Ãâó : haansoftlinux.com
Áú¹® :
³» ÄÄÇ»ÅÍ·Î ÀÎÅÍ³Ý»ó¿¡ ¿·ÁÀÖ´Â Æ÷Æ®¸¦ È®ÀÎÇÏ·ÁÇÕ´Ï´Ù..
´äº¯:
1. °³¿ä
´Ù¾çÇÑ ¹æ¹ýÀÌ ÀÖ°ÚÀ¸³ª ¿©±â¼´Â nmap¸¦ ÀÌ¿ëÇÏ´Â ¹æ¹ýÀ» ¾Ë·Áµå¸®°Ú½À´Ï´Ù.
nmap Àº ³×Æ®¿öÅ© ¾î¶²Æ÷Æ®°¡ ¿·ÁÀִ°¡ listeningµÇ°í Àִ°¡¸¦ ½ºÄµÇϱâ À§ÇÑ toolÀÔ´Ï´Ù.
nmapÀ» ´Ù¿î¹Þ´Â°÷Àº (
www.insercuer.org)
2. ¼³Ä¡ ¹æ¹ý
#tar xvfj nmap-3.27.tar.bz2
#./configure --prefix=/usr/local/nmap
# make
#make install
3. ¿É¼Ç
-sT : TCP connection() scan: °¡Àå ±âº»ÀûÀÎ ÇüÅ Æ÷Æ®°¡ listenning»óŶó¸é connection() ±×·¸Áö ¾ÊÀ¸¸é rechable µÇÁö¾Ê´Â´Ù.
-sS : TCP SYN scan : full Tcp Á¢¼ÓÀ» ÇÏÁö ¾ÊÀ¸¹Ç·Î "half-open" ½ºÄ³´×À̶ó ÇÑ´Ù.
-sF : stealth FIN, xmax tree, null scan: À̵éÀº syn packetÀ» ¸·¾Æ³õÀº ¹æÈº®À̳ª ÆÐŶ
-sX ÇÊÅÍ ¶Ç´Â synlogger¿Í courteny °°Àº ½ºÄµÀ» ŽÁöÇÏ´Â ÇÁ·Î±×·¥À» ¹«»çÈ÷ Åë°ú ÇÒ ¼ö
-sN ÀÖ´Ù. open Æ÷Æ®·Î FIN ÆÐŶÀ» º¸³»¸é ÀÌ ÆÐŶÀ» ¹«½ÃÇϰí, closed port·Î º¸³»¸é RST
ÆÐŶÀÌ ¿Â´Ù. ÀÌµé ½ºÄµÀº ÁÖ·Î À¯´Ð½º °è¿ OS¿¡¼¸¸ »ç¿ë °¡´ÉÇϸç, ·çÆ®ÄöÇÑÀÌ ÇÊ¿ä
-sU : À̰ÍÀº È£½ºÆ®ÀÇ ¾î¶°ÇÑ UDPÆ÷Æ®°¡ ¿·ÁÀÖ´ÂÁö °áÁ¤ÇϱâÀ§ÇØ »ç¿ëÇÑ´Ù. ÀÌ ±â¼úÀº ½Ã½ºÅÛÀÇ °¢ Æ÷Æ®¿¡ 0 ¹ÙÀÌÆ® UDP ÆÐŶÀ» º¸³½´Ù. ¸¸ÀÏ ICMP port unrechable¸Þ¼¼Áö¸¦
¹Þ¾Ò´Ù¸é closeµÈ°Å´Ù.
-sA : ACK scan : À̰ÍÀº ¹æÈº®ÀÇ rool setÀ» Á¤¹ÐÇÏ°Ô °èȹÇϱâ À§ÇØ »ç¿ëÇÑ´Ù. ƯÈ÷ ¹æÈº®ÀÌ statefulÇÑÁö ¾Æ´Ï¸é ´Ü¼øÈ÷ µé¾î¿À´Â synÆÐŶÀ» Â÷´ÜÇÏ´Â ÆÐŶÇÊÅÍÀÎÁö¸¦ Á¡°ËÇϴµ¥ µµ¿òÀÌ µÈ´Ù. Æ÷Æ®¿¡ ACK ÆÐŶÀ» º¸³»¾î RSTÀÀ´äÀ» ¹ÞÀ¸¸é ±× Æ÷Æ®´Â "unfilter"ÀÌ´Ù. nmapÀº "unfilterd', Æ÷Æ®´Â ÇÁ¸°Æ® ÇÏÁö ¾Ê´Â´Ù.
-sW : window scan : TCP window Å©±âÀÇ º¯Ä¢ ¶§¹®¿¡ filtered/nonfiltered À̸ç, ¾Æ¹«·±
ÀÀ´äÀÌ ¾øÀ¸¸é filteredÀÌ´Ù.
-sR : RPC scan : À̰ÍÀº ¿·ÁÁ® ÀÖ´Â TCP/UDPÆ÷Æ®¿¡ ´ëÇØ ±×µéÀÌ RPCÆ÷Æ®ÀÎÁö, ¼ºñ½º¸¦ Á¦°øÇÏ´Â ÇÁ·Î±×·¥Àº ¹«¾ùÀ̸ç, ¹öÁ¯Àº ¹«¾ùÀÎÁö µîÀ» È®ÀÎÇϱâ À§ÇØ SunRPC program NULL, commandsÀ» °è¼Ó º¸³»°Ô µÈ´Ù. µû¶ó¼ È£½ºÆ® portmaper¹æÈº®(¶Ç´Â TCP wrapper)¾È¿¡ ÀÖ´Ù ÇÏ´õ¶ó°í 'rpcinfo -p'¿Í °°Àº Á¤º¸¸¦ ¾òÀ» ¼ö ÀÖ´Ù.
-b : FTP bounce attack : À͸í ftp ¼¹ö¸¦ ÀÌ¿ëÇØ ±× FTP¼¹ö¸¦ °æÀ¯Çؼ È£½ºÆ®¸¦ ½ºÄµ .
-f : packetÀ» Á¶±×¸¸ÇϰԳª´«¾î »ç¿ëÇ϶ó´Â °ÍÀ¸·Î ÇÊÅ͸µÀ» ÇÇÇϰųª ħÀÔŽÁö½Ã½ºÅÛÀ» ÇÇÇØ°¡±â À§ÇÑ °ÍÀÌ´Ù.
-P0 : ¹æÈº®¿¡ ÀÇÇØ ICMP echo requests( or responses)À» ¸·¾Æ³õ´Â ³×Æ®¿öÅ© ½ºÄµÀ» °¡´ÉÇÏ°Ô ÇÑ´Ù. pingÀ» ¸·¾Æ³õÀº È£½ºÆ®¸¦ ½ºÄµÇϰ¡¤Ó À§Çؼ´Â -P0, -PT80À» »ç¿ëÇÑ´Ù.
-PT : ¾î´ÀÈ£½ºÆ®°¡ »ì¾Æ Àִ°¡¸¦ ¾Ë±â À§ÇØ TCP "ping"À» »ç¿ëÇÑ´Ù, À̰ÍÀº ICMP echo request ÆÐŶÀ» º¸³»°í ÀÀ´äÀ» ±â´Ù¸®´Â ´ë½Å¿¡, ³×Æ®¿öÅ©¿¡ TCP ACK¸¦ º¸³»¾î ÀÀ´äÀÌ ¿À±â¸¦ ±â´Ù¸°´Ù. ÀÌ ¿É¼ÇÀº ping ÆÐŶÀ» Â÷´ÜÇÏ´Â ³×Æ®¿öÅ©³ª È£½ºÆ®¸¦ ½ºÄµÇÏ´Â µ¿¾ÈÀº È£½ºÆ®°¡ »ì¾Æ ÀÖ´Â°Í°í °°´Ù. -PT¸¦ »ç¿ëÇϸç, default port 80
-PI : À̰ÍÀº »ì¾ÆÀִ ȣ½ºÆ®¸¦ ãÀ¸¸ç, ¶ÇÇÑ ³×Æ®¿öÅ© subnet-directed broadcast address¸¦ ã´Â´Ù. À̵éÀº µé¾î¿À´Â IPÆÐŶÀ» ÄÄÇ»ÅÍÀÇ ¼ºê³ÝÀ¸·Î broadcast Çϱâ À§ÇÑ ipÁÖ¼Ò
-PB : pingÀ» ±âº»ÇüÅ ACK(-PT)¿Í ICMP(-PI) ¸ðµÎ¸¦ »ç¿ëÇÑ´Ù.
-O : TCP/IP fingerprintingÀ» ÅëÇÑ È£½ºÆ®¸¦ ÆÄ¾ÇÇϴµ¥ »ç¿ëµÈ´Ù.
-v : verbose mode: interactiveÇÑ »ç¿ë¿¡ ¸Å¿ì À¯¿ëÇÑ ¿É¼ÇÀÌ´Ù.
-p : Á¢¼ÓÇϰíÀÚ ÇÏ´Â Æ÷Æ®¸¦ ÁöÁ¤ÇÏ´Â ¿É¼ÇÀÌ´Ù. -p 20-30,139,60000 -'Àº 20¿¡¼ 30»çÀÌÀÇ Æ÷Æ®¿Í 139¹ø Æ÷Æ®,60000¹ø ÀÌ»óÀÇ Æ÷Æ®¿¡ ´ëÇØ ½ºÄËÇÑ´Ù.
-n/-R dns lookupÀ» ÇÏÁö ¾Ê´Â´Ù / dns lookupÀ» ÇÑ´Ù.
-S : packet source ÁÖ¼Ò¸¦ ÁöÁ¤ÇÑ´Ù.
-e : ³×Æ®¿öÅ©ÀÇ interfaceÀ» ÁöÁ¤ÇÑ´Ù.
-g : packetÀÇ ¼Ò½º Æ÷Æ®¹øÈ£¸¦ ÁöÁ¤ÇÑ´Ù.
-oN : ½ºÄµÇÑ °á°ú¸¦ logfile¿¡ ³²±ä´Ù.
-D : scanÀ» ´çÇÏ´Â »óÅ ȣ½ºÆ®°¡ ¾îµð¿¡¼ ÁøÂ¥ scanÀ» Çß´ÂÁö ÆÇ´ÜÇϱâ Èûµé°Ô ¸¸µç´Ù.
4. »ç¿ë¹ý
[root@www2 bin]# ./nmap -v localhost
No tcp, udp, or ICMP scantype specified, assuming SYN Stealth scan. Use -sP if you really don't want to portscan (and just want to see what hosts are up).
Starting nmap 3.27 (
www.insecure.org/nmap/ ) at 2003-05-19 17:53 KST
Host localhost.localdomain (127.0.0.1) appears to be up ... good.
Initiating SYN Stealth Scan against localhost.localdomain (127.0.0.1) at 17:53
Adding open port 22/tcp
Adding open port 21/tcp
Adding open port 873/tcp
Adding open port 80/tcp
Adding open port 3306/tcp
Adding open port 25/tcp
The SYN Stealth Scan took 2 seconds to scan 1623 ports.
Interesting ports on localhost.localdomain (127.0.0.1):
(The 1617 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
80/tcp open http
873/tcp open rsync
3306/tcp open mysql
Nmap run completed -- 1 IP address (1 host up) scanned in 2.355 seconds
# nmap -p 1-65535 localhost
Starting nmap V. 2.54BETA31 (
www.insecure.org/nmap/ )
Interesting ports on localhost.localdomain (127.0.0.1):
(The 65527 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
80/tcp open http
873/tcp open rsync
3306/tcp open mysql
20000/tcp open unknown
20001/tcp open unknown
Nmap run completed -- 1 IP address (1 host up) scanned in 5 seconds
#nmap -O localhost
Starting nmap V. 2.54BETA31 (
www.insecure.org/nmap/ )
Interesting ports on localhost.localdomain (127.0.0.1):
(The 1548 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
80/tcp open http
873/tcp open rsync
3306/tcp open mysql
Remote operating system guess: Linux Kernel 2.4.0 - 2.4.17 (X86)
Uptime 188.936 days (since Mon Nov 11 19:27:32 2002)
Nmap run completed -- 1 IP address (1 host up) scanned in 1 second
#nmap -sP -PT80 localhsot/25
#nmap -sT localhost
#nmap -sS localhost
#nmap -sF -sX -sN localhost
#nmap -sU localhost
#nmap -sT -sR -O -I -F localhost
#nmap -v -sF localhost -oN scan.txt
#nmap -sX -p 22,53,110,143,4564 192.168.*.1-27
#nmap -v --randomiz_hosts -p 80 '*.*.2.3-5'
#nmap -p 20,21,23,53,80,110 -PO -vv xxxx.com
#nmap -sP PT80 192.168.0.1/24
#nmap -f -sS -p 23 localhost
NMAP Àº ¿ÀǼҽº·Î À©µµ¿ì¿ë ¹öÀüµµ ÀÖ½À´Ï´Ù.