Thursday, March 31, 2011

command NMap

kat sini mari kite bersama - sama blejar serba sedikit untuk menggunakan Nmap
1. first kita install nmap

root@ubuntu:/# apt-get install nmap
Reading package lists... Done
Building dependency tree
Reading state information... Done
nmap is already the newest version.
The following packages were automatically installed and are no longer required:
libclucene0ldbl libts-0.0-0 kdelibs4c2a libqca2 libqt4-opengl libxine1-x
libkjsembed4 oxygen-icon-theme libxine1-misc-plugins kdelibs-data
libkdecore5 phonon libqtwebkit4 docbook-xsl libcdt4
shared-desktop-ontologies linux-headers-2.6.35-22 liblualib50 libxine1-bin
odbcinst libsolid4 virtuoso-minimal libnepomuk4 libkdewebkit5
linux-headers-2.6.35-22-generic libsoprano4 libpolkit-qt-1-0
libdirectfb-1.2-9 libkdnssd4 libkparts4 libqapt1 kdelibs5-data kdoctools
libkdecorations4 libvirtodbc0 libdbusmenu-qt2 odbcinst1debian2
libavahi-qt3-1 libxcb-shape0 libkrossui4 icoutils docbook-xsl-doc-html
libthreadweaver4 libkmediaplayer4 libkfile4 libknewstuff3-4 libqapt-runtime
libqt4-svg netpbm libkpty4 libstreamanalyzer0 libphonon4 libgvc5
libknotifyconfig4 libkntlm4 libplasma3 libqt4-network phonon-backend-xine
compizconfig-backend-kconfig libxdot4 kdelibs-bin libmagickcore3-extra
libktexteditor4 libattica0 tsconf libnetpbm10 libkio5 libkjsapi4 libstreams0
imagemagick libgraph4 libqt3-mt liblua50 virtuoso-opensource-6.1-common
libqt4-script plasma-scriptengine-javascript libssh-4 soprano-daemon
kdebase-runtime-data libreadline5 libiodbc2 libkhtml5 libkdeui5 libkdesu5
libpathplan4 virtuoso-opensource-6.1-bin libkutils4 libkrosscore4
libnepomukquery4a libxine1-console libhildon-1-0 libxine1
Use 'apt-get autoremove' to remove them.
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.

2. kita try test dh install ke lum

root@ubuntu:/# nmap
Nmap 5.21 ( http://nmap.org )
Usage: nmap [Scan Type(s)] [Options] {target specification}
TARGET SPECIFICATION:
Can pass hostnames, IP addresses, networks, etc.
Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254
-iL : Input from list of hosts/networks
-iR : Choose random targets
--exclude : Exclude hosts/networks
--excludefile : Exclude list from file
HOST DISCOVERY:
-sL: List Scan - simply list targets to scan
-sP: Ping Scan - go no further than determining if host is online
-PN: Treat all hosts as online -- skip host discovery
-PS/PA/PU/PY[portlist]: TCP SYN/ACK, UDP or SCTP discovery to given ports
-PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes
-PO[protocol list]: IP Protocol Ping
-n/-R: Never do DNS resolution/Always resolve [default: sometimes]
--dns-servers : Specify custom DNS servers
--system-dns: Use OS's DNS resolver
--traceroute: Trace hop path to each host
SCAN TECHNIQUES:
-sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans
-sU: UDP Scan
-sN/sF/sX: TCP Null, FIN, and Xmas scans
--scanflags : Customize TCP scan flags
-sI : Idle scan
-sY/sZ: SCTP INIT/COOKIE-ECHO scans
-sO: IP protocol scan
-b : FTP bounce scan
PORT SPECIFICATION AND SCAN ORDER:
-p : Only scan specified ports
Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080
-F: Fast mode - Scan fewer ports than the default scan
-r: Scan ports consecutively - don't randomize
--top-ports : Scan most common ports
--port-ratio : Scan ports more common than
SERVICE/VERSION DETECTION:
-sV: Probe open ports to determine service/version info
--version-intensity : Set from 0 (light) to 9 (try all probes)
--version-light: Limit to most likely probes (intensity 2)
--version-all: Try every single probe (intensity 9)
--version-trace: Show detailed version scan activity (for debugging)
SCRIPT SCAN:
-sC: equivalent to --script=default
--script=: is a comma separated list of
directories, script-files or script-categories
--script-args=: provide arguments to scripts
--script-trace: Show all data sent and received
--script-updatedb: Update the script database.
OS DETECTION:
-O: Enable OS detection
--osscan-limit: Limit OS detection to promising targets
--osscan-guess: Guess OS more aggressively
TIMING AND PERFORMANCE:
Options which take

No comments: