32 примера команды nmap

Как сканировать компьютеры и устройства в вашей сети

Запустите Zenmap, используя его ярлык в меню «Пуск» (в Windows 7) или на экране « Пуск» (в Windows 8).

Включите компьютеры и устройства, которые вы хотите оценить, и убедитесь, что они подключены к сети. Затем в окне Zenmap найдите поле Target . Введите IP-адрес компьютера или устройств, которые вы хотите сканировать. Вы также можете использовать имя компьютера, если вы его знаете, и это более удобно.

В поле Профиль выберите тип сканирования, которое вы хотите выполнить. Как правило, интенсивное сканирование обеспечивает хороший обзор, и оно заканчивается относительно быстро.

Затем нажмите кнопку « Сканировать» , и отобразится приглашение UAC. Подтвердите, что вы хотите продолжить сканирование и подождите. На вкладке Nmap Output вы увидите, что происходит много активности. Когда сканирование закончится, последняя строка на этой вкладке будет говорить «Nmap done» .

Теперь вы можете прочитать всю информацию, отображаемую на вкладке Nmap Output, и проверить другие доступные вкладки.

На вкладке Ports / Hosts перечислены все открытые порты.

На вкладке Топология представлен общий обзор того, как сканируемый компьютер / устройство располагается в сети относительно компьютера, с которого вы провели сканирование.

Вкладка Host Details предоставляет визуальный обзор выводов Nmap. Это быстро станет вашей любимой вкладкой, поскольку она делится всем в очень удобном для восприятия формате.

На вкладке « Сканирования » отображается только история сканирований, выполненных с помощью Zenmap.

Справа, рядом с кнопкой Хосты , которая включена по умолчанию, у вас есть кнопка Сервисы . Нажмите на него, и Zenmap отфильтрует всю информацию, отображаемую на его вкладках, для каждой сетевой услуги.

Вы можете использовать результаты сканирования, чтобы усилить защиту брандмауэра на ваших компьютерах и устройствах в сети. Затем вы можете выполнить другие сканирования и использовать Zenmap для сравнения результатов.

Zenmap хранит полную историю ваших сканирований, и сравнения легко выполнить, используя меню Инструменты .

Downloading Nmap

Nmap and Zenmap (the graphical front end) are available in
several versions and formats. Recent source releases and binary
packages are described below. Older version (and sometimes newer test
releases) are available from the dist directory
(and really old ones are in dist-old).
For the more
security-paranoid (smart) users, GPG detached signatures and SHA-1
hashes for each release are available in the sigs
directory (). Before downloading, be sure to read the relevant sections for your platform from the Nmap Install Guide. The most
important changes (features, bugfixes, etc) in each Nmap version are
described in the Changelog. Using Nmap is covered in the Reference Guide, and don’t forget to read
the other available documentation, particularly the new book Nmap Network Scanning!

You can also get updates from our and pages.

Nmap is distributed with source code under custom license terms similar to (and derived from) the GNU
General Public License, as noted in the copyright page.

Возможности nmap и примеры сканирования

Синтаксис Network Mapper

nmap   {Целевая спецификация}

В качестве целевой спецификации может быть имя хоста, IP-адрес, сеть и т.п.

Список параметров можно получить написав в терминале команду nmap.

Как вы знаете, роутеры сами раздают IP-адреса в диапазоне 192.168.0(1).0 – 192.168.0(1).255, это функция DHCP.

Для сканирования всего радиуса нам необходимо написать команду:

nmap -sL 192.168.1.1/24

-sL – параметр, запускает сканирование списка

24 в IP-адресе – это 24-битная подсетка, которая имеет нужный нам радиус в 256 символов. То есть сканирование пройдёт от 10.0.0.0 – 10.0.0.255.

Для сканирования подключенных устройств мы использует параметр -sn, в таком случае -sL нам не требуется.

nmap -sn 192.168.1.1/24

Как вы можете увидеть, в моей сети из было просканировано 256 хостов и 3 из них используются

Важно, что 192.168.0.1 – это роутер. Далее идёт мой телефон и ПК

Теперь давайте просканируем устройства на наличие открытых портов следующей командой:

nmap -Pn {цель}

Мой компьютер не имеет открытых портов, что хорошо для меня и плохо для злоумышленника, так как он не сможет провести атаку.

Однако просканировав роутер, мы видим, что 2 порта открыто, 80 и 1900.

Также можно просканировать и все 256 хостов, однако это займет намного больше времени.

Узнаем версию ОС нашего ПК и роутера. Сканирование на операционную систему требует root привелегий и наличия открытых портов. В случае если порты закрыты, конкретного результата не будет и об этом будет предупреждение. С роутером проблем не возникло и все вывелось корректно, также мы видим MAC-адрес роутера.

nmap -O {цель}

Other Insecure.Org Documentation

Installation is made easy by the detailed Nmap Installation Guide. This covers topics such as UNIX compilation and configure directives and Installing Nmap on Linux,
Windows,
Mac OS X,
Free/Open/NetBSD,
Solaris,
Amiga, and HP-UX. It also covers Nmap removal in case you change your mind.

One of Nmap’s most exciting new features is the Nmap Scripting
Engine, which extends Nmap’s functionality using the simple and
efficient Lua programming language.
Nmap includes about 50
valuable scripts for network discovery and vulnerability detection,
and you can also write your own. We describe the system in depth
(from simple usage instructions to writing your own scripts) in our NSE guide. We also have an NSE Documentation Portal which includes detailed documentation for every NSE script and library.

Fyodor regularly gives conference presentations covering advanced Nmap usage and new features. Audio, video, and/or slides for many of these are available on his presentations page.

Interested in how nmap uses TCP/IP fingerprinting for remote OS
detection? We have written a detailed article on the 2nd Generation Nmap OS Detection System. We also have an old article about the 1st generation system, which people have generously translated into French,
Portuguese,
Italian,
Russian,
Spanish,
German,
Japanese,
Chinese,
Traditional Chinese (Big5),
Turkish,
Hebrew,
Indonesian,
Dutch.
Polish, and
Swedish.

Nmap Version Detection: Instead of using a simple
nmap-services table lookup to determine a port’s likely purpose, Nmap
will (if asked) interrogate that TCP or UDP port to determine what
service is really listening. In many cases it can determine the
application name and version number as well. Obstacles like SSL
encryption and Sun RPC are no threat, as Nmap can connect using
OpenSSL (if available) as well as utilizing Nmap’s RPC
bruteforcer. IPv6 is also supported. Learn all about this great
feature in our Version Detection Paper

Nmap now has an official cross-platform GUI named Zenmap. It is included in most of the packages on
the Nmap download page. It is documented in the Zenmap User’s Guide. More information is
available from the Zenmap site and Zenmap man page.

One of the coolest, yet still relatively obscure features of Nmap
is the IPID Idle scan (-sI). Not only does this allow for a
completely blind portscan (no packets sent to the target from your
real IP), but it can even allow you to bypass packet filters in
certain circumstances. We wrote a Idle
scanning paper describing this technique as well as several other
exploits based on predictable IPID sequence numbers. It includes
real-life examples as well as a section on defending yourself from
these techniques.

The most important changes (features,
bugfixes, etc) in each Nmap version are described in its ChangeLog.

While it is now only of historical interest, Nmap was first released in a September 1, 1997 Phrack 51 Article titled The Art of Port Scanning

Snowden

Oliver Stone’s 2016 Snowden film (Wikipedia, IMDB, Amazon) dramatizes Edward Snowden’s massive leak of classified documents revealing NSA widespread surveillance of U.S. citizens. In one early scene, Snowden is given a network security challenge at a CIA training class which is expected to take 5 to 8 hours. But with the help Nmap and a custom Nmap NSE script named ptest.nse, Snowden stuns the professor by completing everything in 38 minutes! Nmap’s distinct tabular output is visible on other students’ screens too, though we may have to wait for the 4K resolution film release to read the exact text. Here are a couple screen shots from the Nmap scenes:

And here is the whole trailer (with Nmap glimpse at 34 seconds in):

Congratulations to Prabesh Thapa from Nepal for being first to discover and report the Nmap scenes!

About Nmap

Nmap («Network Mapper») is a free and open source
(license) utility for
network exploration or security auditing. Many systems and network
administrators also find it useful for tasks such as network
inventory, managing service upgrade schedules, and monitoring host or
service uptime. Nmap uses raw IP packets in novel ways to determine
what hosts are available on the network, what services (application
name and version) those hosts are offering, what operating systems
(and OS versions) they are running, what type of packet
filters/firewalls are in use, and dozens of other characteristics. It
was designed to rapidly scan large networks, but works fine against
single hosts. Nmap runs on all major computer operating systems, and
official binary packages are available for Linux, Windows, and Mac OS
X. In addition to the classic command-line Nmap executable, the Nmap
suite includes an advanced GUI and results viewer
(Zenmap), a flexible data
transfer, redirection, and debugging tool
(Ncat), and a utility for
comparing scan results (Ndiff).

Nmap was named “Security Product of the Year” by Linux
Journal, Info World, LinuxQuestions.Org, and Codetalker Digest. It
was even featured in eight
movies, including
,
, and
.

As free software, we don’t have any sort of advertising budget. So please spread the word that Nmap 5.00 is now available!

Reviews

Reviews are posted here as they come in. Please let me know if you post a review to your blog or anywhere else.

  • If you are looking for the book on Nmap, the search is over: NNS is a winner”—Richard Bejtlich’s detailed review. NNS also made Bejtlich’s Top Books of 2008 list.

  • This is the ultimate Nmap reference guide” on “Nmap, the legendary network scanner”—Ben Rothke’s Slashdot review.

  • Released for sale on Amazon on December 6th and already number 1 best seller in the Computer books category, this is the MUST-HAVE book on network scanning.”—David Heath’s review for ITWire.

  • This is the most revealing technical book I’ve ever read about a security tool. Fyodor turns Nmap inside out to explain what it does, how it does it and why it was written that way. If you are looking for a definitive book on Nmap, this is it.”—Ethan Ten’s 5-star Amazon UK review.

  • Some light reading”—Metasploit author HD Moore.

  • Nmap Network Scanning “is required reading for anyone securing a network” and “should be front and center on your desk for months and years to come”—Wireshark University founder Laura Chappell’s glowing review.

  • NNS is “a must-have book to get the most out of NMAP”, filled with examples and analysis that are “like looking over an expert’s shoulder”—Mike Fratto’s glowing and informative Information Week review.

  • I am amazed that after all these years I still learn stuff about nmap. The book is good and you should buy it!”—David Maynor

  • NNS will “quickly become required reading for network engineers, system administrators, and anyone working in the computer security arena….I have been using nmap for nearly a decade and there were still some great tips and tricks that I found for the first time in these pages.”—Eddie Block’s 5-star Amazon review.

  • Nmap is simply a required
    tool in the IT toolbox. Similarly, this book is required reading for
    anyone in IT to get the most out of that tool.
    ”—About.com network security expert Tony Bradley’s detailed 5-star review.

  • The book goes into the detail you would expect with the sort of information that true afficianadoes lust after” while being “easy and fun to read with great examples along the way”—David Pybus’s 5-star Amazon UK review.

  • I would recommend this as a must-have book for any network or security professional, as well as anyone wanting to learn more about TCP/IP”—JP Bourget’s very detailed Ethical Hacker Network review.

  • Fyodor does an outstanding job covering everything from the most basic use of nmap, through advanced topics, such as evading detection”—Jon R. Kibler’s enthusiastic review on the pen-test list.

  • Fyodor’s absolute, incredibly definitive guide on
    Nmap will imbue you with rock-solid scanning
    stratagems
    ”—Josef
    Chamberlin’s 5-star
    Amazon review.

  • NNS is “The wealth of information contained in this book will have even hardcore nmap experts learning a thing or two about the preeminent network scanner.”—Brad Berkemier’s review, which also calls NNS “engaging and informative” and “the ultimate nmap guide”.

  • Nmap Network Scanning is a masterpiece that teaches the reader the Art of Network Mapping and Scanning … one of the best books I’ve read in years.”—Raul Siles’ review.

  • Foreign Coverage: Barrapunto (Spanish), Tecnozona (Spanish), Binary Zone (Arabic)

Npcap OEM for Commercial Use and Redistribution

We fund the Npcap project by selling Npcap OEM. This special version of Npcap includes enterprise features such as the silent installer and commercial support as well as special license rights allowing customers to redistribute Npcap with their products or to install it on more systems within their organization with easy enterprise deployment. The Npcap free license only allows five installs (with a few exceptions) and does not allow for any redistribution. We offer two commercial license types:

Npcap OEM Redistribution License: The redistribution license is for companies that wish to distribute Npcap OEM within their products (the free Npcap edition does not allow this). Licensees generally use the Npcap OEM silent installer, ensuring a seamless experience for end users. Licensees may choose between a perpetual unlimited license or an annual term license, along with options for commercial support and updates.

Npcap OEM Internal-Use License: The corporate internal license is for organizations that wish to use Npcap OEM internally, without redistribution outside their organization. This allows them to bypass the 5-system usage cap of the Npcap free edition. It includes commercial support and update options, and provides the extra Npcap OEM features such as the silent installer for enterprise-wide deployment.

Purchase Process (Redistribution License)

While we hope to set up an online order form for immediate purchase, we currently have a more manual process. To buy an Nmap OEM license, you or your preferred reseller should send a message to sales@nmap.com with the following information:

  1. Your company name, if it isn’t obvious from your email address or email signature. We need the end user company name if you are a reseller.
  2. Which license you want. This depends on your current company size as and would be either the Nmap OEM Enterprise Redistribution License, Nmap OEM Mid-Sized Company Redistribution License, Nmap OEM Small/Startup Company Redistribution License, or the Nmap OEM Micro-Corp Redistribution License.
  3. If this is the Enterprise Redistribution License , the license covers a named product line or category (which can be fairly broad). Please include the product line name or category that you are interested in shipping with Nmap OEM. This is not needed for the smaller company licenses since those companies usually have fewer products.
  4. Do you want the perpetual license or the annual term license? Annual renewal of the term license is required every year until you cease redistributing Nmap OEM and notify us of license termination.
  5. If it’s a perpetual license, do you want 5 years of updates and support (with the 20% prepayment discount), 1 year of maintenance (with possible renewals later), or no maintenance at all? The annual term license always includes maintenance as part of the annual fee.

Once we receive your request, we will send a contract draft and formal quote with instructions for payment by wire transfer, ACH direct deposit, check, or Paypal. You can pay that directly or begin your company’s procurement process for vendor onboarding, purchase order request, etc.

As soon as a contract is signed, we will activate your license and send you the following:

  • Account credentials for you and your team to download current and (if you purchased updates) future Nmap OEM and Npcap releases. We send these to everyone, but they are only needed if you will be shipping Nmap on the Windows OS.
  • Contacts for submitting support requests (assuming you purchased support). Support includes bug reports as well as any technical questions you might have about Nmap.

Justice League: Doom

Nmap is used in the opening credits of
Justice League: Doom (Wikipedia, IMDB, Amazon). This 2012 animated superhero film features Batman, Superman, Wonder Woman, and Green Lantern battling a team of supervillains. Thanks to Spencer Davenport for catching this and sending screenshots. It is interesting that in most cases (but not all), they changed the Nmap URL (http://nmap.org) in the Nmap output to http://we.inc (Wayne Enterprises). Also, they ran the command in August 2011 using a version of Nmap (4.20) from 2006. I realize that Batman has a lot of important and heroic work to do, but surely he can spare 5 minutes to download and install the latest version of Nmap!

Ocean’s 8

Ocean’s 8 (Wikipedia, IMDB, Amazon) is a 2018 comedy heist film starring Sandra Bullock, Rihanna, Cate Blanchett, and Anne Hathaway that continues the series started by Ocean’s Eleven in 2001. Rihanna plays the film’s main hacker, Nine Ball. She uses Nmap in many scenes to compromise people and companies responsible for guarding the $150 million diamond necklace they want to steal. Nmap is normally shown in the background as context to her hacks rather than taking the leading role.

In this screen (full version), Nmap is shown in the two screens on the right while they are 3D-scanning their target necklace on the left:

And here is the whole gang gathered together to (presumably) analyze their Nmap results (image is from here):

Even the movie trailer has a glimpse of Nmap at 1:50:

For more details on the Ocean’s 8 hacking scenes themselves, see security researcher Samy Kamkar’s analysis.

Congratulations to Alejandro Hernandez for being first to discover and report the Nmap scenes!

Scanning TCP/UDP ports with Nmap on windows

One of the best usages of Nmap is to scan ports on the network. By default, there are 1000 ports that Nmap can automatically scan, and you can change that port range according to your scan requirements.

Scanning all ports

In Nmap, we can specify the port range by using the “-p” option. The maximum or highest port number is 65535. If we want to scan all TCP ports, then we can use -p0-65535 option.

nmap -p- 127.0.0.1

Scanning specific TCP ports with range

In Nmap, we can specify the port range by using the “-p” option. The maximum or highest port number is 65535. If we want to scan all TCP ports, then we can use -p1-10 option.

nmap -p1-500 127.0.0.1

Faster Scan option

If you want your scan to finish fast, then you can use the fast scan option. The regular scan will consume a lot of time, whereas a fast scan option will do it in less time. Use this option if your situation is not critical. You can use -T5 parameter for the quickest level scan of Nmap.

nmap -p- -T5 127.0.0.1

Scanning TCP ports without a range

There is another way of scanning TCP port without specifying the range of ports. It will scan for the common 1000 ports.

nmap 127.0.0.1

Scanning UDP ports with range

In Nmap when you scan ports, TCP is scanned per default. In order to scan UDP ports, you have to specify the UDP scan in the statement. You can use -sU for scanning UDP ports.

nmap -sU -p 1-500 127.0.0.1

Scanning all UDP ports

Scanning UDP without range is similar to scanning TCP without range. You use the same -p- option to scan UDP ports without specifying a range.

nmap -sU -p – -T5 127.0.0.1

Scanning TCP/UDP at once within a specific range

You can also scan both TCP/UDP by using a single statement. You have to use -sU for UDP ports and TCP ports ‘; you’ll use the -sT option.

nmap -sT -sU -p 1-500 127.0.0.1

Khottabych

Nmap (and then telnet) are used by a teenage hacker (Gena) to deface Microsoft.Com in the 2006 Russian film Khottabych
(Wikipedia, IMDB). Microsoft and the US authorities are understandably upset by the attack, so they send the attractive female hacker Annie to flush him out. The movie also features an epic battle between powerful genies (the kind which come in a bottle) fighting for dominion over Earth. Thanks to Paul Shatov for notifying us and sending the screenshots! I bought this DVD from Amazon, but it is region 5 and offers no English dubbing or subtitles. I had to use this subtitle file. Wikipedia claims that a region 1 English DVD was released.

Licensing Nmap OEM

To keep things simple our standard Nmap license involves no per-seat royalties—just a reasonable one-time license buy-out fee and an optional annual maintenance fee which includes all new Nmap releases as well as commercial support. That maintenance fee never increases as long as you renew it every year. We also offer a term license which includes redistribution rights and maintenance for an annual fee which must be renewed for as long as you are selling new products containing Nmap. The annual term license fee never increases either.

Prices are in U.S. Dollars (USD) based on the size of company buying the license, broken into four tiers. This is because larger companies are usually able to derive more value from Nmap OEM by leveraging it at a greater scale. Larger companies generally cost us more to support as well. Prices are based on the whole company size, not just an individual division or development team. The prices are locked in after purchase so they don’t increase as companies grow later.

  • Our Nmap OEM Enterprise Redistribution License is for our largest customers. The perpetual license to use Nmap OEM in a product line or category (which can be fairly broad) costs $57,900, plus an optional annual maintenance fee of $17,370. Or you can prepay 5 years of maintenance for $69,480 (a 20% discount) so you’re covered until 2025! The annual term license option (which includes maintenance) costs $31,845/year.

  • Our Nmap OEM Mid-Sized Company Redistribution License provides a discount for mid-sized customers. The perpetual license to use Nmap OEM in all company products costs $47,900, plus an optional annual maintenance fee of $14,370. Or you can prepay 5 years of maintenance for $57,480 (a 20% discount) so you’re covered until 2025. The annual term license option (which includes maintenance) costs $26,345/year. To qualify for this license, a company must meet all of these criteria:

    1. 500 or fewer employees
    2. Revenue (not profit) less than US$200 million in most recent fiscal year
    3. If publicly traded, market capitalization must be less than $1 billion
  • Our Nmap OEM Small/Startup Company Redistribution License covers all but the smallest of our customers. The perpetual license to use Nmap OEM in all company products costs US$37,900, plus an optional annual maintenance fee of $11,850. Or you can prepay 5 years of maintenance for $47,400 (a 20% discount) so you’re covered until 2025! The annual term license option (which includes maintenance) costs $21,325/year. To qualify for this license, a company must have 50 or fewer employees and no more than US$15 million revenue in the most recent fiscal year.

  • Finally our Nmap OEM Micro-Corp Redistribution License is for fledgling companies which may still be a sole proprietorship or even just an idea in someone’s head. The perpetual license to use Nmap OEM in all company products costs US$29,500, plus an optional annual maintenance fee of $8,850. Or you can prepay 5 years of maintenance for $35,400 (a 20% discount). The annual term license option (which includes maintenance) costs $16,225/year. To qualify for this license, a company must have 5 or fewer employees and no more than US$1 million revenue in the most recent fiscal year.

All contracts include a six month trial period during which you can cancel for any reason and receive a full refund of all money paid. We also provide the standard version of Nmap that you can fully test internally before purchase.

The rights Nmap OEM customers enjoy are spelled out in a contract signed by both parties. It includes support, indemnification, warranty, updates, etc. The perpetual license contract template is available in PDF format and also as an editable MS Word document.

Dredd

Dredd (Wikipedia, IMDB, Amazon), a film adaptation of the famous Judge Dredd comics, was released in 2012 and contains multiple Nmap scenes.

In the vast, post-apocalyptic metropolis of Mega City One, the only law is provided by the Judges of the Hall of Justice—cops with the power of judge, jury and executioner. Most feared among these law-keepers is the ruthless and implacable Judge Dredd (Karl Urban). He and Cadet Judge Cassandra Anderson (Olivia Thirlby) infiltrate a notorious high-rise slum tower controlled by former prostitute-turned-drug-lord Ma-Ma (Lena Headey). For network reconnaissance and exploitation of the slum tower network, they turn to Nmap! The three minute movie trailer briefly shows an Nmap version scan against TCP port 22 (SSH):

Here is the trailer:

https://youtube.com/watch?v=PifvRiHVSCY

Congratulations to Aleksei Usov for being first to discover and report the Nmap scenes!

Nmap In The Movies

For reasons unknown, Hollywood has decided that Nmap is the
tool to show whenever hacking scenes are needed. At least it is a lot
more realistic than silly 3D animation approach used in many previous
movies (e.g. «hacking the Gibson» on Hackers, or the much worse
portrayals on Swordfish). We always like to see Nmap in the movies,
so we have catalogued known instances here.

Update (April 21, 2020): I (Fyodor) am way behind on adding new movies. Sorry about that! You are still welcome and encouraged to submit movies as described above as long as you understand that the prize may have already been awarded to an earlier submitter for movies that aren’t yet on this page. I’ll remove this update once I’m caught up. Cheers!

This page only covers movies, we have a separate page coving news articles, reviews, books, and popular culture references.

Как сканировать IPv6 адреса в nmap

Чтобы сканировать открытые порты на IPv6 адресах необходимо соблюдение ряда условий:

  • удалённых хост должен иметь IPv6 адрес
  • ваш провайдер Интернет-услуг также должен иметь поддержку IPv6 и вашему устройству должен быть присвоен IPv6 адрес
  • если устройство, с которого выполняется сканирование, не напрямую подключено к роутеру, то эта сеть также должна поддерживать IPv6. Например, Интернет-провайдер, ваш роутер и ваш компьютер поддерживают IPv6 — следовательно, вы можете сканировать эту версию адресов. Но если вы с этого же компьютера попытаетесь выполнить сканирование, например, из виртуальной машины за NAT, которая подключена к сети 10.*.*.*, то сканирование завершиться неудачей из-за ошибки вида:

Если все условия соблюдены, то к команде сканирования nmap нужно добавить опцию -6 и в качестве цели указать:

  • полный IPv6 адрес
  • имя хоста (если к нему привязан IPv6)
  • для подсетей можно использовать нотацию CIDR

В настоящее время диапазоны октетов для IPv6 ещё не поддерживаются.

Даже если в качестве цели явно указан IPv6 адрес, опцию -6 нужно обязательно указывать, иначе возникнет ошибка вида:

Все опции и возможности nmap поддерживаются также и для IPv6 адресов.

Если вам нужно просканировать порты на IPv6 адресе, но отсутствует такая техническая возможность, то вы можете воспользоваться онлайн сервисом «» (бесплатный, не требует регистрации).

Пример сканирования IPv6 адреса в Nmap:

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *

Adblock
detector