使用nmap开源的指纹进行端口服务识别,仅用于端口服务识别
scan server
Usage:
scan_server [flags]
Flags:
-h, --help help for scan_server
-p, --port strings Scan ports:1-50,88,8080
-s, --server Probe open ports to determine service/version info
-t, --target strings Scan targets:
127.0.0.1,192.168.0.1/24
--update update finger
-v, --version version for scan_server
Use "scan_server [command] --help" for more information about a command.
scan_server help
Update the fingerprint database of scan_server
scan_server --update
- 解析nmap指纹库
- 更新规则文件
- 端口服务识别
- 端口协议识别
- 主机存活发现
- https://www.cnblogs.com/zpchcbd/p/15221460.html
- https://mp.weixin.qq.com/s?__biz=MzU2NzcwNTY3Mg==&mid=2247484035&idx=1&sn=1919a40c7bac384de3ed38e6cb2b2e04&chksm=fc986ba4cbefe2b2443a2f1b3a61a690f0751e0157bf5d783ff4486c91bf45d1c0f54616f44f&token=325700386&lang=zh_CN#rd
- https://raw.githubusercontent.com/nmap/nmap/master/nmap-service-probes
- https://nmap.org/book/vscan-fileformat.html
- https://nmap.org/book/vscan.html
- https://www.cnblogs.com/liun1994/p/7041531.html
- https://www.cnblogs.com/liun1994/p/7041373.html
- https://www.cnblogs.com/liun1994/p/6986544.html
- https://colobu.com/2019/06/01/packet-capture-injection-and-analysis-gopacket/
- https://raw.githubusercontent.com/nmap/nmap/master/nmap-service-probes
- https://github.com/CTF-MissFeng/nmaps
- https://github.com/4dogs-cn/TXPortMap
- https://github.com/boy-hack/nmap-parser
- https://github.com/XinRoom/go-portScan
- https://github.com/tevino/tcp-shaker
- https://github.com/cloverstd/tcping
- https://github.com/lcvvvv/gonmap
- https://github.com/lcvvvv/gomasscan
- https://github.com/v-byte-cpu/sx
- https://github.com/XinRoom/go-portScan
Contributions, issues and feature requests are welcome.
Logo is designed by iconduck.com
This project is licensed under the MIT License. See the License file for the full license text.
I am not responsible for any damages. You are responsible for your own actions. Scanning or attacking targets without prior mutual consent can be illegal.