# 用nmap掃描多台主機、虛擬機 ## 查找主機 ip :::info 搜尋cmd>ipconfig 會顯示以下: 乙太網路卡 VMware Network Adapter VMnet8: 連線特定 DNS 尾碼 . . . . . . . . 連結-本機 IPv6 位址 . . . . . . . IPv4 位址 . . . . . . . . . . . . ==要輸入的ip在這!!!== 若連不到>記得關防火牆 ![11212291](https://hackmd.io/_uploads/HkbX1KCDa.png) ::: ## 查找kali ip :::info terminal>ifconfig 會顯示以下: eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet ==要輸入的ip在這!!!== netmask 255.255.255.0 broadcast ... ::: ## 查找ubuntu ip :::info terminal>ifconfig 會顯示以下: ens33: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet ==要輸入的ip在這!!!== netmask 255.255.255.0 broadcast ... ::: ## 查找metasploitable ip(靶機) :::info login:msfadmin>password:msfadmin>ifconfig 會顯示以下: eth0: Link enap:Ethernet HWaddr... inet ==要輸入的ip在這!!!== broadcast ...netmask 255.255.255.0 ::: ## 掃描ip :::info 使用![image](https://hackmd.io/_uploads/BJJdbd0DT.png) ![image](https://hackmd.io/_uploads/rkMrMdADa.png) 直接在Target打上ip address(ipv4位址)按下scan 最後結果: ![1121229](https://hackmd.io/_uploads/H17LpgpP6.png) :::