# 用nmap掃描多台主機、虛擬機 ## 查找主機 ip :::info 搜尋cmd>ipconfig 會顯示以下: 乙太網路卡 VMware Network Adapter VMnet8: 連線特定 DNS 尾碼 . . . . . . . . 連結-本機 IPv6 位址 . . . . . . . IPv4 位址 . . . . . . . . . . . . ==要輸入的ip在這!!!== 若連不到>記得關防火牆  ::: ## 查找kali ip :::info terminal>ifconfig 會顯示以下: eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet ==要輸入的ip在這!!!== netmask 255.255.255.0 broadcast ... ::: ## 查找ubuntu ip :::info terminal>ifconfig 會顯示以下: ens33: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet ==要輸入的ip在這!!!== netmask 255.255.255.0 broadcast ... ::: ## 查找metasploitable ip(靶機) :::info login:msfadmin>password:msfadmin>ifconfig 會顯示以下: eth0: Link enap:Ethernet HWaddr... inet ==要輸入的ip在這!!!== broadcast ...netmask 255.255.255.0 ::: ## 掃描ip :::info 使用  直接在Target打上ip address(ipv4位址)按下scan 最後結果:  :::
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up