LinuxSir.cn,穿越时空的Linuxsir!

 找回密码
 注册
搜索
热搜: shell linux mysql
12
返回列表 发新帖
楼主: shell

1024上的端口nmap不到 ?

[复制链接]
 楼主| 发表于 2004-12-1 06:16:37 | 显示全部楼层
兄弟教教我,如何添加进去 ? 格式怎样你知道吗 ??? 哪个文件 ?

一般从这些端口可以分辨出是2000,为什么nmap扫不出来呢,奇怪 ?
发表于 2004-12-1 06:19:23 | 显示全部楼层
http://www.insecure.org/cgi-bin/nmap-submit.cgi
我没有自己添加过,也不总拿它扫别人的,没有意义
可能是有防火墙
 楼主| 发表于 2004-12-1 06:20:45 | 显示全部楼层
晕,看不懂,可以简单说说吗, 今天麻烦到你了,希望不会阻到你时间
发表于 2004-12-1 06:27:48 | 显示全部楼层
就是让你将你获得的信息,添加到那个网页,提交给nmap的开发人员
老兄应该学学英语的,我虽然CET4都没过,但是一般的计算机英语还是能看懂的,使用Linux不会E文,很痛苦的,很多第一手资料都是E文的
 楼主| 发表于 2004-12-1 06:33:58 | 显示全部楼层
我知道看多自然就懂了,可在看时翻译很多单词才行,
发表于 2004-12-7 08:56:28 | 显示全部楼层
你的nmap 版本是多少? 好像不高啊
发表于 2004-12-7 20:19:36 | 显示全部楼层
[root@test root]# nmap
Nmap 3.75 Usage: nmap [Scan Type(s)] [Options] <host or net list>
Some Common Scan Types ('*' options require root privileges)
* -sS TCP SYN stealth port scan (default if privileged (root))
  -sT TCP connect() port scan (default for unprivileged users)
* -sU UDP port scan
  -sP ping scan (Find any reachable machines)
* -sF,-sX,-sN Stealth FIN, Xmas, or Null scan (experts only)
  -sV Version scan probes open ports determining service & app names/versions
  -sR RPC scan (use with other scan types)
Some Common Options (none are required, most can be combined):
* -O Use TCP/IP fingerprinting to guess remote operating system
  -p <range> ports to scan.  Example range: 1-1024,1080,6666,31337
  -F Only scans ports listed in nmap-services
  -v Verbose. Its use is recommended.  Use twice for greater effect.
  -P0 Don't ping hosts (needed to scan www.microsoft.com and others)
* -Ddecoy_host1,decoy2[,...] Hide scan using many decoys
  -6 scans via IPv6 rather than IPv4
  -T <aranoid|Sneaky|Polite|Normal|Aggressive|Insane> General timing policy
  -n/-R Never do DNS resolution/Always resolve [default: sometimes resolve]
  -oN/-oX/-oG <logfile> Output normal/XML/grepable scan logs to <logfile>
  -iL <inputfile> Get targets from file; Use '-' for stdin
* -S <your_IP>/-e <devicename> Specify source address or network interface
  --interactive Go into interactive mode (then press h for help)
Example: nmap -v -sS -O www.my.com 192.168.0.0/16 '192.88-90.*.*'
SEE THE MAN PAGE FOR MANY MORE OPTIONS, DESCRIPTIONS, AND EXAMPLES

换成3.75吧,你的版本太底了.
 楼主| 发表于 2004-12-8 00:42:07 | 显示全部楼层
root : ~ $ nmap
Nmap V. 3.00 Usage: nmap [Scan Type(s)] [Options] <host or net list>
Some Common Scan Types ('*' options require root privileges)
* -sS TCP SYN stealth port scan (default if privileged (root))
  -sT TCP connect() port scan (default for unprivileged users)
* -sU UDP port scan
  -sP ping scan (Find any reachable machines)
* -sF,-sX,-sN Stealth FIN, Xmas, or Null scan (experts only)
  -sR/-I RPC/Identd scan (use with other scan types)
Some Common Options (none are required, most can be combined):
* -O Use TCP/IP fingerprinting to guess remote operating system
  -p <range> ports to scan.  Example range: '1-1024,1080,6666,31337'
  -F Only scans ports listed in nmap-services
  -v Verbose. Its use is recommended.  Use twice for greater effect.
  -P0 Don't ping hosts (needed to scan www.microsoft.com and others)
* -Ddecoy_host1,decoy2[,...] Hide scan using many decoys
  -T <aranoid|Sneaky|Polite|Normal|Aggressive|Insane> General timing policy
  -n/-R Never do DNS resolution/Always resolve [default: sometimes resolve]
  -oN/-oX/-oG <logfile> Output normal/XML/grepable scan logs to <logfile>
  -iL <inputfile> Get targets from file; Use '-' for stdin
* -S <your_IP>/-e <devicename> Specify source address or network interface
  --interactive Go into interactive mode (then press h for help)
Example: nmap -v -sS -O www.my.com 192.168.0.0/16 '192.88-90.*.*'
SEE THE MAN PAGE FOR MANY MORE OPTIONS, DESCRIPTIONS, AND EXAMPLES


默认as3 update3带的
您需要登录后才可以回帖 登录 | 注册

本版积分规则

快速回复 返回顶部 返回列表