1. 下载
https://nmap.org/dist/

2.安装
tar xf nmap-7.91.tar.bz2
mv nmap-7.91 nmap
cd nmap/
./configure
make install
nmap -v
[root@yw7 opt]
Starting Nmap 7.91 ( https://nmap.org ) at 2021-11-15 21:41 EST
Read data files from: /usr/local/bin/../share/nmap
WARNING: No targets were specified, so 0 hosts scanned.
Nmap done: 0 IP addresses (0 hosts up) scanned in 0.04 seconds
Raw packets sent: 0 (0B) | Rcvd: 0 (0B)
扫描单一目标主机
nmap 192.168.0.1
nmap secbug.com
(默认发送一个ARP的ping包,扫描1-10000范围以内开放端口)
扫描整个子网
nmap 192.168.0.1/24
扫描多个目标
Nmap 192.168.0.1 secbug.com
扫描一个范围内的目标
Nmap 192.168.0.1-200
导入IP列表进行扫描
nmap –iL ip.txt(要求在Nmap目录)
列举目标地址,但不进行扫描
Nmap –sL 192.168.0.1/24
排除某IP进行扫描
Nmap 192.168.0.1/24 –exclude 192.168.0.1
Nmap 192.168.0.1/24 –exclude file ip.txt
扫描特定主机的特定端口
nmap –p80,21,8080,135 192.168.0.1
nmap –p50-900 192.168.0.1
简单扫描,详细输出返回结果
nmap –vv 192.168.0.1
简单扫描并进行路由跟踪
nmap –traceroute baidu.com
ping扫描,不扫描端口(需要root权限)
nmap –sP 192.168.0.1
nmap –sN 192.168.0.1
探测操作系统类型
nmap –O 192.168.0.1
Nmap万能开关-A参数
nmap –A 192.168.0.1
-A包含1-10000端口的ping扫描,操作系统扫描,脚本扫描,路由跟踪,服务探测
混合命令扫描
nmap –vv –p1-1000 –O 192.168.0.1/24 –exculde 192.168.0.1
半开放TCP SYN端口扫描
nmap –sS 192.168.0.1
扫描UDP服务端口
nmap –sU 192.168.0.1
TCP连接扫描端口
nmap –sT 192.168.0.1
服务版本探测
nmap –sV 192.168.0.1