User Tools

Site Tools


linux_portscan

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

linux_portscan [2011/12/28 21:30]
cerberus created
linux_portscan [2011/12/28 21:37] (current)
cerberus
Line 1: Line 1:
 ====== Scanning network for open ports with nmap command ====== ====== Scanning network for open ports with nmap command ======
  
-You can use nmap tool for this job. It is flexible in specifying targets. User can scan entire network or selected host or single server. Nmap is also useful to test your firewall rules. namp is metwork exploration tool and security / port scanner. According to nmap man page: +You can use nmap tool for this job. It is flexible in specifying targets. User can scan entire network or selected host or single server. Nmap is also useful to test your firewall rules. namp is metwork exploration tool and security / port scanner. ​
-It is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/​firewalls are in use, and dozens of other characteristics. While Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.+
  
-nmap port scanning + **1.** Run the following commands ​to get open port information
-TCP Connect scanning for localhost and network 192.168.0.0/​24 +
-<​code>#​ nmap -v -sT YOURPCIP/​8895</​code>​ +
-nmap UDP scanning +
-Useful ​to find out UDP ports +
-<​code>#​ nmap -v -O YOURPCIP/​1900</​code>​ +
- +
-Other availible commands for NMAP that are not required for serviio +
- +
-nmap TCP SYN (half-open) scanning +
-<​code>#​ nmap -v -sS localhost +
-# nmap -v -sS 192.168.0.0/​24</​code>​ +
-nmap TCP FIN scanning +
-<​code>#​ nmap -v -sF localhost +
-# nmap -v -sF 192.168.0.0/​24</​code>​ +
-nmap TCP Xmas tree scanning +
-Useful to see if firewall protecting against this kind of attack or not: +
-<​code>#​ nmap -v -sX localhost +
-# nmap -v -sX 192.168.0.0/​24</​code>​ +
-nmap TCP Null scanning +
-Useful to see if firewall protecting against this kind attack or not: +
-<​code>#​ nmap -v -sN localhost +
-# nmap -v -sN 192.168.0.0/​24</​code>​ +
-nmap TCP Windows scanning +
-<​code>#​ nmap -v -sW localhost +
-# nmap -v -sW 192.168.0.0/​24</​code>​ +
-nmap TCP RPC scanning +
-Useful to find out RPC (such as portmap) services +
-<​code>#​ nmap -v -sR localhost +
-# nmap -v -sR 192.168.0.0/​24</​code>​ +
-nmap remote software version scanning +
-You can also find out what software version opening the port+
-<​code>#​ nmap -v -sV localhost +
-# nmap -v -sV 192.168.0.0/​24</​code>​+
  
 +  * To find out TCP ports
 +<​code>#​ nmap -v -sT YOURPCIP/​24</​code>​
  
 +  * To find out UDP ports
 +<​code>#​ nmap -v -O YOURPCIP/​24</​code>​
  
 + ​**2.** Copy and paste the information reeived from the command to your forum post
  
linux_portscan.txt · Last modified: 2011/12/28 21:37 by cerberus