1.安装nmap
yum -y install nmap
2.查看
nmap -v -A localhost
结果:
Starting Nmap 6.40 ( http://nmap.org ) at 2022-04-21 16:56 CST
NSE: Loaded 110 scripts for scanning.
NSE: Script Pre-scanning.
Initiating SYN Stealth Scan at 16:56
Scanning localhost (127.0.0.1) [1000 ports]
Discovered open port 22/tcp on 127.0.0.1
Discovered open port 25/tcp on 127.0.0.1
Discovered open port 8001/tcp on 127.0.0.1
Discovered open port 9100/tcp on 127.0.0.1
Discovered open port 9090/tcp on 127.0.0.1
Discovered open port 8082/tcp on 127.0.0.1
Completed SYN Stealth Scan at 16:56, 1.58s elapsed (1000 total ports)
Initiating Service scan at 16:56
Scanning 5 services on localhost (127.0.0.1)
Stats: 0:00:13 elapsed; 0 hosts completed (1 up), 1 undergoing Service Scan
Service scan Timing: About 83.33% done; ETC: 16:56 (0:00:02 remaining)
Completed Service scan at 16:57, 86.16s elapsed (6 services on 1 host)
Initiating OS detection (try #1) against localhost (127.0.0.1)
NSE: Script scanning 127.0.0.1.
Initiating NSE at 16:57
Completed NSE at 16:58, 30.03s elapsed
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000018s latency).
Other addresses for localhost (not scanned): 127.0.0.1
Not shown: 994 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.4 (protocol 2.0)
| ssh-hostkey: 2048 16:52:2f:00:76:f1:f4:4a:a6:1d:ae:c7:ac:54:f4:09 (RSA)
|_256 8c:9d:fd:85:a6:6e:c8:d0:8a:54:7f:9f:da:ac:74:bd (ECDSA)
25/tcp open smtp Postfix smtpd
|_smtp-commands: mini161.localdomain, PIPELINING, SIZE 10240000, VRFY, ETRN, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
8001/tcp open http-proxy sslstrip
|_http-methods: No Allow or Public header in OPTIONS response (status code 404)
|_http-title: Did not follow redirect to http://localhost/users/sign_in
8082/tcp open http WEBrick httpd 1.3.1 (Ruby 2.3.6 (2017-12-14))
|_http-methods: No Allow or Public header in OPTIONS response (status code 404)
|_http-title: Site doesn't have a title.
9090/tcp open zeus-admin?
9100/tcp open jetdirect?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port9090-TCP:V=6.40%I=7%D=4/21%Time=62611C37%P=x86_64-redhat-linux-gnu%
SF:r(GetRequest,A6,"HTTP/1.0x20302x20FoundrnLocation:x20/graphrnDa
SF:te:x20Thu,x2021x20Aprx202022x2008:56:23x20GMTrnContent-Length:
SF:x2029rnContent-Type:x20text/html;x20charset=utf-8rnrn SF:="/graph">Found.nn")%r(SqueezeCenter_CLI,67,"HTTP/1.1x20400
SF:x20Badx20RequestrnContent-Type:x20text/plain;x20charset=utf-8rnC
SF:onnection:x20closernrn400x20Badx20Request")%r(GenericLines,67,"H
SF:TTP/1.1x20400x20Badx20RequestrnContent-Type:x20text/plain;x20ch
SF:arset=utf-8rnConnection:x20closernrn400x20Badx20Request")%r(HT
SF:TPOptions,B9,"HTTP/1.0x20405x20Methodx20Notx20AllowedrnContent-T
SF:ype:x20text/plain;x20charset=utf-8rnX-Content-Type-Options:x20nosn
SF:iffrnDate:x20Thu,x2021x20Aprx202022x2008:56:38x20GMTrnContent
SF:-Length:x2019rnrnMethodx20Notx20Allowedn")%r(RTSPRequest,67,"HT
SF:TP/1.1x20400x20Badx20RequestrnContent-Type:x20text/plain;x20cha
SF:rset=utf-8rnConnection:x20closernrn400x20Badx20Request")%r(Hel
SF:p,67,"HTTP/1.1x20400x20Badx20RequestrnContent-Type:x20text/plain
SF:;x20charset=utf-8rnConnection:x20closernrn400x20Badx20Request
SF:")%r(SSLSessionReq,67,"HTTP/1.1x20400x20Badx20RequestrnContent-Ty
SF:pe:x20text/plain;x20charset=utf-8rnConnection:x20closernrn400
SF:x20Badx20Request")%r(Kerberos,67,"HTTP/1.1x20400x20Badx20Requestr
SF:nContent-Type:x20text/plain;x20charset=utf-8rnConnection:x20close
SF:rnrn400x20Badx20Request")%r(FourOhFourRequest,B0,"HTTP/1.0x2040
SF:4x20Notx20FoundrnContent-Type:x20text/plain;x20charset=utf-8rnX
SF:-Content-Type-Options:x20nosniffrnDate:x20Thu,x2021x20Aprx202022
SF:x2008:57:03x20GMTrnContent-Length:x2019rnrn404x20pagex20not
SF:x20foundn")%r(LPDString,67,"HTTP/1.1x20400x20Badx20RequestrnCont
SF:ent-Type:x20text/plain;x20charset=utf-8rnConnection:x20closernr
SF:n400x20Badx20Request")%r(SIPOptions,67,"HTTP/1.1x20400x20Badx20R
SF:equestrnContent-Type:x20text/plain;x20charset=utf-8rnConnection:
SF:x20closernrn400x20Badx20Request");
Device type: general purpose
Running: Linux 3.X
OS CPE: cpe:/o:linux:linux_kernel:3
OS details: Linux 3.7 - 3.9
Uptime guess: 0.336 days (since Thu Apr 21 08:54:40 2022)
Network Distance: 0 hops
TCP Sequence Prediction: Difficulty=261 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Host: mini161.localdomain
NSE: Script Post-scanning.
Initiating NSE at 16:58
Completed NSE at 16:58, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 120.61 seconds
Raw packets sent: 1125 (52.316KB) | Rcvd: 2326 (102.504KB)
结果说明:
系统有以下几个端口对外提供服务
Discovered open port 22/tcp on 127.0.0.1
Discovered open port 25/tcp on 127.0.0.1
Discovered open port 8001/tcp on 127.0.0.1
Discovered open port 9100/tcp on 127.0.0.1
Discovered open port 9090/tcp on 127.0.0.1
Discovered open port 8082/tcp on 127.0.0.1



