Redian新闻
>
用nmap扫描端口,一般常选命令参数是什么?
avatar
用nmap扫描端口,一般常选命令参数是什么?# Security - 系统安全
w*l
1
参数太多,搞不清他们之间的区分
据说能看到端口服务进程的所用帐号,也不知怎么用,请指教一下
avatar
p*f
2

default is good enough, try to run as root if possible.
really? suppose you know sshd runs as root, and apache runs
as nobody, is it useful?

【在 w****l 的大作中提到】
: 参数太多,搞不清他们之间的区分
: 据说能看到端口服务进程的所用帐号,也不知怎么用,请指教一下

avatar
u*d
3
The readme is very clear and there's a gui nmap

【在 p******f 的大作中提到】
:
: default is good enough, try to run as root if possible.
: really? suppose you know sshd runs as root, and apache runs
: as nobody, is it useful?

avatar
w*l
4
那能看到服务进程的版本吗?

【在 u*********d 的大作中提到】
: The readme is very clear and there's a gui nmap
avatar
u*d
5
Don't know. But some services tell you their versions, e.g. in http, some ftp,
some smtp. You don't need nmap to know its version.

【在 w****l 的大作中提到】
: 那能看到服务进程的版本吗?
avatar
r*e
6
en, 只能这样了

【在 u*********d 的大作中提到】
: Don't know. But some services tell you their versions, e.g. in http, some ftp,
: some smtp. You don't need nmap to know its version.

相关阅读
logo
联系我们隐私协议©2024 redian.news
Redian新闻
Redian.news刊载任何文章,不代表同意其说法或描述,仅为提供更多信息,也不构成任何建议。文章信息的合法性及真实性由其作者负责,与Redian.news及其运营公司无关。欢迎投稿,如发现稿件侵权,或作者不愿在本网发表文章,请版权拥有者通知本网处理。