首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全工具>扫描工具>软件详细
软件名称:  nmap-3.95.tar.bz2
文件类型:  
界面语言:  简体中文
软件类型:  国产软件
运行环境:  WinNT/2K/Xp
授权方式:  共享软件
软件大小:  1830K
软件等级:  ★★★★☆
发布时间:  2005-12-23
官方网址: http://www.insecure.org/ 作者:vitter
演示网址:
软件说明:  
nmap又更新了!这版功能更强大了:
Nmap 3.95 ( http://www.insecure.org/nmap/ )
Usage: nmap [Scan Type(s)] [Options] {target specification}
TARGET SPECIFICATION:
  Can pass hostnames, IP addresses, networks, etc.
  Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254
  -iL <inputfilename>: Input from list of hosts/networks
  -iR <num hosts>: Choose random targets
  --exclude <host1[,host2][,host3],...>: Exclude hosts/networks
  --excludefile <exclude_file>: Exclude list from file
HOST DISCOVERY:
  -sL: List Scan - simply list targets to scan
  -sP: Ping Scan - go no further than determining if host is online
  -P0: Treat all hosts as online -- skip host discovery
  -PS/PA/PU [portlist]: TCP SYN/ACK or UDP discovery to given ports
  -PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes
  -n/-R: Never do DNS resolution/Always resolve [default: sometimes]
SCAN TECHNIQUES:
  -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans
  -sN/sF/sX: TCP Null, FIN, and Xmas scans
  --scanflags <flags>: Customize TCP scan flags
  -sI <zombie host[:probeport]>: Idlescan
  -sO: IP protocol scan
  -b <ftp relay host>: FTP bounce scan
PORT SPECIFICATION AND SCAN ORDER:
  -p <port ranges>: Only scan specified ports
    Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080
  -F: Fast - Scan only the ports listed in the nmap-services file)
  -r: Scan ports consecutively - don't randomize
SERVICE/VERSION DETECTION:
  -sV: Probe open ports to determine service/version info
  --version_light: Limit to most likely probes for faster identification
  --version_all: Try every single probe for version detection
  --version_trace: Show detailed version scan activity (for debugging)
OS DETECTION:
  -O: Enable OS detection
  --osscan_limit: Limit OS detection to promising targets
  --osscan_guess: Guess OS more aggressively
TIMING AND PERFORMANCE:
  -T[0-5]: Set timing template (higher is faster)
  --min_hostgroup/max_hostgroup <msec>: Parallel host scan group sizes
  --min_parallelism/max_parallelism <msec>: Probe parallelization
  --min_rtt_timeout/max_rtt_timeout/initial_rtt_timeout <msec>: Specifies
      probe round trip time.
  --host_timeout <msec>: Give up on target after this long
  --scan_delay/--max_scan_delay <msec>: Adjust delay between probes
FIREWALL/IDS EVASION AND SPOOFING:
  -f; --mtu <val>: fragment packets (optionally w/given MTU)
  -D <decoy1,decoy2[,ME],...>: Cloak a scan with decoys
  -S <IP_Address>: Spoof source address
  -e <iface>: Use specified interface
  -g/--source_port <portnum>: Use given port number
  --data_length <num>: Append random data to sent packets
  --ttl <val>: Set IP time-to-live field
  --spoof_mac <mac address/prefix/vendor name>: Spoof your MAC address
OUTPUT:
  -oN/-oX/-oS/-oG <file>: Output scan in normal, XML, s|<rIpt kIddi3,
     and Grepable format, respectively, to the given filename.
  -oA <basename>: Output in the three major formats at once
  -v: Increase verbosity level (use twice for more effect)
  -d[level]: Set or increase debugging level (Up to 9 is meaningful)
  --packet_trace: Show all packets sent and received
  --iflist: Print host interfaces and routes (for debugging)
  --append_output: Append to rather than clobber specified output files
  --resume <filename>: Resume an aborted scan
  --stylesheet <path/URL>: XSL stylesheet to transform XML output to HTML
  --webxml: Reference stylesheet from Insecure.Org for more portable XML
  --no_stylesheet: Prevent associating of XSL stylesheet w/XML output
MISC:
  -6: Enable IPv6 scanning
  -A: Enables OS detection and Version detection
  --datadir <dirname>: Specify custom Nmap data file location
  --send_eth/--send_ip: Send using raw ethernet frames or IP packets
  --privileged: Assume that the user is fully privileged
  -V: Print version number
  -h: Print this help summary page.
EXAMPLES:
  nmap -v -A scanme.nmap.org
  nmap -v -sP 192.168.0.0/16 10.0.0.0/8
  nmap -v -iR 10000 -P0 -p 80
SEE THE MAN PAGE FOR MANY MORE OPTIONS, DESCRIPTIONS, AND EXAMPLES
下载地址: 进入下载地址列表
下载说明: ☉推荐使用网际快车下载本站软件,使用 WinRAR v3.10 以上版本解压本站软件。
☉如果这个软件总是不能下载的请点击报告错误,谢谢合作!!
☉下载本站资源,如果服务器暂不能下载请过一段时间重试!
☉如果遇到什么问题,请到本站论坛去咨寻,我们将在那里提供更多 、更好的资源!
☉本站提供的一些商业软件是供学习研究之用,如用于商业用途,请购买正版。
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热门软件
·nmap-3.90-win32.zip
·WIS (WEB Injection Scanner)
·X-Scan-v2.3-cn
·流光4.7
·WEB网页漏洞爬行虫v2.0
·3389的SHIFT后门自动扫描
·WED (WEB Entry Detector)
·nmap-4.00-win32.zip
·ScanWebPath.rar
·X-Scan-v3.1-cn
·mysql_pwd_crack.rar
·X-Scan-v3.2-cn.rar
  相关软件
·MS05051Scan.zip
·nmap-3.95-win32.zip
·Nessus-3.0.0
·Shadow Security Scanner 7.58 B
·WinNmap-1.0.rar
·nmap-3.90-win32.zip
·nmap-4.00-win32.zip
·nmap-3.90.tar.bz2
·nmap-4.00.tar.bz2
·MS05039Scan.zip
·ncphsank.rar
·nessusport
 
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved