Nmap pada Ubuntu

Simulasi Nmap pada ubuntu.Saya asumsikan laptop sudah terintall Nmap,sekarang kita akan scan misal pada laptop saya menggunakan IP 192.168.0.0/24

 

 

 

 

 

1. TCP Connect scanning pada network 192.168.0.0/24
nmap -v -sT 192.168.0.0/24

root@smasa:~# nmap -v -sT 192.168.0.0/24
Starting Nmap 5.00 ( http://nmap.org ) at 2010-08-13 07:56 WIT
NSE: Loaded 0 scripts for scanning.
Initiating ARP Ping Scan at 07:56
Scanning 192.168.0.0 [1 port]
Completed ARP Ping Scan at 07:56, 0.23s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 07:56
Completed Parallel DNS resolution of 1 host. at 07:56, 0.03s elapsed
Initiating ARP Ping Scan at 07:56
Scanning 254 hosts [1 port/host]
Completed ARP Ping Scan at 07:56, 1.85s elapsed (254 total hosts)
Initiating Parallel DNS resolution of 254 hosts. at 07:56
Completed Parallel DNS resolution of 254 hosts. at 07:56, 0.11s elapsed
Initiating Connect Scan at 07:56
Scanning 192.168.0.1 [1000 ports]
Discovered open port 53/tcp on 192.168.0.1
Discovered open port 80/tcp on 192.168.0.1
Discovered open port 8080/tcp on 192.168.0.1
Discovered open port 3128/tcp on 192.168.0.1
Completed Connect Scan at 08:01, 6.21s elapsed (1000 total ports)
Host 192.168.0.1 is up (0.00022s latency).
Interesting ports on 192.168.0.1:
Not shown: 996 filtered ports
PORT     STATE SERVICE
53/tcp   open  domain
80/tcp   open  http
3128/tcp open  squid-http
8080/tcp open  http-proxy
Initiating Connect Scan at 08:01
Scanning 17 hosts [1000 ports/host]
.....
.....
.....
Host 192.168.0.138 is up (0.00067s latency).
Interesting ports on 192.168.0.138:
Not shown: 997 closed ports
PORT    STATE SERVICE
135/tcp open  msrpc
139/tcp open  netbios-ssn
445/tcp open  microsoft-ds
MAC Address: 00:17:9A:3B:00:76 (D-Link)
Read data files from: /usr/share/nmap
Nmap done: 256 IP addresses (18 hosts up) scanned in 15.01 seconds
           Raw packets sent: 493 (20.706KB) | Rcvd: 17 (714B) 

2. nmap TCP SYN (half-open) scanning
nmap -v -sS 192.168.0.0/24

root@smasa:~# nmap -v -sS 192.168.0.0/24
Starting Nmap 5.00 ( http://nmap.org ) at 2010-08-13 08:13 WIT
NSE: Loaded 0 scripts for scanning.
Initiating ARP Ping Scan at 08:13
Scanning 192.168.0.0 [1 port]
Completed ARP Ping Scan at 08:13, 0.23s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 08:13
Completed Parallel DNS resolution of 1 host. at 08:13, 0.02s elapsed
Initiating ARP Ping Scan at 08:13
Scanning 254 hosts [1 port/host]
Completed ARP Ping Scan at 08:13, 1.84s elapsed (254 total hosts)
Initiating Parallel DNS resolution of 254 hosts. at 08:13
Completed Parallel DNS resolution of 254 hosts. at 08:13, 0.07s elapsed
Initiating SYN Stealth Scan at 08:13
Scanning 192.168.0.1 [1000 ports]
Discovered open port 53/tcp on 192.168.0.1
Discovered open port 8080/tcp on 192.168.0.1
Discovered open port 80/tcp on 192.168.0.1
Discovered open port 3128/tcp on 192.168.0.1
Completed SYN Stealth Scan at 08:13, 0.05s elapsed (1000 total ports)
Host 192.168.0.1 is up (0.0000090s latency).
Interesting ports on 192.168.0.1:
Not shown: 996 closed ports
PORT     STATE SERVICE
53/tcp   open  domain
80/tcp   open  http
3128/tcp open  squid-http
8080/tcp open  http-proxy
Initiating SYN Stealth Scan at 08:13
Scanning 11 hosts [1000 ports/host]
....
....
Host 192.168.0.138 is up (0.000080s latency).
Interesting ports on 192.168.0.138:
Not shown: 997 closed ports
PORT    STATE SERVICE
135/tcp open  msrpc
139/tcp open  netbios-ssn
445/tcp open  microsoft-ds
MAC Address: 00:17:9A:3B:00:76 (D-Link)
Host 192.168.0.140 is up (0.00030s latency).
All 1000 scanned ports on 192.168.0.140 are filtered
MAC Address: 44:87:FC:5A:5B:68 (Unknown)
Read data files from: /usr/share/nmap
...... 

3. nmap TCP FIN scanning
nmap -v -sF 192.168.0.0/24

root@smasa:~# nmap -v -sF 192.168.0.0/24
Starting Nmap 5.00 ( http://nmap.org ) at 2010-08-13 08:18 WIT
NSE: Loaded 0 scripts for scanning.
Initiating ARP Ping Scan at 08:18
Scanning 192.168.0.0 [1 port]
Completed ARP Ping Scan at 08:18, 0.23s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 08:18
Completed Parallel DNS resolution of 1 host. at 08:18, 0.03s elapsed
Initiating ARP Ping Scan at 08:18
Scanning 254 hosts [1 port/host]
Completed ARP Ping Scan at 08:18, 1.84s elapsed (254 total hosts)
Initiating Parallel DNS resolution of 254 hosts. at 08:18
Completed Parallel DNS resolution of 254 hosts. at 08:18, 0.07s elapsed
Initiating FIN Scan at 08:18
Scanning 192.168.0.1 [1000 ports]
Completed FIN Scan at 08:18, 1.23s elapsed (1000 total ports)
Host 192.168.0.1 is up (0.000011s latency).
Interesting ports on 192.168.0.1:
Not shown: 996 closed ports
PORT     STATE         SERVICE
53/tcp   open|filtered domain
80/tcp   open|filtered http
3128/tcp open|filtered squid-http
8080/tcp open|filtered http-proxy
Initiating FIN Scan at 08:18
Scanning 11 hosts [1000 ports/host]
....
....
Host 192.168.0.129 is up (0.00028s latency).
All 1000 scanned ports on 192.168.0.129 are open|filtered
MAC Address: 00:25:11:03:F7:96 (Elitegroup Computer System CO.)
Host 192.168.0.138 is up (0.00075s latency).
All 1000 scanned ports on 192.168.0.138 are closed
MAC Address: 00:17:9A:3B:00:76 (D-Link)
Host 192.168.0.140 is up (0.00024s latency).
All 1000 scanned ports on 192.168.0.140 are open|filtered
MAC Address: 44:87:FC:5A:5B:68 (Unknown)
..... ...... 

4. nmap TCP Xmas tree scanning
Digunakan untuk melihat apakah proteksi firewall masih berjalan dengan baik atau tidak.
nmap -v -sX 192.168.0.0/24

root@smasa:~# nmap -v -sX 192.168.0.0/24
Starting Nmap 5.00 ( http://nmap.org ) at 2010-08-13 08:21 WIT
NSE: Loaded 0 scripts for scanning.
Initiating ARP Ping Scan at 08:21
Scanning 192.168.0.0 [1 port]
Completed ARP Ping Scan at 08:21, 0.23s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 08:21
Completed Parallel DNS resolution of 1 host. at 08:21, 0.02s elapsed
Initiating ARP Ping Scan at 08:21
Scanning 254 hosts [1 port/host]
Completed ARP Ping Scan at 08:21, 2.06s elapsed (254 total hosts)
Initiating Parallel DNS resolution of 254 hosts. at 08:21
Completed Parallel DNS resolution of 254 hosts. at 08:21, 0.07s elapsed
Initiating XMAS Scan at 08:21
Scanning 192.168.0.1 [1000 ports]
Completed XMAS Scan at 08:21, 1.23s elapsed (1000 total ports)
Host 192.168.0.1 is up (0.0000060s latency).
Interesting ports on 192.168.0.1:
Not shown: 996 closed ports
PORT     STATE         SERVICE
53/tcp   open|filtered domain
80/tcp   open|filtered http
3128/tcp open|filtered squid-http
8080/tcp open|filtered http-proxy
Initiating XMAS Scan at 08:21
Scanning 11 hosts [1000 ports/host]
....
.... 

5. nmap TCP Null scanning
Digunakan untuk melihat apakah proteksi firewall masih berjalan dengan baik atau tidak.
nmap -v -sN 192.168.0.0/24

root@smasa:~# nmap -v -sN 192.168.0.0/24
Starting Nmap 5.00 ( http://nmap.org ) at 2010-08-13 08:23 WIT
NSE: Loaded 0 scripts for scanning.
Initiating ARP Ping Scan at 08:23
Scanning 192.168.0.0 [1 port]
Completed ARP Ping Scan at 08:23, 0.24s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 08:23
Completed Parallel DNS resolution of 1 host. at 08:23, 0.03s elapsed
Initiating ARP Ping Scan at 08:23
Scanning 254 hosts [1 port/host]
Completed ARP Ping Scan at 08:23, 2.05s elapsed (254 total hosts)
Initiating Parallel DNS resolution of 254 hosts. at 08:23
Completed Parallel DNS resolution of 254 hosts. at 08:23, 0.07s elapsed
Initiating NULL Scan at 08:23
Scanning 192.168.0.1 [1000 ports]
Completed NULL Scan at 08:23, 1.25s elapsed (1000 total ports)
Host 192.168.0.1 is up (0.0000060s latency).
Interesting ports on 192.168.0.1:
Not shown: 996 closed ports
PORT     STATE         SERVICE
53/tcp   open|filtered domain
80/tcp   open|filtered http
3128/tcp open|filtered squid-http
8080/tcp open|filtered http-proxy
Initiating NULL Scan at 08:23
Scanning 11 hosts [1000 ports/host]
....
.... 

6. nmap TCP Windows scanning
nmap -v -sW 192.168.0.0/24

root@smasa:~# nmap -v -sW 192.168.0.0/24
Starting Nmap 5.00 ( http://nmap.org ) at 2010-08-13 08:28 WIT
NSE: Loaded 0 scripts for scanning.
Initiating ARP Ping Scan at 08:28
Scanning 192.168.0.0 [1 port]
Completed ARP Ping Scan at 08:28, 0.32s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 08:28
Completed Parallel DNS resolution of 1 host. at 08:28, 0.06s elapsed
Initiating ARP Ping Scan at 08:28
Scanning 254 hosts [1 port/host]
Completed ARP Ping Scan at 08:28, 2.42s elapsed (254 total hosts)
Initiating Parallel DNS resolution of 254 hosts. at 08:28
Completed Parallel DNS resolution of 254 hosts. at 08:28, 0.13s elapsed
Initiating Window Scan at 08:28
Scanning 192.168.0.1 [1000 ports]
Completed Window Scan at 08:28, 0.09s elapsed (1000 total ports)
Host 192.168.0.1 is up (0.0000090s latency).
All 1000 scanned ports on 192.168.0.1 are closed
Initiating Window Scan at 08:28
Scanning 11 hosts [1000 ports/host]
....
.... 

7. nmap TCP RPC scanning
digunakan untuk mencari RPC services
nmap -v -sR 192.168.0.0/24

root@smasa:~# nmap -v -sR 192.168.0.0/24
Starting Nmap 5.00 ( http://nmap.org ) at 2010-08-13 08:35 WIT
NSE: Loaded 0 scripts for scanning.
Initiating ARP Ping Scan at 08:35
Scanning 192.168.0.0 [1 port]
Completed ARP Ping Scan at 08:35, 0.23s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 08:35
Completed Parallel DNS resolution of 1 host. at 08:35, 0.03s elapsed
Initiating ARP Ping Scan at 08:35
Scanning 254 hosts [1 port/host]
Completed ARP Ping Scan at 08:35, 2.05s elapsed (254 total hosts)
Initiating Parallel DNS resolution of 254 hosts. at 08:35
Completed Parallel DNS resolution of 254 hosts. at 08:35, 0.08s elapsed
Initiating SYN Stealth Scan at 08:35
Scanning 192.168.0.1 [1000 ports]
Discovered open port 8080/tcp on 192.168.0.1
Discovered open port 53/tcp on 192.168.0.1
Discovered open port 80/tcp on 192.168.0.1
Discovered open port 3128/tcp on 192.168.0.1
Completed SYN Stealth Scan at 08:35, 0.05s elapsed (1000 total ports)
Initiating RPCGrind Scan against 192.168.0.1 at 08:35
Completed RPCGrind Scan against 192.168.0.1 at 08:35, 1.20s elapsed (4 ports)
Host 192.168.0.1 is up (0.0000090s latency).
Interesting ports on 192.168.0.1:
Not shown: 996 closed ports
PORT     STATE SERVICE     VERSION
53/tcp   open  domain
80/tcp   open  http
3128/tcp open  squid-http
8080/tcp open  http-proxy
Initiating SYN Stealth Scan at 08:35
Scanning 12 hosts [1000 ports/host]
....
....

8. nmap UDP scanning
digunakan untuk mencari port UDP yang terbuka
nmap -v -O 192.168.0.0/24

root@smasa:~# nmap -v -O 192.168.0.0/24
Starting Nmap 5.00 ( http://nmap.org ) at 2010-08-13 08:39 WIT
NSE: Loaded 0 scripts for scanning.
Initiating ARP Ping Scan at 08:39
Scanning 192.168.0.0 [1 port]
Completed ARP Ping Scan at 08:39, 0.24s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 08:39
Completed Parallel DNS resolution of 1 host. at 08:39, 0.02s elapsed
Initiating ARP Ping Scan at 08:39
Scanning 254 hosts [1 port/host]
Completed ARP Ping Scan at 08:39, 2.05s elapsed (254 total hosts)
Initiating Parallel DNS resolution of 254 hosts. at 08:39
Completed Parallel DNS resolution of 254 hosts. at 08:39, 0.08s elapsed
Initiating SYN Stealth Scan at 08:39
Scanning 192.168.0.1 [1000 ports]
Discovered open port 80/tcp on 192.168.0.1
Discovered open port 8080/tcp on 192.168.0.1
Discovered open port 53/tcp on 192.168.0.1
Discovered open port 3128/tcp on 192.168.0.1
Completed SYN Stealth Scan at 08:39, 0.05s elapsed (1000 total ports)
....
.... 

9. nmap remote software version scanning
Digunakan untuk mengetahui versi software pada port yang terbuka
nmap -v -sV 192.168.0.0/24

root@smasa:~# nmap -v -sV 192.168.0.0/24
Starting Nmap 5.00 ( http://nmap.org ) at 2010-08-13 08:46 WIT
NSE: Loaded 3 scripts for scanning.
Initiating ARP Ping Scan at 08:46
Scanning 192.168.0.0 [1 port]
Completed ARP Ping Scan at 08:46, 0.30s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 08:46
Completed Parallel DNS resolution of 1 host. at 08:46, 0.05s elapsed
Initiating ARP Ping Scan at 08:46
Scanning 254 hosts [1 port/host]
Completed ARP Ping Scan at 08:47, 2.21s elapsed (254 total hosts)
Initiating Parallel DNS resolution of 254 hosts. at 08:47
Completed Parallel DNS resolution of 254 hosts. at 08:47, 0.10s elapsed
Initiating SYN Stealth Scan at 08:47
Scanning 192.168.0.1 [1000 ports]
Discovered open port 8080/tcp on 192.168.0.1
Discovered open port 53/tcp on 192.168.0.1
Completed SYN Stealth Scan at 08:47, 0.06s elapsed (1000 total ports)
Initiating Service scan at 08:47
Scanning 4 services on 192.168.0.1
Completed Service scan at 08:47, 11.06s elapsed (4 services on 1 host)
NSE: Script scanning 192.168.0.1.
NSE: Script Scanning completed.
Host 192.168.0.1 is up (0.0000090s latency).
Interesting ports on 192.168.0.1:
Not shown: 996 closed ports
PORT     STATE SERVICE    VERSION
53/tcp   open  domain     ISC BIND 9.6.1-P2
80/tcp   open  http       Apache httpd 2.2.12 ((Ubuntu))
3128/tcp open  http-proxy Squid webproxy 2.7.STABLE6
8080/tcp open  http-proxy HAVP anti-virus web proxy
....
....
Host 192.168.0.131 is up (0.00010s latency).
Interesting ports on 192.168.0.131:
Not shown: 996 closed ports
PORT     STATE SERVICE      VERSION
135/tcp  open  msrpc        Microsoft Windows RPC
139/tcp  open  netbios-ssn
445/tcp  open  microsoft-ds Microsoft Windows XP microsoft-ds
3000/tcp open  ppp?
MAC Address: 00:1B:B9:AE:BB:F0 (Elitegroup Computer System Co.)
Service Info: OS: Windows
Host 192.168.0.138 is up (0.000092s latency).
Interesting ports on 192.168.0.138:
Not shown: 997 closed ports
PORT    STATE SERVICE      VERSION
135/tcp open  msrpc        Microsoft Windows RPC
139/tcp open  netbios-ssn
445/tcp open  microsoft-ds Microsoft Windows XP microsoft-ds
MAC Address: 00:17:9A:3B:00:76 (D-Link)
Service Info: OS: Windows
....
.... 

 

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s