29 Praktikal nga mga Ehemplo sa NMAP Commands alang sa Linux System/Network Administrators
Ang Nmap aka Network Mapper usa ka open source ug usa ka versatile nga himan para sa Linux system/network administrators. Ang Nmap gigamit alang sa pagsuhid sa mga network, paghimo sa mga pag-scan sa seguridad, pag-audit sa network ug pagpangita sa mga bukas nga pantalan sa hilit nga makina. Nag-scan kini alang sa mga Live host, Operating system, packet filter ug bukas nga mga pantalan nga nagdagan sa hilit nga mga host.
Sakup nako ang kadaghanan sa paggamit sa NMAP sa duha ka lainlaing bahin ug kini ang una nga bahin sa seryoso nga nmap. Dinhi niini nga setup, migamit ko og duha ka server nga walay firewall aron sulayan ang pagtrabaho sa Nmap command.
- 192.168.0.100 – server1.linux-console.net
- 192.168.0.101 – server2.linux-console.net
# nmap [Scan Type(s)] [Options] {target specification}
Giunsa ang Pag-install sa NMAP sa Linux
Kadaghanan sa karon nga mga distribusyon sa Linux sama sa Red Hat, CentOS, Fedoro, Debian ug Ubuntu nag-uban sa Nmap sa ilang default nga mga repositoryo sa pagdumala sa package nga gitawag nga APT. Ang duha ka mga himan gigamit sa pag-instalar ug pagdumala sa mga pakete sa software ug mga update. Aron ma-install ang Nmap sa piho nga pag-apod-apod gamita ang mosunud nga mando.
# yum install nmap [on Red Hat based systems] $ sudo apt-get install nmap [on Debian based systems]
Kung na-install na nimo ang pinakabag-o nga aplikasyon sa nmap, mahimo nimong sundon ang mga panudlo sa panig-ingnan nga gihatag sa kini nga artikulo.
1. I-scan ang usa ka Sistema nga adunay Hostname ug IP Address
Ang tool sa Nmap nagtanyag og lain-laing mga pamaagi sa pag-scan sa usa ka sistema. Niini nga pananglitan, nag-scan ako gamit ang hostname isip server2.linux-console.net aron mahibal-an ang tanang bukas nga mga pantalan, serbisyo ug MAC address sa sistema.
nmap server2.linux-console.net Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 15:42 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.415 seconds You have new mail in /var/spool/mail/root
nmap 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-18 11:04 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 958/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.465 seconds You have new mail in /var/spool/mail/root
2. I-scan gamit ang -v nga opsyon
Imong makita nga ang ubos nga sugo nga adunay -v nga kapilian naghatag og mas detalyado nga impormasyon mahitungod sa hilit nga makina.
nmap -v server2.linux-console.net Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 15:43 EST Initiating ARP Ping Scan against 192.168.0.101 [1 port] at 15:43 The ARP Ping Scan took 0.01s to scan 1 total hosts. Initiating SYN Stealth Scan against server2.linux-console.net (192.168.0.101) [1680 ports] at 15:43 Discovered open port 22/tcp on 192.168.0.101 Discovered open port 80/tcp on 192.168.0.101 Discovered open port 8888/tcp on 192.168.0.101 Discovered open port 111/tcp on 192.168.0.101 Discovered open port 3306/tcp on 192.168.0.101 Discovered open port 957/tcp on 192.168.0.101 The SYN Stealth Scan took 0.30s to scan 1680 total ports. Host server2.linux-console.net (192.168.0.101) appears to be up ... good. Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.485 seconds Raw packets sent: 1681 (73.962KB) | Rcvd: 1681 (77.322KB)
I-scan ang Daghang mga Host
Mahimo nimong ma-scan ang daghang mga host pinaagi lamang sa pagsulat sa ilang mga IP address o hostname gamit ang Nmap.
nmap 192.168.0.101 192.168.0.102 192.168.0.103 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:06 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 3 IP addresses (1 host up) scanned in 0.580 seconds
4. I-scan ang tibuok Subnet
Mahimo nimong i-scan ang tibuok subnet o IP range gamit ang Nmap pinaagi sa paghatag ug * wildcard niini.
nmap 192.168.0.* Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:11 EST Interesting ports on server1.linux-console.net (192.168.0.100): Not shown: 1677 closed ports PORT STATE SERVICE 22/tcp open ssh 111/tcp open rpcbind 851/tcp open unknown Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 256 IP addresses (2 hosts up) scanned in 5.550 seconds You have new mail in /var/spool/mail/root
Sa ibabaw nga output imong makita nga ang nmap nag-scan sa tibuok subnet ug naghatag sa impormasyon mahitungod sa mga host nga anaa sa Network.
5. I-scan ang Daghang Server gamit ang katapusang octet sa IP address
Mahimo nimong i-scan ang daghang IP address pinaagi sa yano nga pagtino sa katapusang octet sa IP address. Pananglitan, dinhi nagpahigayon ako og scan sa mga IP address 192.168.0.101, 192.168.0.102 ug 192.168.0.103.
nmap 192.168.0.101,102,103 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:09 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 3 IP addresses (1 host up) scanned in 0.552 seconds You have new mail in /var/spool/mail/root
6. I-scan ang listahan sa mga Host gikan sa usa ka File
Kung daghan ka nga host nga i-scan ug ang tanan nga mga detalye sa host gisulat sa usa ka file, mahimo nimo direkta nga hangyoon ang nmap nga basahon kana nga file ug himuon ang mga pag-scan. Atong tan-awon kon unsaon pagbuhat niana.
Paghimo og text file nga gitawag og “nmaptest.txt” ug ipasabot ang tanang IP address o hostname sa server nga gusto nimong buhaton og scan.
cat > nmaptest.txt localhost server2.linux-console.net 192.168.0.101
Sunod, pagdagan ang mosunud nga mando nga adunay kapilian nga iL nga adunay mando sa nmap aron ma-scan ang tanan nga nalista nga IP address sa file.
nmap -iL nmaptest.txt Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-18 10:58 EST Interesting ports on localhost.localdomain (127.0.0.1): Not shown: 1675 closed ports PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 111/tcp open rpcbind 631/tcp open ipp 857/tcp open unknown Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 958/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 958/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 3 IP addresses (3 hosts up) scanned in 2.047 seconds
7. I-scan ang usa ka IP Address Range
Mahimo nimong itakda ang usa ka range sa IP samtang nag-scan gamit ang Nmap.
nmap 192.168.0.101-110 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:09 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 10 IP addresses (1 host up) scanned in 0.542 seconds
8. I-scan ang Network Walay labot sa mga Hilit nga Host
Mahimo nimong dili iapil ang pipila ka mga host samtang nagpahigayon sa usa ka tibuuk nga pag-scan sa network o kung nag-scan ka gamit ang mga wildcard nga adunay kapilian nga –dili iapil.
nmap 192.168.0.* --exclude 192.168.0.100 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:16 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 255 IP addresses (1 host up) scanned in 5.313 seconds You have new mail in /var/spool/mail/root
9. I-scan ang impormasyon sa OS ug Traceroute
Uban sa Nmap, mahibal-an nimo kung unsang OS ug bersyon ang nagdagan sa hilit nga host. Aron makahimo sa OS & version detection, script scanning ug traceroute, mahimo namong gamiton ang -A nga opsyon sa NMAP.
nmap -A 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:25 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 4.3 (protocol 2.0) 80/tcp open http Apache httpd 2.2.3 ((CentOS)) 111/tcp open rpcbind 2 (rpc #100000) 957/tcp open status 1 (rpc #100024) 3306/tcp open mysql MySQL (unauthorized) 8888/tcp open http lighttpd 1.4.32 MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=4.11%P=i686-redhat-linux-gnu%D=11/11%Tm=52814B66%O=22%C=1%M=080027) TSeq(Class=TR%IPID=Z%TS=1000HZ) T1(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW) T2(Resp=N) T3(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW) T4(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T7(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) PU(Resp=Y%DF=N%TOS=C0%IPLEN=164%RIPTL=148%RID=E%RIPCK=E%UCK=E%ULEN=134%DAT=E) Uptime 0.169 days (since Mon Nov 11 12:22:15 2013) Nmap finished: 1 IP address (1 host up) scanned in 22.271 seconds You have new mail in /var/spool/mail/root
Sa ibabaw nga Output, imong makita nga ang nmap adunay TCP/IP fingerprint sa OS nga nagdagan sa hilit nga mga host ug mas espesipiko bahin sa pantalan ug mga serbisyo nga nagdagan sa hilit nga mga host.
10. I-enable ang OS Detection gamit ang Nmap
Gamita ang opsyon nga -O ug -osscan-guess makatabang usab sa pagdiskobre sa impormasyon sa OS.
nmap -O server2.linux-console.net Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:40 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=4.11%P=i686-redhat-linux-gnu%D=11/11%Tm=52815CF4%O=22%C=1%M=080027) TSeq(Class=TR%IPID=Z%TS=1000HZ) T1(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW) T2(Resp=N) T3(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW) T4(Resp=Y%DF=Y%W=0%ACK=O%Flags=Option -O and -osscan-guess also helps to discover OS R%Ops=) T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T7(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) PU(Resp=Y%DF=N%TOS=C0%IPLEN=164%RIPTL=148%RID=E%RIPCK=E%UCK=E%ULEN=134%DAT=E) Uptime 0.221 days (since Mon Nov 11 12:22:16 2013) Nmap finished: 1 IP address (1 host up) scanned in 11.064 seconds You have new mail in /var/spool/mail/root
11. I-scan ang usa ka Host aron Makita ang Firewall
Ang ubos nga sugo maghimo ug scan sa usa ka hilit nga host aron mahibal-an kung adunay mga packet filter o Firewall nga gigamit sa host.
nmap -sA 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:27 EST All 1680 scanned ports on server2.linux-console.net (192.168.0.101) are UNfiltered MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.382 seconds You have new mail in /var/spool/mail/root
12. I-scan ang usa ka Host aron masusi nga giprotektahan kini sa Firewall
Aron ma-scan ang usa ka host kung kini gipanalipdan sa bisan unsang packet filtering software o Firewalls.
nmap -PN 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:30 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.399 seconds
13. Pangitaa ang mga Live host sa usa ka Network
Uban sa tabang sa -sP nga kapilian mahimo ra naton masusi kung unsang mga host ang buhi ug pataas sa Network, uban niini nga kapilian ang nmap naglaktaw sa pagkakita sa pantalan ug uban pang mga butang.
nmap -sP 192.168.0.* Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-18 11:01 EST Host server1.linux-console.net (192.168.0.100) appears to be up. Host server2.linux-console.net (192.168.0.101) appears to be up. MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 256 IP addresses (2 hosts up) scanned in 5.109 seconds
14. Paghimo og Fast Scan
Mahimo nimo ang usa ka paspas nga pag-scan gamit ang -F nga kapilian aron ma-scan ang mga pantalan nga gilista sa mga file sa nmap-services ug gibiyaan ang tanan nga ubang mga pantalan.
nmap -F 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:47 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1234 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.322 seconds
15. Pangitaa ang bersyon sa Nmap
Mahimo nimong mahibal-an ang bersyon sa Nmap nga imong gipadagan sa imong makina nga adunay kapilian nga -V.
nmap -V Nmap version 4.11 ( http://www.insecure.org/nmap/ ) You have new mail in /var/spool/mail/root
16. Magsunodsunod nga I-scan ang mga Port
Gamita ang -r nga bandila aron dili mag-randomize.
nmap -r 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 16:52 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.363 seconds
17. I-print ang mga interface sa Host ug mga Ruta
Mahimo nimong mahibal-an ang interface sa host ug impormasyon sa ruta gamit ang nmap pinaagi sa paggamit sa kapilian nga –iflist.
nmap --iflist Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:07 EST ************************INTERFACES************************ DEV (SHORT) IP/MASK TYPE UP MAC lo (lo) 127.0.0.1/8 loopback up eth0 (eth0) 192.168.0.100/24 ethernet up 08:00:27:11:C7:89 **************************ROUTES************************** DST/MASK DEV GATEWAY 192.168.0.0/0 eth0 169.254.0.0/0 eth0
Sa ibabaw nga output, imong makita nga ang mapa naglista sa mga interface nga gilakip sa imong sistema ug sa ilang mga rota.
18. Pag-scan alang sa piho nga Port
Adunay lainlaing mga kapilian aron makit-an ang mga pantalan sa hilit nga makina nga adunay Nmap. Mahimo nimong itakda ang pantalan nga gusto nimo nga i-scan sa nmap gamit ang -p nga kapilian, pinaagi sa default ang nmap nag-scan lamang sa mga pantalan sa TCP.
nmap -p 80 server2.linux-console.net Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:12 EST Interesting ports on server2.linux-console.net (192.168.0.101): PORT STATE SERVICE 80/tcp open http MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) sca
19. I-scan ang TCP Port
Mahimo usab nimo ipiho ang piho nga mga tipo sa pantalan ug numero nga adunay nmap aron ma-scan.
nmap -p T:8888,80 server2.linux-console.net Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:15 EST Interesting ports on server2.linux-console.net (192.168.0.101): PORT STATE SERVICE 80/tcp open http 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.157 seconds
20. I-scan ang usa ka UDP Port
nmap -sU 53 server2.linux-console.net Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:15 EST Interesting ports on server2.linux-console.net (192.168.0.101): PORT STATE SERVICE 53/udp open http 8888/udp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.157 seconds
21. I-scan ang Daghang Port
Mahimo usab nimo ma-scan ang daghang mga pantalan gamit ang kapilian nga -p.
nmap -p 80,443 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-18 10:56 EST Interesting ports on server2.linux-console.net (192.168.0.101): PORT STATE SERVICE 80/tcp open http 443/tcp closed https MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.190 seconds
22. I-scan ang mga Ports pinaagi sa Network Range
Mahimo nimong i-scan ang mga pantalan nga adunay mga sakup gamit ang mga ekspresyon.
nmap -p 80-160 192.168.0.101
23. Pangitaa ang Host Services nga bersyon nga Numeros
Atong mahibal-an ang mga bersyon sa serbisyo nga nagdagan sa hilit nga mga host nga adunay kapilian nga -sV.
nmap -sV 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:48 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 4.3 (protocol 2.0) 80/tcp open http Apache httpd 2.2.3 ((CentOS)) 111/tcp open rpcbind 2 (rpc #100000) 957/tcp open status 1 (rpc #100024) 3306/tcp open mysql MySQL (unauthorized) 8888/tcp open http lighttpd 1.4.32 MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 12.624 seconds
24. I-scan ang mga remote host gamit ang TCP ACK (PA) ug TCP Syn (PS)
Usahay ang packet filtering firewalls nag-block sa standard nga ICMP ping requests, sa maong kaso, mahimo natong gamiton ang TCP ACK ug TCP Syn nga mga pamaagi aron ma-scan ang mga remote host.
nmap -PS 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 17:51 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.360 seconds You have new mail in /var/spool/mail/root
25. I-scan ang Remote host alang sa piho nga mga pantalan nga adunay TCP ACK
nmap -PA -p 22,80 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 18:02 EST Interesting ports on server2.linux-console.net (192.168.0.101): PORT STATE SERVICE 22/tcp open ssh 80/tcp open http MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.166 seconds You have new mail in /var/spool/mail/root
26. I-scan ang Remote host alang sa piho nga mga pantalan nga adunay TCP Syn
nmap -PS -p 22,80 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 18:08 EST Interesting ports on server2.linux-console.net (192.168.0.101): PORT STATE SERVICE 22/tcp open ssh 80/tcp open http MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.165 seconds You have new mail in /var/spool/mail/root
27. Paghimo og usa ka tago nga Scan
nmap -sS 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 18:10 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.383 seconds You have new mail in /var/spool/mail/root
28. Susiha ang labing kasagarang gigamit nga mga Port nga adunay TCP Syn
nmap -sT 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 18:12 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 957/tcp open unknown 3306/tcp open mysql 8888/tcp open sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 0.406 seconds You have new mail in /var/spool/mail/root
29. Paghimo og tcp null scan aron malingla ang firewall
nmap -sN 192.168.0.101 Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 19:01 EST Interesting ports on server2.linux-console.net (192.168.0.101): Not shown: 1674 closed ports PORT STATE SERVICE 22/tcp open|filtered ssh 80/tcp open|filtered http 111/tcp open|filtered rpcbind 957/tcp open|filtered unknown 3306/tcp open|filtered mysql 8888/tcp open|filtered sun-answerbook MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer Systems) Nmap finished: 1 IP address (1 host up) scanned in 1.584 seconds You have new mail in /var/spool/mail/root
Mao na kana sa NMAP sa pagkakaron, magbuhat ako ug mas daghang mamugnaong mga kapilian sa NMAP sa atong ikaduhang bahin niining seryoso. Hangtud niana, padayon nga paminaw kanamo ug ayaw kalimot sa pagpaambit sa imong bililhong mga komento.