<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>nmap &#8211; ChaBug安全</title>
	<atom:link href="/tags/nmap/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Wed, 23 May 2018 07:57:43 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>Nmap使用及常用命令解析</title>
		<link>/tools/419.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Wed, 23 May 2018 07:54:47 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[nmap]]></category>
		<category><![CDATA[扫描]]></category>
		<guid isPermaLink="false">/?p=242</guid>

					<description><![CDATA[Nmap (“Network Mapper(网络映射器)”) 是一款开放源代码的 网络探测和安全审核的工具。它的设计目标是快速地扫描大型网络，当然用它扫描单个 主机也没有问题。Nm...]]></description>
										<content:encoded><![CDATA[<p><a href="https://nmap.org/images/sitelogo.png"><img loading="lazy" class="alignnone size-medium" src="https://nmap.org/images/sitelogo.png" width="168" height="90" /></a></p>
<blockquote><p>Nmap (<span class="quote">“Network Mapper(网络映射器)”</span>) 是一款开放源代码的 网络探测和安全审核的工具。它的设计目标是快速地<span class="wpcom_tag_link"><a href="/tags/%e6%89%ab%e6%8f%8f" title="扫描" target="_blank">扫描</a></span>大型网络，当然用它扫描单个 主机也没有问题。Nmap以新颖的方式使用原始IP报文来发现网络上有哪些主机，那些 主机提供什么服务(应用程序名和版本)，那些服务运行在什么操作系统(包括版本信息)， 它们使用什么类型的报文过滤器/防火墙，以及一堆其它功能。虽然Nmap通常用于安全审核， 许多系统管理员和网络管理员也用它来做一些日常的工作，比如查看整个网络的信息， 管理服务升级计划，以及监视主机和服务的运行。</p></blockquote>
<h2 id="参数">1. 参数</h2>
<table>
<thead>
<tr>
<th>option</th>
<th>note</th>
</tr>
</thead>
<tbody>
<tr>
<td>-sS</td>
<td>TCP SYN 扫描 (又称半开放,或隐身扫描)</td>
</tr>
<tr>
<td>-P0</td>
<td>允许你关闭 ICMP pings.</td>
</tr>
<tr>
<td>-sV</td>
<td>打开系统版本检测</td>
</tr>
<tr>
<td>-O</td>
<td>尝试识别远程操作系统</td>
</tr>
<tr>
<td>-A</td>
<td>同时打开操作系统指纹和版本检测</td>
</tr>
<tr>
<td>-v</td>
<td>详细输出扫描情况.</td>
</tr>
</tbody>
</table>
<h2 id="常用命令">2. 常用命令</h2>
<pre class="language-"><code>nmap -PN -n -F -T4 -sV -A -oG temp.txt <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
amap -i temp.txt
</code></pre>
<table>
<thead>
<tr>
<th>探测</th>
<th>cmd</th>
</tr>
</thead>
<tbody>
<tr>
<td>获取远程主机的系统类型及开放端口</td>
<td><code><span class="wpcom_tag_link"><a href="/tags/nmap" title="nmap" target="_blank">nmap</a></span> -sS -P0 -sV -O <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span></code></td>
</tr>
<tr>
<td>获取远程主机的系统类型及开放端口</td>
<td><code>nmap -sS -P0 -A -v <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span></code></td>
</tr>
<tr>
<td>检查特定端口是否开放</td>
<td><code>nmap -p <span class="token tag"><span class="token punctuation">&lt;</span>port<span class="token punctuation">&gt;</span></span> <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span></code> <code>nmap -p <span class="token tag"><span class="token punctuation">&lt;</span>port1<span class="token punctuation">&gt;</span></span>,<span class="token tag"><span class="token punctuation">&lt;</span>port2<span class="token punctuation">&gt;</span></span> <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span></code></td>
</tr>
</tbody>
</table>
<h2 id="Chapter_1_~::~_Nmap_Fundamentals">3. Chapter 1 ~::~ Nmap Fundamentals</h2>
<h4 id="Listing_open_ports_on_a_remote_host">3.0.1. Listing open ports on a remote host</h4>
<pre class="language-"><code>nmap hiren.com
</code></pre>
<h4 id="Version_detection">3.0.2. Version detection</h4>
<pre class="language-"><code>nmap -sV hiren.me
</code></pre>
<h4 id="Aggressive_detection">3.0.3. Aggressive detection</h4>
<pre class="language-"><code>nmap -sC -sV -O <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Finding_live_hosts">3.0.4. Finding live hosts</h4>
<pre class="language-"><code>nmap -sP 192.168.1.1/24
</code></pre>
<ul>
<li>Port list:
<pre class="language-"><code>nmap -p80,443 localhost
</code></pre>
</li>
<li>Port range:
<pre class="language-"><code>nmap -p1-100 localhost
</code></pre>
</li>
<li>All ports:
<pre class="language-"><code>nmap -p- localhost
</code></pre>
</li>
<li>Specific ports by protocols:
<pre class="language-"><code>nmap -pT:25,U:53 <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
</li>
<li>Service name:
<pre class="language-"><code>nmap -p smtp <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
</li>
<li>Service name wildcards:
<pre class="language-"><code>nmap -p smtp* <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
</li>
</ul>
<p>Only ports registered in Nmap services:</p>
<pre class="language-"><code>nmap -p[1-65535] <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Scan_using_script">3.0.5. Scan using script</h4>
<pre class="language-"><code>nmap --script <span class="token tag"><span class="token punctuation">&lt;</span>script <span class="token attr-name">name</span><span class="token punctuation">&gt;</span></span> <span class="token tag"><span class="token punctuation">&lt;</span>host<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Scanning_using_a_specified_network_interface">3.0.6. Scanning using a specified network interface</h4>
<pre class="language-"><code>nmap -e <span class="token tag"><span class="token punctuation">&lt;</span>INTERFACE<span class="token punctuation">&gt;</span></span> scanme.nmap.org
</code>

</pre>
<h1 id="Chapter_2_~::~_Network_Exploration">Chapter 2 ~::~ Network Exploration</h1>
<h4 id="Discovering_hosts_with_TCP_SYN_ping_scans">3.0.7. Discovering hosts with TCP SYN ping scans</h4>
<pre class="language-"><code>nmap -sP -PS 192.168.1.1/24
</code></pre>
<h4 id="Discovering_hosts_with_TCP_ACK_ping_scans">3.0.8. Discovering hosts with TCP ACK ping scans</h4>
<pre class="language-"><code>nmap -sP -PA <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Discovering_hosts_with_UDP_ping_scans">3.0.9. Discovering hosts with UDP ping scans</h4>
<pre class="language-"><code>nmap -sP -PU <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Discovering_hosts_with_ICMP_ping_scans">3.0.10. Discovering hosts with ICMP ping scans</h4>
<pre class="language-"><code>nmap -sP -PE hiren.net
</code></pre>
<h4 id="Discovering_hosts_with_IP_protocol_ping_scans">3.0.11. Discovering hosts with IP protocol ping scans</h4>
<pre class="language-"><code>nmap -sP -PO <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Discovering_hosts_with_ARP_ping_scans">3.0.12. Discovering hosts with ARP ping scans</h4>
<p>Effective for LAN network</p>
<pre class="language-"><code>nmap -sP -PR 192.168.1.1/24
</code></pre>
<h4 id="MAC_address_spoofing">3.0.13. MAC address spoofing</h4>
<p>Change your motherfking MAC adrs ~</p>
<pre class="language-"><code>nmap -sP -PR --spoof-mac 5C:4C:A9:F2:DC:7C
</code></pre>
<h4 id="Hiding_our_traffic_with_additional_random_data">3.0.14. Hiding our traffic with additional random data</h4>
<p>Generate Random Data</p>
<pre class="language-"><code>nmap -sS -PS --data-length 300 scanme.nmap.org
</code></pre>
<h4 id="Forcing_DNS_resolution">3.0.15. Forcing DNS resolution</h4>
<p>Force DNS resulation even if host is offline 🙁</p>
<pre class="language-"><code>nmap -sS -PS -F -R XX.XXX.XXX.220-230
</code></pre>
<h2 id="Chapter_3_~::~_Gathering_Additional_Host_Information">4. Chapter 3 ~::~ Gathering Additional Host Information</h2>
<h4 id="Getting_information_from_WHOIS_records">4.0.1. Getting information from WHOIS records</h4>
<pre class="language-"><code>nmap --script whois <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Collecting_valid_e-mail_accounts">4.0.2. Collecting valid e-mail accounts</h4>
<p>The script http-google-email is not included in Nmap&#8217;s official repository. So you need to download it from <a href="http://seclists.org/nmap-dev/2011/q3/att-401/" target="_blank" rel="noopener">http://seclists.org/nmap-dev/2011/q3/att-401/</a> http-google-email.nse and copy it to your local scripts directory. After copying http-google-email.nse , you should update the script database with:</p>
<pre class="language-"><code>nmap --script-updatedb
</code></pre>
<p>then</p>
<pre class="language-"><code>nmap -p80 --script http-google-email,http-email-harvest <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Discovering_hostnames_pointing_to_the_same_IP_address">4.0.3. Discovering hostnames pointing to the same IP address</h4>
<p><a href="https://secwiki.org/w/Nmap/" target="_blank" rel="noopener">https://secwiki.org/w/Nmap/</a> External_Script_Library .</p>
<pre class="language-"><code>nmap --script-updatedb
nmap -p80 --script hostmap nmap.org
</code></pre>
<h4 id="Brute_forcing_DNS_records">4.0.4. Brute forcing DNS records</h4>
<pre class="language-"><code>nmap --script dns-brute <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Fingerprinting_the_operating_system_of_a_host">4.0.5. Fingerprinting the operating system of a host</h4>
<pre class="language-"><code>nmap -O <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Discovering_UDP_services">4.0.6. Discovering UDP services</h4>
<pre class="language-"><code>nmap -sU -p- <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Listing_protocols_supported_by_a_remote_host">4.0.7. Listing protocols supported by a remote host</h4>
<pre class="language-"><code>nmap -sO <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Discovering_stateful_firewalls_by_using_a_TCP_ACK_scan">4.0.8. Discovering stateful firewalls by using a TCP ACK scan</h4>
<pre class="language-"><code>nmap -sA <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h5 id="Port_states">Port states</h5>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>win10 bash安装sqlmap nmap msf</title>
		<link>/tools/337.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Thu, 25 Jan 2018 15:25:21 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[bash]]></category>
		<category><![CDATA[msf]]></category>
		<category><![CDATA[nmap]]></category>
		<category><![CDATA[sqlmap]]></category>
		<guid isPermaLink="false">/?p=39</guid>

					<description><![CDATA[前言 刚放假回来，电脑上的东西乱七八糟的，就直接重装了系统。而后学习python3.6，但是作为一名合格的白帽子，电脑上没有sqlmap合适吗？于是便想装一个sqlmap，但是sq...]]></description>
										<content:encoded><![CDATA[<h1>前言</h1>
<p>刚放假回来，电脑上的东西乱七八糟的，就直接重装了系统。<br />而后学习python3.6，但是作为一名合格的白帽子，电脑上没有<span class="wpcom_tag_link"><a href="/tags/sqlmap" title="sqlmap" target="_blank">sqlmap</a></span>合适吗？于是便想装一个sqlmap，但是sqlmap需要的是python2.7的环境，这就很尴尬了。我可不想在电脑上装py3和py2共存，因为会有很多共存的问题。我总不能为了这个再去装虚拟机吧。于是便有了我的<span class="wpcom_tag_link"><a href="/tags/bash" title="bash" target="_blank">bash</a></span> for win10。</p>
<h1>bash安装</h1>
<p>首先，win10要激活，然后在<code>开始</code>&#8211;<code>设置</code>&#8211;<code>更新和安全</code>&#8211;<code>针对开发人员</code>&#8211;<code>开发人员模式</code>。如图：<br /><img src="https://ws1.sinaimg.cn/large/006xriynly1fnsv18aokwj30zm0rtmyw.jpg" alt="image" title="image"></p>
<p>其次，<code>控制面板</code>&#8211;<code>程序</code>&#8211;<code>启用和关闭Windows功能</code> 勾选<code>适用于Linux的Windows子系统</code><br /><img src="https://ws1.sinaimg.cn/large/006xriynly1fnsv4mit14j30dg0do754.jpg" alt="image" title="image"></p>
<p>然后会要求你重启，重启一下。</p>
<p>重启之后打开Windows应用商店，搜索<code>bash</code>，然后会出现下图：<br /><img src="https://ws1.sinaimg.cn/large/006xriynly1fnsv7h9el3j30zm0rt0us.jpg" alt="image" title="image"><br />选择Ubuntu安装即可。然后打开Ubuntu会让你设置用户名和密码，需牢记。</p>
<h1>换源及更新</h1>
<p>首先需要切换到root权限。</p>
<pre><code>sudo su</code></pre>
<p>如图：<img src="https://ws1.sinaimg.cn/large/006xriynly1fnsvbu2iqlj30xz0hr3yo.jpg" alt="image" title="image"><br />然后备份原来的源文件</p>
<pre><code>cd /etc/apt/</code></pre>
<p>然后会显示下面的源文件<code>sources.list</code> <br />输入命令 <br /><code>cp sources.list sources.list.bak </code><br />就是将<code>sources.list</code>备份到<code>sources.list.bak</code></p>
<p>然后<code>vim sources.list</code><br />把下面的内容粘贴到源文件里保存。</p>
<pre><code>    deb http://mirrors.aliyun.com/ubuntu/ xenial main restricted universe multiverse
    deb http://mirrors.aliyun.com/ubuntu/ xenial-security main restricted universe multiverse
    deb http://mirrors.aliyun.com/ubuntu/ xenial-updates main restricted universe multiverse
    deb http://mirrors.aliyun.com/ubuntu/ xenial-backports main restricted universe multiverse
    ##测试版源
    deb http://mirrors.aliyun.com/ubuntu/ xenial-proposed main restricted universe multiverse
    # 源码
    deb-src http://mirrors.aliyun.com/ubuntu/ xenial main restricted universe multiverse
    deb-src http://mirrors.aliyun.com/ubuntu/ xenial-security main restricted universe multiverse
    deb-src http://mirrors.aliyun.com/ubuntu/ xenial-updates main restricted universe multiverse
    deb-src http://mirrors.aliyun.com/ubuntu/ xenial-backports main restricted universe multiverse
    ##测试版源
    deb-src http://mirrors.aliyun.com/ubuntu/ xenial-proposed main restricted universe multiverse
    # Canonical 合作伙伴和附加
    deb http://archive.canonical.com/ubuntu/ xenial partner
    deb http://extras.ubuntu.com/ubuntu/ xenial main </code></pre>
<p>更新源和软件</p>
<pre><code>   sudo apt-get update 更新源
   sudo apt-get upgrade 更新软件 </code></pre>
<h1>安装sqlmap</h1>
<p>首先先安装python2.7<br /><code>apt-get install python</code><br />然后安装sqlmap<br /><code>apt-get install sqlmap</code><br />上图<img src="https://ws1.sinaimg.cn/large/006xriynly1fnsvneodu0j30wx0hrdhb.jpg" alt="image" title="image"></p>
<h1>安装<span class="wpcom_tag_link"><a href="/tags/nmap" title="nmap" target="_blank">nmap</a></span></h1>
<p><code>apt-get install nmap</code><br /><img src="https://ws1.sinaimg.cn/large/006xriynly1fnsvrncbgbj30wx0hr40i.jpg" alt="image" title="image"></p>
<h1>安装<span class="wpcom_tag_link"><a href="/tags/msf" title="msf" target="_blank">msf</a></span></h1>
<pre><code>curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb &gt; msfinstall &amp;&amp; \
  chmod 755 msfinstall &amp;&amp; \
  ./msfinstall</code></pre>
<p><img src="https://ws1.sinaimg.cn/large/006xriynly1fnsvtaldy8j30wx0hrq3e.jpg" alt="image" title="image"></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
