection

Thank bloggers: VVVinson     article link: https://www.cnblogs.com/Vinson404/p/7784829.html

 

Participation number

Description

-sT

 TCP connect () scan, and in this way a large number of connection request information is recorded in the error log in the target host.

-sS

 Half-open scanning, few systems can write it into the system log. However, the need Root privileges.

-sF  -sN

 Secret FIN packet scanning, Xmas Tree, Null scan mode

-sP

 ping scan, Nmap scan in port, the default will use ping sweeps, only the host survival, Nmap will continue to scan.

-its

 UDP scanning, but scanning is unreliable UDP

-to

 This advanced scanning method is usually used to pass through the firewall rulesets.

-en

 Port version detection service

-Pn

 You do not need to use the ping command before scanning, some firewall blocks ping command. You can use this option to scan

-v

 Show the scanning process, it is recommended to use

-h

 Help options, is clearly the most help documentation

-p

 Designated ports, such as "1-65535,1433,135,22,80" etc.

-THE

 Enable remote operating system detection, false positives

-A

 Comprehensive and systematic detection, enabled detection script, scan

-one / -oX / guide,

 The report written documents, namely normal, XML, grepable three formats

-T4

 Prohibit dynamic scan delay of more than 10ms for TCP ports

-the

 Read the list of hosts, for example, "- iL C: \ ip.txt"

Guess you like

Origin www.cnblogs.com/cute-puli/p/Nmap.html