This shows you the differences between two versions of the page.
linux_portscan [2011/12/28 21:30] cerberus created |
linux_portscan [2011/12/28 21:37] (current) cerberus |
||
---|---|---|---|
Line 1: | Line 1: | ||
====== Scanning network for open ports with nmap command ====== | ====== Scanning network for open ports with nmap command ====== | ||
- | You can use nmap tool for this job. It is flexible in specifying targets. User can scan entire network or selected host or single server. Nmap is also useful to test your firewall rules. namp is metwork exploration tool and security / port scanner. According to nmap man page: | + | You can use nmap tool for this job. It is flexible in specifying targets. User can scan entire network or selected host or single server. Nmap is also useful to test your firewall rules. namp is metwork exploration tool and security / port scanner. |
- | It is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/ | + | |
- | nmap port scanning | + | **1.** Run the following commands |
- | TCP Connect scanning for localhost and network 192.168.0.0/ | + | |
- | < | + | |
- | nmap UDP scanning | + | |
- | Useful | + | |
- | < | + | |
- | + | ||
- | Other availible commands for NMAP that are not required for serviio | + | |
- | + | ||
- | nmap TCP SYN (half-open) scanning | + | |
- | < | + | |
- | # nmap -v -sS 192.168.0.0/ | + | |
- | nmap TCP FIN scanning | + | |
- | < | + | |
- | # nmap -v -sF 192.168.0.0/ | + | |
- | nmap TCP Xmas tree scanning | + | |
- | Useful to see if firewall protecting against this kind of attack or not: | + | |
- | < | + | |
- | # nmap -v -sX 192.168.0.0/ | + | |
- | nmap TCP Null scanning | + | |
- | Useful to see if firewall protecting against this kind attack or not: | + | |
- | < | + | |
- | # nmap -v -sN 192.168.0.0/ | + | |
- | nmap TCP Windows scanning | + | |
- | < | + | |
- | # nmap -v -sW 192.168.0.0/ | + | |
- | nmap TCP RPC scanning | + | |
- | Useful to find out RPC (such as portmap) services | + | |
- | < | + | |
- | # nmap -v -sR 192.168.0.0/ | + | |
- | nmap remote software version scanning | + | |
- | You can also find out what software version opening the port. | + | |
- | < | + | |
- | # nmap -v -sV 192.168.0.0/ | + | |
+ | * To find out TCP ports | ||
+ | < | ||
+ | * To find out UDP ports | ||
+ | < | ||
+ | | ||