Différences
Ci-dessous, les différences entre deux révisions de la page.
| Prochaine révision | Révision précédente | ||
|
linux:commandes:nmap [02/06/2021 12:01] thierry créée |
linux:commandes:nmap [02/06/2021 12:28] (Version actuelle) thierry [Scanner les ports d'un Host] |
||
|---|---|---|---|
| Ligne 1: | Ligne 1: | ||
| ====== NMAP ====== | ====== NMAP ====== | ||
| + | ===== Découverte des stations (hosts) ===== | ||
| + | commande ''sudo nmap -sP %Network%'' | ||
| + | <code bash> | ||
| + | > sudo nmap -sP 192.168.1.0/24 | ||
| + | |||
| + | Starting Nmap 7.60 ( https://nmap.org ) at 2021-06-02 10:02 UTC | ||
| + | Nmap scan report for _gateway (192.168.1.1) | ||
| + | Host is up (0.00017s latency). | ||
| + | MAC Address: 78:8A:20:44:CF:65 (Ubiquiti Networks) | ||
| + | Nmap scan report for 192.168.1.2 | ||
| + | Host is up (0.0025s latency). | ||
| + | MAC Address: 78:8A:20:40:A3:7A (Ubiquiti Networks) | ||
| + | ... | ||
| + | Nmap scan report for Linux (192.168.1.88) | ||
| + | Host is up. | ||
| + | Nmap done: 256 IP addresses (29 hosts up) scanned in 4.43 seconds | ||
| + | paradmin@paradmin:~$ | ||
| + | </code> | ||
| + | ===== Scanner les ports d'un Host ===== | ||
| + | <note>On peut combiner les deux UDP et TCP avec :\\ | ||
| + | ''sudo nmap -sU -sS %IP_HOST%'' | ||
| + | </note> | ||
| + | ==== TCP ==== | ||
| + | |||
| + | Commande ''sudo nmap -sS %IP_HOST%'' | ||
| + | <code bash> | ||
| + | > sudo nmap -sS 192.168.1.200 | ||
| + | |||
| + | Starting Nmap 7.60 ( https://nmap.org ) at 2021-06-02 10:06 UTC | ||
| + | Nmap scan report for 192.168.1.200 | ||
| + | Host is up (0.0038s latency). | ||
| + | Not shown: 996 filtered ports | ||
| + | PORT STATE SERVICE | ||
| + | 2222/tcp open EtherNetIP-1 | ||
| + | 9003/tcp open unknown | ||
| + | 9009/tcp closed pichat | ||
| + | 9010/tcp open sdr | ||
| + | MAC Address: 20:AA:4B:22:67:CF (Cisco-Linksys) | ||
| + | |||
| + | Nmap done: 1 IP address (1 host up) scanned in 16.49 seconds | ||
| + | </code> | ||
| + | ==== UDP ==== | ||
| + | Caommande ''sudo nmap -sU %IP_HOST%'' | ||
| + | <code bash> | ||
| + | > sudo nmap -sU 192.168.1.200 | ||
| + | |||
| + | Starting Nmap 7.60 ( https://nmap.org ) at 2021-06-02 10:11 UTC | ||
| + | Nmap scan report for 192.168.1.200 | ||
| + | Host is up (0.0038s latency). | ||
| + | All 1000 scanned ports on 192.168.1.200 are open|filtered | ||
| + | MAC Address: 20:AA:4B:22:67:CF (Cisco-Linksys) | ||
| + | |||
| + | Nmap done: 1 IP address (1 host up) scanned in 21.44 seconds | ||
| + | </code> | ||
| + | |||
| + | |||
| + | |||
| ====== Sources & Ressources ====== | ====== Sources & Ressources ====== | ||
| + | * [[https://nmap.org/man/fr/]] | ||
| + | * [[https://www.networklab.fr/scan-reseau-nmap/]] | ||