Skip to main content

nmap(Network Mapper)


Nmap 7.80 ( https://nmap.org )
Usage: nmap [Scan Type(s)] [Options] {TARGET SPECIFICATION}
info

μ˜΅μ…˜μ— 따라 root κΆŒν•œμœΌλ‘œ μ‹€ν–‰ν•˜λŠ” 경우 더 λ§Žμ€ 정보λ₯Ό ν‘œμ‹œν•˜λŠ” κ²½μš°κ°€ μžˆμŠ΅λ‹ˆλ‹€.

TARGET SPECIFICATION​

  • hostnames
  • IP
  • --exclude <host1[,host2][,host3],...>

HOST DISCOVERY​

  • -sn: ping을 μ‚¬μš©ν•΄ scanν•©λ‹ˆλ‹€. port scan이 disable λ©λ‹ˆλ‹€.
  • -Pn: λͺ¨λ“  hostλ₯Ό online으둜 μ²˜λ¦¬ν•©λ‹ˆλ‹€. (skip host discovery)

Examples​

sudo nmap -sn 192.168.0.0/24

ping을 μ‚¬μš©ν•˜μ—¬ 192.168.0.0/24 λ„€νŠΈμ›Œν¬ μŠ€μΊ”

SCAN TECHNIQUES​

  • -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans
  • -sU: UDP Scan

Examples​

sudo nmap -sT 192.168.0.0/24

TCP 톡신을 μ‚¬μš©ν•˜μ—¬ 192.168.0.0/24 λ„€νŠΈμ›Œν¬ μŠ€μΊ”, μ–΄λ–€ TCP ν¬νŠΈκ°€ μ—΄λ €μžˆλŠ”μ§€ 확인할 수 μžˆμŠ΅λ‹ˆλ‹€.

OUTPUT​

  • -v: Increase verbosity level (use -vv or more for greater effect)
  • -d: Increase debugging level (use -dd or more for greater effect)

MISC​

  • -A: OS detection, version detection, script scanning, and traceroute 을 ν™œμ„±ν™”ν•©λ‹ˆλ‹€.

Examples​

sudo nmap -A 192.168.0.11

μ—΄λ €μžˆλŠ” 포트 정보, OS 정보, hop 수, traceroute 등이 ν‘œμ‹œλ©λ‹ˆλ‹€.