nmap
Descobrindo status das principais portas
# COMMAND
nmap -Pn -F {host}
# Output Sample
Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower.
Starting Nmap 7.91 ( https://nmap.org ) at 2021-04-06 15:35 EDT
Nmap scan report for scanme.nmap.com (45.33.32.156)
Host is up (0.23s latency).
Other addresses for scanme.nmap.com (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f
rDNS record for 45.33.32.156: scanme.nmap.org
Not shown: 94 closed ports
PORT STATE SERVICE
22/tcp open ssh
25/tcp filtered smtp
80/tcp open http
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
Nmap done: 1 IP address (1 host up) scanned in 8.47 seconds{host}: domain ou ip-F: principais portas-Pn: não executar ping no mapeamento
Fingerprint de serviços e SO
-A: Enable OS detection, version detection, script scanning, and traceroute.
Descobrir hosts ativos na rede
-sP: This option tells Nmap not to do a port scan after host discovery, and only print out the available hosts that responded to the scan.
PortScan com IPs randômicos
-D RND:20: Decoy, vai realizar o ataque simulando 20 endereços IPs randômicos.
Last updated
Was this helpful?