日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 编程语言 > python >内容正文

python

python-nmap使用及案例

發布時間:2025/3/15 python 21 豆豆
生活随笔 收集整理的這篇文章主要介紹了 python-nmap使用及案例 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

nmap概念及功能

概念

NMap,也就是Network Mapper,最早是Linux下的網絡掃描和嗅探工具包。

nmap是一個網絡連接端掃描軟件,用來掃描網上電腦開放的網絡連接端。確定哪些服務運行在哪些連接端,并且推斷計算機運行哪個操作系統(這是亦稱 fingerprinting)。它是網絡管理員必用的軟件之一,以及用以評估網絡系統安全。

正如大多數被用于網絡安全的工具,nmap 也是不少黑客及駭客(又稱腳本小子)愛用的工具 。系統管理員可以利用nmap來探測工作環境中未經批準使用的服務器,但是黑客會利用nmap來搜集目標電腦的網絡設定,從而計劃攻擊的方法。

Nmap 常被跟評估系統漏洞軟件Nessus?混為一談。Nmap 以隱秘的手法,避開闖入檢測系統的監視,并盡可能不影響目標系統的日常操作。

Nmap 在黑客帝國(The Matrix)中,連同SSH1的32位元循環冗余校驗漏洞,被崔妮蒂用以入侵發電站的能源管理系統。

?

功能

基本功能有三個,一是探測一組主機是否在線;其次是掃描 主機端口,嗅探所提供的網絡服務;還可以推斷主機所用的操作系統 。Nmap可用于掃描僅有兩個節點的LAN,直至500個節點以上的網絡。Nmap 還允許用戶定制掃描技巧。通常,一個簡單的使用ICMP協議的ping操作可以滿足一般需求;也可以深入探測UDP或者TCP端口,直至主機所 使用的操作系統;還可以將所有探測結果記錄到各種格式的日志中, 供進一步分析操作。

進行ping掃描,打印出對掃描做出響應的主機,不做進一步測試(如端口掃描或者操作系統探測):

nmap -sP 192.168.1.0/24

僅列出指定網絡上的每臺主機,不發送任何報文到目標主機:

nmap -sL 192.168.1.0/24

探測目標主機開放的端口,可以指定一個以逗號分隔的端口列表(如-PS22,23,25,80):

nmap -PS 192.168.1.234

使用UDP ping探測主機:

nmap -PU 192.168.1.0/24

使用頻率最高的掃描選項:SYN掃描,又稱為半開放掃描,它不打開一個完全的TCP連接,執行得很快:

nmap -sS 192.168.1.0/24

nmap安裝

本文以linux Ubuntu16.04為例,最后主要用python操作

1. 先安裝nmap

sudo apt-get install nmap

2.再安裝python-nmap

sudo pip install python-nmap

安裝完之后python導入nmap測試驗證是否成功

root@LiDebin:~# python Python 2.7.12 (default, Jul 1 2016, 15:12:24) [GCC 5.4.0 20160609] on linux2 Type "help", "copyright", "credits" or "license" for more information. >>> import nmap

?

python操作nmap

1.簡單的小案例

創建PortScanner實例,然后掃描159.239.210.26這個IP的20-443端口。

import nmapnm = nmap.PortScanner() ret = nm.scan('115.239.210.26','20') print ret返回格式如下: {'nmap': {'scanstats': {'uphosts': '1', 'timestr': 'Tue Oct 25 11:30:47 2016', 'downhosts': '0', 'totalhosts': '1', 'elapsed': '1.11'},'scaninfo': {'tcp': {'services': '20', 'method': 'connect'}}, 'command_line': 'nmap -oX - -p 20 -sV 115.239.210.26'},'scan': {'115.239.210.26': {'status': {'state': 'up', 'reason': 'syn-ack'}, 'hostnames': [{'type': '', 'name': ''}],'vendor': {}, 'addresses': {'ipv4': '115.239.210.26'},'tcp': {20: {'product': '', 'state': 'filtered', 'version': '', 'name': 'ftp-data', 'conf': '3', 'extrainfo': '', 'reason': 'no-response', 'cpe': ''} } } } }

2.內置方法:

還可以打印出簡單的信息

import nmap nm = nmap.PortScanner() print nm.scaninfo() # {u'tcp': {'services': u'20-443', 'method': u'syn'}} print nm.command_line() # u'nmap -oX - -p 20-443 -sV 115.239.210.26'

查看有多少個host

print nm.all_hosts() # [u'115.239.210.26']

查看該host的詳細信息

nm['115.239.210.26']

查看該host包含的所有協議

nm['115.239.210.26'].all_protocols()

查看該host的哪些端口提供了tcp協議

nm['115.239.210.26']['tcp']nm['115.239.210.26']['tcp'].keys()

查看該端口是否提供了tcp協議

nm['115.239.210.26'].has_tcp(21)

還可以像這樣設置nmap執行的參數

nm.scan(hosts='192.168.1.0/24', arguments='-n -sP -PE -PA21,23,80,3389')

實驗案例

檢測內網機器端口

1.定義函數庫mytools.py

#-*- coding:utf-8 -*- import smtplib from email.mime.text import MIMEText from email.header import Header def sendemail(sender,receiver,subject,content,smtpserver,smtpuser,smtppass): msg = MIMEText(content,'html','utf-8')#中文需參數‘utf-8',單字節字符不需要 msg['Subject'] = Header(subject, 'utf-8') msg['From'] = '<%s>' % sender msg['To'] = ";".join(receiver) try: smtp = smtplib.SMTP() smtp.connect(smtpserver) smtp.login(smtpuser, smtppass) smtp.sendmail(sender, receiver, msg.as_string()) smtp.quit() except Exception,e: print e

2.?實現端口掃描的程序,單線程版本nmscan.py

# !/usr/bin/python # -*- coding:utf-8 -*- import nmap import re import mytools as tool import sysreload(sys) sys.setdefaultencoding('utf8')def nmScan(hostlist, portrange, whitelist):p = re.compile("^(\d*)\-(\d*)$")if type(hostlist) != list:help()portmatch = re.match(p, portrange)if not portmatch:help()l = []for host in hostlist:result = ''nm = nmap.PortScanner()tmp = nm.scan(host, portrange)result = result + "<h2>ip地址:%s 主機名:[%s] ...... %s</h2><hr>" % (host, tmp['scan'][host]['hostname'], tmp['scan'][host]['status']['state'])try:ports = tmp['scan'][host]['tcp'].keys()except KeyError, e:if whitelist:whitestr = ','.join(whitelist)result = result + "未掃到開放端口!請檢查%s端口對應的服務狀態" % whitestrelse:result = result + "掃描結果正常,無暴漏端口"for port in ports:info = ''if port not in whitelist:info = '<strong><font color=red>Alert:非預期端口</font><strong>&nbsp;&nbsp;'else:info = '<strong><font color=green>Info:正常開放端口</font><strong>&nbsp;&nbsp;'portinfo = "%s <strong>port</strong> : %s &nbsp;&nbsp;<strong>state</strong> : %s &nbsp;&nbsp;<strong>product<strong/> : %s <br>" % (info, port, tmp['scan'][host]['tcp'][port]['state'],tmp['scan'][host]['tcp'][port]['product'])result = result + portinfol.append([host, str(result)])return ldef help():print "Usage: nmScan(['127.0.0.1',],'0-65535')"if __name__ == "__main__":hostlist = ['10.10.10.10', '10.10.10.11']portrange = '0-65535'whitelist = [80, 443]l = nmScan(hostlist, portrange, whitelist)sender = '75501664@qq.com'receiver = ['zhangyanlin8851@163.com', '877986976@qq.com']subject = '服務器端口掃描'smtpserver = 'smtp.exmail.qq.com'smtpuser = 'zhangyanlin8851@163.cn'smtppass = 'linuxidc163'mailcontent = ''for i in range(len(l)):mailcontent = mailcontent + l[i][1]tool.sendemail(sender, receiver, subject, mailcontent, smtpserver, smtpuser, smtppass)

3.多線程版本

# !/usr/bin/python # -*- coding:utf-8 -*-import nmap import re import mytools as tool import sys from multiprocessing import Pool from functools import partialreload(sys) sys.setdefaultencoding('utf8')def nmScan(host, portrange, whitelist):p = re.compile("^(\d*)\-(\d*)$")# if type(hostlist) != list:# help()portmatch = re.match(p, portrange)if not portmatch:help()if host == '121.42.32.172':whitelist = [25, ]result = ''nm = nmap.PortScanner()tmp = nm.scan(host, portrange)result = result + "<h2>ip地址:%s 主機名:[%s] ...... %s</h2><hr>" % (host, tmp['scan'][host]['hostname'], tmp['scan'][host]['status']['state'])try:ports = tmp['scan'][host]['tcp'].keys()for port in ports:info = ''if port not in whitelist:info = '<strong><font color=red>Alert:非預期端口</font><strong>&nbsp;&nbsp;'else:info = '<strong><font color=green>Info:正常開放端口</font><strong>&nbsp;&nbsp;'portinfo = "%s <strong>port</strong> : %s &nbsp;&nbsp;<strong>state</strong> : %s &nbsp;&nbsp;<strong>product<strong/> : %s <br>" % (info, port, tmp['scan'][host]['tcp'][port]['state'], tmp['scan'][host]['tcp'][port]['product'])result = result + portinfoexcept KeyError, e:if whitelist:whitestr = ','.join(whitelist)result = result + "未掃到開放端口!請檢查%s端口對應的服務狀態" % whitestrelse:result = result + "掃描結果正常,無暴漏端口"return resultdef help():print "Usage: nmScan(['127.0.0.1',],'0-65535')"return Noneif __name__ == "__main__":hostlist = ['10.10.10.10', '10.10.10.11']portrange = '0-65535'whitelist = [80, 443]l = nmScan(hostlist, portrange, whitelist)sender = '75501664@qq.com'receiver = ['zhangyanlin8851@163.com', '877986976@qq.com']subject = '服務器端口掃描'smtpserver = 'smtp.exmail.qq.com'smtpuser = 'zhangyanlin8851@163.cn'smtppass = 'linuxidc163'mailcontent = ''for i in range(len(l)):mailcontent = mailcontent + l[i][1]tool.sendemail(sender, receiver, subject, mailcontent, smtpserver, smtpuser, smtppass)

?

總結

以上是生活随笔為你收集整理的python-nmap使用及案例的全部內容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。