ex). nmap -sS -p1-100 192.168.0/24
type -sS : Stealth scan.
-sT : Full connecet(TCP) scan.
-sV : Services scan.
option -p1-100 : scan ports from 1 to 100
target 192.168.10.0/24 : use netmask
192.168.10.2 : single target
192.168.10.2-100 : IP range
Stealth scan(-sS)
Full connect scan(-sT)
Services scan(-sV)
How to check ports closed or filtered?
View Nmap prot scanning techniques
댓글 없음:
댓글 쓰기