562 lines
6.6 KiB
Markdown
562 lines
6.6 KiB
Markdown
---
|
||
title: 系统安全扫描工具命令集合
|
||
description: Kali 所使用的系统安全扫描工具命令集合
|
||
date: 2025-08-07
|
||
img: https://lijue-me.oss-cn-chengdu.aliyuncs.com/20250806105029318.png
|
||
navigation:
|
||
icon: simple-icons:openstreetmap
|
||
---
|
||
|
||
## 完整命令参数指南 - 针对192.168.1.2
|
||
|
||
|
||
|
||
---
|
||
|
||
|
||
|
||
## 🔍 网络发现与端口扫描
|
||
|
||
|
||
|
||
### 基础端口扫描
|
||
|
||
```bash
|
||
|
||
# TCP端口快速扫描
|
||
|
||
nmap -sS -sV -p 1-1000 192.168.1.2
|
||
|
||
|
||
|
||
# 全端口TCP扫描
|
||
|
||
nmap -sS -sV -p- --script vuln 192.168.1.2
|
||
|
||
|
||
|
||
# UDP端口发现
|
||
|
||
nmap -sU -sV --top-ports 1000 192.168.1.2
|
||
|
||
|
||
|
||
# 综合扫描 (TCP+UDP+OS检测+脚本漏洞扫描)
|
||
|
||
nmap -sS -sU -sV -O -A --script discovery,default,vuln -p- 192.168.1.2 --host-timeout 300
|
||
|
||
```
|
||
|
||
|
||
|
||
### 服务版本检测
|
||
|
||
```bash
|
||
|
||
# 详细服务版本信息
|
||
|
||
nmap -sV -A 192.168.1.2 -p 22,80,111,139,443,445
|
||
|
||
|
||
|
||
# OS系统指纹识别
|
||
|
||
sudo nmap -O 192.168.1.2
|
||
|
||
```
|
||
|
||
|
||
|
||
---
|
||
|
||
|
||
|
||
## 🌐 Web应用安全测试
|
||
|
||
|
||
|
||
### 目录与文件发现
|
||
|
||
```bash
|
||
|
||
# 标准目录爆破 (默认字典)
|
||
|
||
dirb http://192.168.1.2 -o /tmp/dirb_scan.txt
|
||
|
||
|
||
|
||
# 使用GoBuster (更快字典)
|
||
|
||
timeout 30 gobuster dir -u http://192.168.1.2 \
|
||
|
||
-w /usr/share/wordlists/dirb/common.txt \
|
||
|
||
-q -o /tmp/gobuster.txt
|
||
|
||
|
||
|
||
# HTTPS目录扫描
|
||
|
||
gobuster dir -u https://192.168.1.2 \
|
||
|
||
-w /usr/share/wordlists/dirb/common.txt \
|
||
|
||
-k (-k参数忽略SSL证书错误)
|
||
|
||
```
|
||
|
||
|
||
|
||
### Web漏洞扫描
|
||
|
||
```bash
|
||
|
||
# Nikto综合漏洞扫描
|
||
|
||
nikto -h 192.168.1.2 -p 80,443 -output /tmp/nikto_http.txt
|
||
|
||
|
||
|
||
# SSL/TLS配置测试
|
||
|
||
sslyze 192.168.1.2:443 \
|
||
|
||
--certinfo \
|
||
|
||
--heartbleed \
|
||
|
||
--tlsv1 --tlsv1_1 --tlsv1_2 --tlsv1_3 \
|
||
|
||
> /tmp/ssl_analysis.txt
|
||
|
||
|
||
|
||
# 技术指纹识别
|
||
|
||
whatweb -v 192.168.1.2
|
||
|
||
```
|
||
|
||
|
||
|
||
### HTTP头部分析
|
||
|
||
```bash
|
||
|
||
# 获取HTTP头部
|
||
|
||
curl -s -I http://192.168.1.2
|
||
|
||
curl -s -I -k https://192.168.1.2
|
||
|
||
|
||
|
||
# 获取完整响应
|
||
|
||
curl -s -L http://192.168.1.2 | head -50
|
||
|
||
curl -s -L -k https://192.168.1.2 | head -50
|
||
|
||
```
|
||
|
||
|
||
|
||
---
|
||
|
||
|
||
|
||
## 🔐 SSH安全配置检查
|
||
|
||
|
||
|
||
### SSH信息收集
|
||
|
||
```bash
|
||
|
||
# SSH版本扫描
|
||
|
||
nmap -sC -p22 192.168.1.2 -oN /tmp/ssh_nmap.txt
|
||
|
||
|
||
|
||
# SSH连接测试
|
||
|
||
timeout 10 nc -zv 192.168.1.2 22
|
||
|
||
|
||
|
||
# SSH版本识别
|
||
|
||
curl -s telnet://192.168.1.2:22 | head -3
|
||
|
||
|
||
|
||
# 基础认证测试 (需要SSH-audit,如未安装)
|
||
|
||
# ssh-audit 192.168.1.2
|
||
|
||
```
|
||
|
||
|
||
|
||
---
|
||
|
||
|
||
|
||
## 📁 文件共享服务分析
|
||
|
||
|
||
|
||
### SMB/Samba评估
|
||
|
||
```bash
|
||
|
||
# 匿名共享发现
|
||
|
||
smbclient -L //192.168.1.2 -N
|
||
|
||
|
||
|
||
# 详细Samba信息收集
|
||
|
||
enum4linux -a 192.168.1.2 > /tmp/smb_enum.txt
|
||
|
||
|
||
|
||
# RPC服务探测
|
||
|
||
rpcclient -U "" -N -c srvinfo 192.168.1.2
|
||
|
||
|
||
|
||
# NBT协议信息
|
||
|
||
timeout 15 nbtscan -r 192.168.1.2 > /tmp/nbtscan_result.txt
|
||
|
||
```
|
||
|
||
|
||
|
||
### 共享访问测试
|
||
|
||
```bash
|
||
|
||
# 测试匿名访问 (失败表明安全配置正确)
|
||
|
||
smbclient -L //192.168.1.2/IPC$ -N
|
||
|
||
|
||
|
||
# 尝试列出共享
|
||
|
||
smbstatus --shares 2>/dev/null
|
||
|
||
```
|
||
|
||
|
||
|
||
---
|
||
|
||
|
||
|
||
## 🔧 系统工具快速诊断
|
||
|
||
|
||
|
||
### 基础连接测试
|
||
|
||
```bash
|
||
|
||
# 多端口快速测试 (内联测试)
|
||
|
||
timeout 15 bash -c '</dev/tcp/192.168.1.2/22 && echo "SSH开放"'
|
||
|
||
timeout 15 bash -c '</dev/tcp/192.168.1.2/80 && echo "HTTP开放"'
|
||
|
||
timeout 15 bash -c '</dev/tcp/192.168.1.2/443 && echo "HTTPS开放"'
|
||
|
||
|
||
|
||
# 批处理端口状态检查
|
||
|
||
for port in 22 80 111 139 443 445; do
|
||
|
||
nc -w 3 -z 192.168.1.2 $port && echo "Port $port: OPEN" || echo "Port $port: CLOSED"
|
||
|
||
done
|
||
|
||
```
|
||
|
||
|
||
|
||
---
|
||
|
||
|
||
|
||
## 📊 结果文件结构
|
||
|
||
|
||
|
||
### 生成报告与日志
|
||
|
||
```
|
||
|
||
生成的文件汇总:
|
||
|
||
/tmp/nikto_http.txt - Web漏洞扫描结果
|
||
|
||
/tmp/dirb_scan.txt - Web目录枚举结果
|
||
|
||
/tmp/gobuster.txt - 详细目录发现结果
|
||
|
||
/tmp/ssl_analysis.txt - SSL/TLS配置分析
|
||
|
||
/tmp/ssh_nmap.txt - SSH详细扫描结果
|
||
|
||
/tmp/smb_enum.txt - Samba/SMB枚举信息
|
||
|
||
/tmp/nbtscan_result.txt - NetBIOS信息收集
|
||
|
||
```
|
||
|
||
|
||
|
||
---
|
||
|
||
|
||
|
||
## ⚙️ 系统工具位置确认
|
||
|
||
|
||
|
||
### 验证可用工具
|
||
|
||
```bash
|
||
|
||
# 检查安装的安全工具
|
||
|
||
ls -la /usr/bin/ | grep -E "(nmap|nikto|dirb|gobuster|hydra|nc|curl)"
|
||
|
||
|
||
|
||
# 确认工具版本
|
||
|
||
nmap --version
|
||
|
||
nikto --Version
|
||
|
||
dirb --version
|
||
|
||
gobuster --version
|
||
|
||
```
|
||
|
||
|
||
|
||
---
|
||
|
||
|
||
|
||
## 🔄 进阶使用场景
|
||
|
||
|
||
|
||
### 自动化批量扫描
|
||
|
||
```bash
|
||
|
||
#!/bin/bash
|
||
|
||
# 批量扫描脚本示例
|
||
|
||
|
||
|
||
IP="192.168.1.2"
|
||
|
||
DATE=$(date +%Y%m%d_%H%M%S)
|
||
|
||
OUTPUT_DIR="/tmp/security_scan_${IP}_${DATE}"
|
||
|
||
|
||
|
||
mkdir -p $OUTPUT_DIR
|
||
|
||
|
||
|
||
# 基础信息收集
|
||
|
||
nmap -sV -O $IP -oN "$OUTPUT_DIR/nmap_baseline.txt"
|
||
|
||
|
||
|
||
# 详细漏洞扫描
|
||
|
||
nmap -sS -sU -sV --script vuln $IP -oN "$OUTPUT_DIR/nmap_vuln.txt"
|
||
|
||
|
||
|
||
# Web专项扫描
|
||
|
||
nikto -h http://$IP -output "$OUTPUT_DIR/nikto_http.txt"
|
||
|
||
|
||
|
||
# 目录爆破
|
||
|
||
gobuster dir -u http://$IP -w /usr/share/wordlists/dirb/common.txt \
|
||
|
||
-q -o "$OUTPUT_DIR/gobuster.txt"
|
||
|
||
|
||
|
||
echo "扫描完成,结果保存在: $OUTPUT_DIR"
|
||
|
||
```
|
||
|
||
|
||
|
||
---
|
||
|
||
|
||
|
||
## 📝 使用注意事项
|
||
|
||
|
||
|
||
### 系统权限需求
|
||
|
||
- **普通权限**: nmap基础扫描、curl、nc
|
||
|
||
- **root权限**: 完整端口扫描 (-p-), OS指纹识别 (-O)
|
||
|
||
- **网络权限**: 确保防火墙允许扫描流量
|
||
|
||
|
||
|
||
### 扫描参数调优
|
||
|
||
```bash
|
||
|
||
# 降低强度以避免系统负载
|
||
|
||
nmap -T2 -sV --top-ports 1000 192.168.1.2
|
||
|
||
|
||
|
||
# 高并发快速扫描
|
||
|
||
nmap -T4 --min-rate 1000 --max-retries 2 192.168.1.2
|
||
|
||
|
||
|
||
# 精确版本检测
|
||
|
||
nmap -sV --version-intensity 9 192.168.1.2
|
||
|
||
```
|
||
|
||
|
||
|
||
### 防火墙逃逸技巧
|
||
|
||
```bash
|
||
|
||
# 使用不同扫描技术
|
||
|
||
nmap -sS -sF -sX --host-timeout 300 192.168.1.2
|
||
|
||
```
|
||
|
||
|
||
|
||
---
|
||
|
||
|
||
|
||
## 🎯 特定场景组合命令
|
||
|
||
|
||
|
||
### 快速安全检查
|
||
|
||
```bash
|
||
|
||
# 5分钟快速评估
|
||
|
||
nmap -sS -sV -A --top-ports 1000 192.168.1.2 && \
|
||
|
||
dirb http://192.168.1.2 -o /tmp/quick_web.txt && \
|
||
|
||
nikto -h 192.168.1.2 -output /tmp/quick_nikto.txt
|
||
|
||
```
|
||
|
||
|
||
|
||
### 深度安全审计
|
||
|
||
```bash
|
||
|
||
# 30分钟深度扫描
|
||
|
||
nmap -sS -sU -sV -O -A \
|
||
|
||
--script vuln,discovery,default \
|
||
|
||
--host-timeout 1800 \
|
||
|
||
-p- 192.168.1.2
|
||
|
||
|
||
|
||
# 同时进行多工具并行扫描
|
||
|
||
{
|
||
|
||
nikto -h 192.168.1.2 -output /tmp/full_nikto.txt &
|
||
|
||
dirb http://192.168.1.2 -o /tmp/full_dirb.txt &
|
||
|
||
enum4linux -a 192.168.1.2 > /tmp/full_smb.txt &
|
||
|
||
wait
|
||
|
||
}
|
||
|
||
```
|
||
|
||
|
||
|
||
---
|
||
|
||
|
||
|
||
## 📋 命令速查表
|
||
|
||
|
||
|
||
| 工具 | 核心命令 | 用途 |
|
||
|
||
|------|----------|------|
|
||
|
||
| nmap | `nmap -sS -sV 192.168.1.2` | 基础端口与服务发现 |
|
||
|
||
| dirb | `dirb http://192.168.1.2` | Web目录枚举 |
|
||
|
||
| nikto | `nikto -h 192.168.1.2` | Web漏洞扫描 |
|
||
|
||
| gobuster | `gobuster dir -u http://192.168.1.2 -w [字典]` | 快速目录发现 |
|
||
|
||
| smbclient | `smbclient -L //192.168.1.2 -N` | SMB共享发现 |
|
||
|
||
| sslyze | `sslyze 192.168.1.2:443` | SSL/TLS配置分析 |
|
||
|
||
| enum4linux | `enum4linux -a 192.168.1.2` | Windows信息枚举 |
|
||
|
||
|
||
|
||
---
|
||
|
||
|
||
|
||
**使用提示**: 建议在测试环境中先验证这些命令的影响,然后应用到生产环境监控系统。 |