Ressources informatiques

Ressources informatiques

Ressources informatiques


nmap

Scan des ports TCP

adminX@routeurX:~$ sudo nmap 192.168.56.168
Starting Nmap 7.93 ( https://nmap.org ) at 2025-08-31 11:31 CEST
Nmap scan report for 192.168.56.168
Host is up (0.00065s latency).
Not shown: 998 closed tcp ports (reset)
PORT     STATE SERVICE
22/tcp   open  ssh
3000/tcp open  ppp
MAC Address: 08:00:27:AA:AA:AA (Oracle VirtualBox virtual NIC)

Nmap done: 1 IP address (1 host up) scanned in 0.33 seconds

Cette commande effectue un scan des 1000 ports les plus courants sur une machine. La liste des ports ouverts associé la fréquence à laquelle ce port apparaît dans des scans sur Internet. Cette liste est maintenu dans le fichier/usr/share/nmap/nmap-services

adminX@routeurX:~$ grep -E '(^ssh[[:space:]]+22/tcp)|(^https[[:space:]]+443/tcp)' /usr/share/nmap/nmap-services
ssh     22/tcp  0.182286        # Secure Shell Login
https   443/tcp 0.208669        # secure http (SSL)

On constate que la fréquence d'utilisation de ssh sur Internet est de 18%

Scan sur tout le réseau des ports TCP

adminX@routeurX:~$ sudo nmap 192.168.56.0/24
Nmap scan report for broker (192.168.56.41)
PORT     STATE SERVICE
22/tcp   open  ssh
9001/tcp open  tor-orport

Nmap scan report for 192.168.56.61
PORT     STATE SERVICE
22/tcp   open  ssh
443/tcp  open  https
3306/tcp open  mysql

Nmap scan report for 192.168.56.168
PORT     STATE SERVICE
22/tcp   open  ssh
3000/tcp open  ppp

Nmap scan report for 192.168.56.11
PORT   STATE SERVICE
22/tcp open  ssh
53/tcp open  domain

Scan de ports spécifiques

Scan de ports spécifiques TCP

adminX@routeurX:~$ nmap -sT -p 22,80,443 192.168.56.61
PORT    STATE  SERVICE
22/tcp  open   ssh
80/tcp  closed http
443/tcp open   https

Scan furtif (connexion semi-ouverte) de ports spécifiques TCP

adminX@routeurX:~$ sudo nmap -sS -p 22,80,443 192.168.56.61
PORT    STATE  SERVICE
22/tcp  open   ssh
80/tcp  closed http
443/tcp open   https

Scan de ports spécifiques UDP

adminX@routeurX:~$ nmap -sU -p 53,5353 192.168.56.11
You requested a scan type which requires root privileges.
adminX@routeurX:~$ sudo nmap -sU -p 53,5353 192.168.56.11
PORT     STATE  SERVICE
53/udp   open   domain
5353/udp closed zeroconf

Scan les 65535 ports UDP et TCP

adminX@routeurX:~$ sudo nmap -sUT -p- 192.168.56.11
Not shown: 65533 closed tcp ports (conn-refused), 65532 closed udp ports (port-unreach)
PORT   STATE         SERVICE
22/tcp open          ssh
53/tcp open          domain
53/udp open          domain
67/udp open|filtered dhcps
68/udp open|filtered dhcpc

Détection de hôtes du réseau

Découverte des hôtes actifs sur un réseau (Ping sweep)

adminX@routeurX:~$ adminX@broker:~$ nmap -sn 192.168.56.0/24
Starting Nmap 7.93 ( https://nmap.org ) at 2025-08-31 14:25 CEST
Nmap scan report for 192.168.56.11
Host is up (0.0059s latency).
Nmap scan report for 192.168.56.21
Host is up (0.0012s latency).
Nmap scan report for 192.168.56.41
Host is up (0.0051s latency).
Nmap scan report for 192.168.56.61
Host is up (0.0030s latency).
Nmap scan report for 192.168.56.168
Host is up (0.0018s latency).
Nmap done: 256 IP addresses (5 hosts up) scanned in 3.22 seconds

Détection de services

Identifier les services et leurs versions.

adminX@routeurX:~$ sudo nmap -sV 192.168.56.168
PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 9.2p1 Debian 2+deb12u2 (protocol 2.0)
3000/tcp open  ppp?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port3000-TCP:V=7.93%I=7%D=8/31%Time=68B433C1%P=x86_64-pc-linux-gnu%r(Ge
SF:nericLines,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20t
SF:ext/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x
SF:20Request")%r(GetRequest,118,"HTTP/1\.0\x20302\x20Found\r\nCache-Contro
SF:l:\x20no-store\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nLocat
SF:ion:\x20/login\r\nX-Content-Type-Options:\x20nosniff\r\nX-Frame-Options
SF::\x20deny\r\nX-Xss-Protection:\x201;\x20mode=block\r\nDate:\x20Sun,\x20
SF:31\x20Aug\x202025\x2011:36:33\x20GMT\r\nContent-Length:\x2029\r\n\r\nFound\
...

Détection du système d’exploitation

Tente d’identifier l’OS de la cible.

adminX@routeurX:~$ sudo nmap -O 192.168.56.11
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6.32
OS details: Linux 2.6.32
adminX@broker:~$ sudo nmap -O 192.168.1.44
...
Aggressive OS guesses: Microsoft Windows 10 (92%), Microsoft Windows 10 1511 - 1607 (88%), Microsoft Windows Server 2008 SP1 (88%), Microsoft Windows Vista SP0 or SP1, Windows Server 2008 SP1, or Windows 7 (87%), Microsoft Windows Server 2016 (86%), Microsoft Windows 7 Professional or Windows 8 (86%), FreeBSD 6.2-RELEASE (85%), Microsoft Windows 10 1703 (85%), Microsoft Windows Phone 7.5 or 8.0 (85%)
No exact OS matches for host (test conditions non-ideal).
OS detection performed.

Sauvegarder les résultats

adminX@broker:~$ sudo nmap -p- -sS -sV -O 192.168.56.168 -oN scan_all_ports.text