|
Nmap is a command-line network detection tool under Linux is the most commonly used security scanning tools, the classic of classics. This supports ping scanning OK online host, port scanning and TCP / IP remote device fingerprinting. The latest version is available NMAP 4.46.1, has recently been published.
There PPA under Ubuntu 14.04 is available, and supports almost all Ubuntu derivative version of the system, open a terminal and enter the following command:
sudo add-apt-repository ppa: pi-rho / security
sudo apt-get update
sudo apt-get install nmap
Uninstall nmap command:
sudo apt-get remove nmap
Remove PPA command:
sudo apt-get install ppa-purge
sudo ppa-purge ppa: pi-rho / security
Nmap basic commands and typical use
Full Offensive scanning (including host discovery, port scanning, version scanning, OS default script scanning and scanning):
nmap -A -v targetip
Ping Scan:
nmap -sn -v targetip
Fast port scan:
nmap -F -v targetip
Scan Version:
nmap -sV -v targetip
Operating system scan:
nmap -O -v targetip
For example, the following figure:
abc @ ubuntu: ~ $ nmap -sP 192.168.211.1/255
Starting Nmap 6.46 (http://nmap.org) at 2014-04-23 15:53 PDT
Illegal netmask in "192.168.211.1/255". Assuming / 32 (one host)
Note:. Host seems down If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.01 seconds
abc @ ubuntu: ~ $ |
|
|
|