如何测试端⼝通不通(四种⽅法)
⼀般情况下使⽤"telnet ip port"判断端⼝通不通,其实测试⽅法不⽌这⼀种,还有很多种⽅法,下⾯⼩编给⼤家分享了⼏种⽅法,具体内容请往下看:
准备环境
启动⼀个web服务器,提供端⼝.
[wyq@localhost ~]$ python -m SimpleHTTPServer 8080
Serving HTTP on 0.0.0.0 port 8080 ...
⽤其它web服务器提供端⼝也⼀样,由于python⽐较⽅便,这⾥就⽤它
1、使⽤telnet判断
telnet是windows标准服务,可以直接⽤;如果是linux机器,需要安装telnet.
⽤法: telnet ip port
1)先⽤telnet连接不存在的端⼝
[root@localhost ~]# telnet 10.0.250.3 80
Trying 10.0.
telnet: connect to address 10.0.250.3: Connection refused #直接提⽰连接被拒绝
2)再连接存在的端⼝
[root@localhost ~]# telnet localhost 22
Trying ::1...
Connected to localhost. #看到Connected就连接成功了
Escape character is '^]'.
SSH-2.0-OpenSSH_5.3
a
Protocol mismatch.
Connection closed by foreign host.
2、使⽤ssh判断
ssh是linux的标准配置并且最常⽤,可以⽤来判断端⼝吗?
⽤法: ssh -v -p port username@ip
-v 调试模式(会打印⽇志).
-p 指定端⼝
username可以随意
1)连接不存在端⼝
[root@localhost ~]# ssh 10.0.250.3 -p 80
ssh: connect to host 10.0.250.3 port 80: Connection refused
[root@localhost ~]# ssh 10.0.250.3 -p 80 -v
OpenSSH_5.3p1, OpenSSL 1.0.1e-fips 11 Feb 2013
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug1: Connecting to 10.0.250.3 [10.0.250.3] port 80.
debug1: connect to address 10.0.250.3 port 80: Connection refused
ssh: connect to host 10.0.250.3 port 80: Connection refused
2)连接存在的端⼝
[root@localhost ~]# ssh ... -p
a
^]
^C
[root@localhost ~]# ssh ... -p -v
OpenSSH_.p, OpenSSL ..e-fips Feb
debug: Reading configuration data /etc/ssh/ssh_config
debug: Applying options for *
debug: Connecting to ... [...] port .
debug: Connection established.
debug: permanently_set_uid: /
debug: identity file /root/.ssh/identity type -
debug: identity file /root/.ssh/identity-cert type -
debug: identity file /root/.ssh/id_rsa type -
debug: identity file /root/.ssh/id_rsa-cert type -
debug: identity file /root/.ssh/id_dsa type -
debug: identity file /root/.ssh/id_dsa-cert type -
a
^C
不⽤-v选项也可以咯
3、使⽤wget判断
wget是linux下的下载⼯具,需要先安装.
⽤法: wget ip:port
1)连接不存在的端⼝
[root@localhost ~]# wget ...:
---- ::-- .../telnet ip 端口号
Connecting to ...:... failed: Connection refused.
2)连接存在的端⼝
[root@localhost ~]# wget ...:
---- ::-- ...:/
Connecting to ...:... connected.
HTTP request sent,
4、使⽤端⼝扫描⼯具
[root@localhost ~]# nmap ... -p
Starting Nmap . ( ) at -- : CST
Nmap scan report for ...
Host is up (.s latency).
PORT STATE SERVICE
/tcp closed http
MAC Address: B:A::CF:FD:D (Unknown)
Nmap done: IP address ( host up) scanned in . seconds
[root@localhost ~]# nmap ... -p
Starting Nmap . ( ) at -- : CST
Nmap scan report for ...
Host is up (.s latency).
PORT STATE SERVICE
/tcp open http-proxy
MAC Address: B:A::CF:FD:D (Unknown)
Nmap done: IP address ( host up) scanned in . seconds
[root@localhost ~]# nmap ...
Starting Nmap . ( ) at -- : CST
Nmap scan report for ...
Host is up (.s latency).
Not shown: closed ports
PORT STATE SERVICE
/tcp open ssh
/tcp open rpcbind
/tcp open http-proxy
/tcp open unknown
MAC Address: B:A::CF:FD:D (Unknown)
Nmap done: IP address ( host up) scanned in . seconds
总结
提供端⼝服务,则使⽤了tcp协议,上⾯是以web服务器为例。如果服务器是更简单的tcp服务器,三个⼯具同样适⽤.三个⼯具的共同点是:1.以tcp协议为基础;2.能访问指定端⼝. 遵循这两点可以到很多⼯具.
⼀般在windows下使⽤telnet⽐较⽅便,linux下个⼈就⽐较喜欢⽤wget.
版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系QQ:729038198,我们将在24小时内删除。
发表评论