計算機網絡自頂向下方法 第三章 3.5.6節 關於nmap的小實驗 (課本Page173)

https://github.com/jzplp/Computer-Network-A-Top-Down-Approach-Answer

第三章 3.5.6節 關於nmap的小實驗

實驗環境:windows10

實驗過程

  1. windows沒有nmap工具,需要手動下載:https://nmap.org/

  2. 檢測目標主機某端口的TCP是否開放

  • 無法到達指定的端口,可能是由於防火牆
nmap -sT -p80 192.168.2.220
Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-07 14:48 ?D1ú±ê×?ê±??
Nmap scan report for MI9-jzphone.lan (192.168.2.220)
Host is up (0.074s latency).

PORT   STATE    SERVICE
80/tcp filtered http
MAC Address: A8:9C:ED:A7:D9:EC (Xiaomi Communications)

Nmap done: 1 IP address (1 host up) scanned in 2.33 seconds
  • 端口打開
nmap -sT -p80 192.168.2.1
Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-07 14:51 ?D1ú±ê×?ê±??
Nmap scan report for phicomm.me (192.168.2.1)
Host is up (0.0024s latency).

PORT   STATE SERVICE
80/tcp open  http
MAC Address: 68:DB:54:CC:6B:BE (Phicomm (Shanghai))

Nmap done: 1 IP address (1 host up) scanned in 1.47 seconds
  • 端口關閉
nmap -sT -p80 192.168.2.239
Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-07 14:56 ?D1ú±ê×?ê±??
Nmap scan report for LAPTOP-3CP7H0GM.lan (192.168.2.239)
Host is up (1.0s latency).

PORT   STATE  SERVICE
80/tcp closed http

Nmap done: 1 IP address (1 host up) scanned in 3.38 seconds

必須關閉防火牆,才能檢測到closed狀態。

發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章