traceroute
nmap
tcpdump
curl
Nmap用于浏览网络,执行安全扫描,网络审计以及在远程机器找到开放端口。
[root@moban ~]# nmap www.taobao.com
Starting Nmap 5.51 ( http://nmap.org ) at 2018-07-02 15:47 CST
Nmap scan report for www.taobao.com (220.170.91.114)
Host is up (0.0015s latency).
Not shown: 998 filtered ports
PORT STATE SERVICE
80/tcp open http
443/tcp open https
Nmap done: 1 IP address (1 host up) scanned in 51.71 seconds
[root@moban ~]# nmap -v 192.168.132.131
Starting Nmap 5.51 ( http://nmap.org ) at 2018-07-02 15:55 CST
Initiating Parallel DNS resolution of 1 host. at 15:55
Completed Parallel DNS resolution of 1 host. at 15:55, 0.03s elapsed
Initiating SYN Stealth Scan at 15:55
Scanning 192.168.132.131 [1000 ports]
Discovered open port 80/tcp on 192.168.132.131
Discovered open port 22/tcp on 192.168.132.131
Completed SYN Stealth Scan at 15:55, 0.01s elapsed (1000 total ports)
Nmap scan report for 192.168.132.131
Host is up (0.0000020s latency).
Not shown: 998 closed ports
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
Read data files from: /usr/share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.09 seconds
Raw packets sent: 1000 (44.000KB) | Rcvd: 2002 (84.088KB)
[root@moban ~]#
扫描除开某IP的网段
[root@server1 ~]# nmap 192.168.0.* --exclude 192.168.0.100
扫描主机1-100号的端口:
[root@moban ~]# nmap -p1-100 127.0.0.1
Starting Nmap 5.51 ( http://nmap.org ) at 2018-07-02 16:07 CST
Nmap scan report for localhost (127.0.0.1)
Host is up (0.0000030s latency).
Not shown: 97 closed ports
PORT STATE SERVICE
22/tcp open ssh
25/tcp open smtp
80/tcp open http
Nmap done: 1 IP address (1 host up) scanned in 0.05 seconds
[root@moban ~]#