Comando linux para scanear portas abertas em um ip

Ip ou dns, desse exemplo: 192.138.254.34 e server.exemplo.com.br

TCP PORTS:

nmap -sT -Pn- IP ou DNS

[/shell]

UDP PORTS:

nmap -sU -v felix
open|filtered ports
nmap -sU -T4 scanme.nmap.org

Improving Felix's UDP scan results with version detection
nmap -sUV -F felix.nmap.org
nmap -sUV -T4 scanme.nmap.org

Attempting to disambiguate UDP ports with TTL discrepancies
nping --udp --traceroute -c 13 -p 53 scanme.nmap.org

nma Optimizing UDP Scan Time
nmap -sUV -T4 -F --version-intensity 0 scanme.nmap.org

Instalacao

On CentOS. yum install nmap.
On Debian. apt-get install nmap.
On Ubuntu. sudo apt-get install nmap. Using the Nmap security scanner. Then you may run the command “nmap” on a terminal, accompanied by the target's IP or website address and the various available parameters.
[root@jupiter ]# nmap -sT -Pn- 192.168.254.34

Starting Nmap 6.40 ( http://nmap.org ) at 2021-12-25 23:49 -03
Nmap scan report for 192.168.254.34
Host is up (1.0s latency).
Not shown: 997 closed ports
PORT     STATE    SERVICE
53/tcp   filtered domain
81/tcp   open     hosts2-ns
2000/tcp open     cisco-sccp

Nmap done: 1 IP address (1 host up) scanned in 2.16 seconds

# contra um dns

[root@jupiter openvpn]# nmap -sT -Pn- server.exemplo.com.br

Starting Nmap 6.40 ( http://nmap.org ) at 2021-12-25 23:49 -03
Nmap scan report for server.exemplo.com.br (186.111.12.12)
Host is up (0.041s latency).
rDNS record for 186.226.61.89: uferes.virtuaserver.com.br
Not shown: 991 closed ports
PORT     STATE    SERVICE
21/tcp   open     ftp
25/tcp   filtered smtp
53/tcp   open     domain
80/tcp   open     http
111/tcp  open     rpcbind
222/tcp  open     rsh-spx
1720/tcp open     H.323/Q.931
2000/tcp open     cisco-sccp
5666/tcp open     nrpe

Nmap done: 1 IP address (1 host up) scanned in 1.94 seconds

Deixe um comentário