<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0">
<channel>
<title><![CDATA[向东博客 专注WEB应用 构架之美 --- 构架之美，在于尽态极妍 | 应用之美，在于药到病除]]></title> 
<link>http://www.jackxiang.com/index.php</link> 
<description><![CDATA[赢在IT，Playin' with IT,Focus on Killer Application,Marketing Meets Technology.]]></description> 
<language>zh-cn</language> 
<copyright><![CDATA[向东博客 专注WEB应用 构架之美 --- 构架之美，在于尽态极妍 | 应用之美，在于药到病除]]></copyright>
<item>
<link>http://www.jackxiang.com/post//</link>
<title><![CDATA[CentOS7下面用nmap扫描多端口和网段内的所有IP和扫描某IP打开了哪些端口以及扫描指定IP指定端口，sudo nmap -sP -PI -PT 192.168.1.0/24,Windows下安装下载nmap地址。]]></title> 
<author>jack &lt;xdy108@126.com&gt;</author>
<category><![CDATA[WEB2.0]]></category>
<pubDate>Wed, 04 Apr 2018 02:04:12 +0000</pubDate> 
<guid>http://www.jackxiang.com/post//</guid> 
<description>
<![CDATA[ 
	<textarea name="code" class="php" rows="15" cols="100">
nmap -sT -Pn -p80,443,8080,1883,8883 192.168.0.9

Starting Nmap 6.40 ( http://nmap.org ) at 2025-12-18 17:47 CST
Nmap scan report for localhost (192.168.0.9)
Host is up (0.073s latency).
PORT&nbsp;&nbsp;&nbsp;&nbsp; STATE&nbsp;&nbsp;SERVICE
80/tcp&nbsp;&nbsp; closed http
443/tcp&nbsp;&nbsp;closed https
1883/tcp closed unknown
8080/tcp closed http-proxy
8883/tcp closed unknown

</textarea><br/><br/><br/><textarea name="code" class="php" rows="15" cols="100">
sudo nmap -sS -p 1-65535&nbsp;&nbsp;123.115.117.1**
PORT&nbsp;&nbsp;&nbsp;&nbsp;STATE&nbsp;&nbsp;&nbsp;&nbsp;SERVICE
0/tcp&nbsp;&nbsp; filtered unknown
22/tcp&nbsp;&nbsp;open&nbsp;&nbsp;&nbsp;&nbsp; ssh
80/tcp&nbsp;&nbsp;filtered http
111/tcp open&nbsp;&nbsp;&nbsp;&nbsp; rpcbind
443/tcp filtered https

 sudo nmap 123.115.117.188&nbsp;&nbsp;-p 1-65535
Password:
Starting Nmap 7.92 ( https://nmap.org ) at 2022-04-02 12:52 CST
</textarea><br/><br/>背景：Windows下的nmap想看看内网到底有哪些IP被DHCP分配，每次VPN断和网络分不开，有的不断有的断开，我估计和IP有关，除开网关 1 255仨外，252台机器找个低点的或高点的末尾IP试试。<br/><br/>https://nmap.org/download.html<br/>https://nmap.org/dist/nmap-7.70-setup.exe<br/>d:&#92;Program Files&#92;Nmap<br/><br/>nmap -p6379 -script redis-info 10.73.23*.1**&nbsp;&nbsp;&nbsp;&nbsp;#扫redis的6379端口<br/><br/>一）nmap扫描网段内的所有IP<br/>sudo nmap -sP -PI -PT 192.168.1.0/24<br/>Windows下实践如下：<br/>C:&#92;Users&#92;admin&gt;nmap -sP -PI -PT 172.20.175.0/24<br/>Starting Nmap 7.70 ( https://nmap.org ) at 2018-04-04 10:12 ?D1ú±ê×?ê±??<br/>Nmap scan report for bogon (172.20.175.84)<br/>Host is up (0.00s latency).<br/>MAC Address: B0:83:FE:7C:78:21 (Dell)<br/>Nmap scan report for bogon (172.20.175.85)<br/>Host is up (0.00s latency).<br/>MAC Address: 64:00:6A:07:11:0F (Dell)<br/>Nmap scan report for bogon (172.20.175.86)<br/>Host is up.<br/>Nmap done: 256 IP addresses (81 hosts up) scanned in 36.24 seconds<br/>只列出扫描存在的IP和MAc以及Dell品牌电脑，不存在的IP地址未列出。<br/><br/>二）扫描某IP打开了哪些端口：<br/>nmap -p 1-65535 ip<br/><br/>三）扫描指定IP指定端口：<br/>C:&#92;Users&#92;admin&gt;nmap -sT -sV -p80,443,8080 -P0 -n 10.64.6.246<br/>PORT&nbsp;&nbsp;&nbsp;&nbsp; STATE&nbsp;&nbsp;&nbsp;&nbsp;SERVICE&nbsp;&nbsp;&nbsp;&nbsp;VERSION<br/>80/tcp&nbsp;&nbsp; open&nbsp;&nbsp;&nbsp;&nbsp; http&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Apache httpd 2.2.15 ((CentOS))<br/>443/tcp&nbsp;&nbsp;filtered https<br/>8080/tcp filtered http-proxy
]]>
</description>
</item><item>
<link>http://www.jackxiang.com/post//#blogcomment</link>
<title><![CDATA[[评论] CentOS7下面用nmap扫描多端口和网段内的所有IP和扫描某IP打开了哪些端口以及扫描指定IP指定端口，sudo nmap -sP -PI -PT 192.168.1.0/24,Windows下安装下载nmap地址。]]></title> 
<author> &lt;user@domain.com&gt;</author>
<category><![CDATA[评论]]></category>
<pubDate>Thu, 01 Jan 1970 00:00:00 +0000</pubDate> 
<guid>http://www.jackxiang.com/post//#blogcomment</guid> 
<description>
<![CDATA[ 
	
]]>
</description>
</item>
</channel>
</rss>