Skip to content

Instantly share code, notes, and snippets.

@sezemiadmin
Created April 26, 2019 10:28
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save sezemiadmin/5a46d35ac19831735c38378b6ed9702d to your computer and use it in GitHub Desktop.
Save sezemiadmin/5a46d35ac19831735c38378b6ed9702d to your computer and use it in GitHub Desktop.
ネットワークセキュリティの基本パターン コマンド
$ nmap -A 192.168.17.70
Starting Nmap 5.51 ( http://nmap.org ) at 2019-02-04 16:15 JST
Nmap scan report for 192.168.17.70
Host is up (0.025s latency).
Not shown: 997 filtered ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
| ssh-hostkey: 1024 e2:57:6d:27:65:f2:21:6e:2c:a6:d8:a0:73:8e:36:90 (DSA)
|_2048 a7:b7:d6:a3:39:2e:65:9e:15:9b:3f:c1:81:a7:fa:92 (RSA)
80/tcp open http Apache httpd 2.2.15 ((CentOS))
| http-methods: Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
|_http-title: lab-server
443/tcp closed https
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 18.99 seconds
$ ip a
$ nmap -sn [IPアドレス]
# 繋がっている端末がでてくる
# prefix 値に注意 /24
$ nmap -A [IPアドレス]
# 特定の端末に対してスキャンする
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment