⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 nmap.usage.txt

📁 Ubuntu packages of security software。 相当不错的源码
💻 TXT
字号:
Nmap 4.53 ( http://insecure.org )Usage: nmap [Scan Type(s)] [Options] {target specification}TARGET SPECIFICATION:  Can pass hostnames, IP addresses, networks, etc.  Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254  -iL <inputfilename>: Input from list of hosts/networks  -iR <num hosts>: Choose random targets  --exclude <host1[,host2][,host3],...>: Exclude hosts/networks  --excludefile <exclude_file>: Exclude list from fileHOST DISCOVERY:  -sL: List Scan - simply list targets to scan  -sP: Ping Scan - go no further than determining if host is online  -PN: Treat all hosts as online -- skip host discovery  -PS/PA/PU [portlist]: TCP SYN/ACK or UDP discovery to given ports  -PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes  -PO [protocol list]: IP Protocol Ping  -n/-R: Never do DNS resolution/Always resolve [default: sometimes]  --dns-servers <serv1[,serv2],...>: Specify custom DNS servers  --system-dns: Use OS's DNS resolverSCAN TECHNIQUES:  -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans  -sU: UDP Scan  -sN/sF/sX: TCP Null, FIN, and Xmas scans  --scanflags <flags>: Customize TCP scan flags  -sI <zombie host[:probeport]>: Idle scan  -sO: IP protocol scan  -b <FTP relay host>: FTP bounce scan  --traceroute: Trace hop path to each host  --reason: Display the reason a port is in a particular statePORT SPECIFICATION AND SCAN ORDER:  -p <port ranges>: Only scan specified ports    Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080  -F: Fast mode - Scan fewer ports than the default scan  -r: Scan ports consecutively - don't randomize  --top-ports <number>: Scan <number> most common ports  --port-ratio <ratio>: Scan ports more common than <ratio>SERVICE/VERSION DETECTION:  -sV: Probe open ports to determine service/version info  --version-intensity <level>: Set from 0 (light) to 9 (try all probes)  --version-light: Limit to most likely probes (intensity 2)  --version-all: Try every single probe (intensity 9)  --version-trace: Show detailed version scan activity (for debugging)SCRIPT SCAN:  -sC: equivalent to --script=safe,intrusive  --script=<Lua scripts>: <Lua scripts> is a comma separated list of            directories, script-files or script-categories  --script-args=<n1=v1,[n2=v2,...]>: provide arguments to scripts  --script-trace: Show all data sent and received  --script-updatedb: Update the script database.OS DETECTION:  -O: Enable OS detection  --osscan-limit: Limit OS detection to promising targets  --osscan-guess: Guess OS more aggressivelyTIMING AND PERFORMANCE:  Options which take <time> are in milliseconds, unless you append 's'  (seconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m).  -T[0-5]: Set timing template (higher is faster)  --min-hostgroup/max-hostgroup <size>: Parallel host scan group sizes  --min-parallelism/max-parallelism <time>: Probe parallelization  --min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout <time>: Specifies      probe round trip time.  --max-retries <tries>: Caps number of port scan probe retransmissions.  --host-timeout <time>: Give up on target after this long  --scan-delay/--max-scan-delay <time>: Adjust delay between probesFIREWALL/IDS EVASION AND SPOOFING:  -f; --mtu <val>: fragment packets (optionally w/given MTU)  -D <decoy1,decoy2[,ME],...>: Cloak a scan with decoys  -S <IP_Address>: Spoof source address  -e <iface>: Use specified interface  -g/--source-port <portnum>: Use given port number  --data-length <num>: Append random data to sent packets  --ip-options <options>: Send packets with specified ip options  --ttl <val>: Set IP time-to-live field  --spoof-mac <mac address/prefix/vendor name>: Spoof your MAC address  --badsum: Send packets with a bogus TCP/UDP checksumOUTPUT:  -oN/-oX/-oS/-oG <file>: Output scan in normal, XML, s|<rIpt kIddi3,     and Grepable format, respectively, to the given filename.  -oA <basename>: Output in the three major formats at once  -v: Increase verbosity level (use twice for more effect)  -d[level]: Set or increase debugging level (Up to 9 is meaningful)  --open: Only show open (or possibly open) ports  --packet-trace: Show all packets sent and received  --iflist: Print host interfaces and routes (for debugging)  --log-errors: Log errors/warnings to the normal-format output file  --append-output: Append to rather than clobber specified output files  --resume <filename>: Resume an aborted scan  --stylesheet <path/URL>: XSL stylesheet to transform XML output to HTML  --webxml: Reference stylesheet from Insecure.Org for more portable XML  --no-stylesheet: Prevent associating of XSL stylesheet w/XML outputMISC:  -6: Enable IPv6 scanning  -A: Enables OS detection and Version detection, Script scanning and Traceroute  --datadir <dirname>: Specify custom Nmap data file location  --send-eth/--send-ip: Send using raw ethernet frames or IP packets  --privileged: Assume that the user is fully privileged  --unprivileged: Assume the user lacks raw socket privileges  -V: Print version number  -h: Print this help summary page.EXAMPLES:  nmap -v -A scanme.nmap.org  nmap -v -sP 192.168.0.0/16 10.0.0.0/8  nmap -v -iR 10000 -PN -p 80SEE THE MAN PAGE FOR MANY MORE OPTIONS, DESCRIPTIONS, AND EXAMPLES

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -