nmap 的host script results Nmap(网络映射器)是一款用于网络发现和安全审计的开源工具。Nmap支持使用脚本引擎执行各种扫描脚本,这些脚本可以提供关于目标主机和服务的更详细的信息。Nmap的Host Script Results是指在扫描过程中执行的脚本输出的结果。 下面是一些常见的Nmap脚本,以及它们可能提供的一些信息: 1.nmap --...
Nmap done: 1 IP address (1 host up) scanned in 13.65 seconds Raw packets sent: 26 (1.842KB) | Rcvd: 22 (1.570KB) 从扫描结果来看,该虚拟机80,3306,3389端口开放,443,6379端口关闭 判断常见的漏洞并扫描端口 --script指定常见漏洞nmap 192.168.230.128 --script=auth,vuln 扫描信息如下: root@kali:...
nmap --script-args=unsafe=1 --script smb-check-vulns.nse -p 445 10.0.0.1 输出结果: Nmap scan report for ie6winxp.decepticons (10.0.1.1) Host is up (0.00026s latency). PORT STATE SERVICE 445/tcp open microsoft-ds Host script results: | smb-check-vulns: | MS08-067: VULNERABLE | Conf...
Host is up (0.26s latency). Not shown: 998 filtered ports PORT STATE SERVICE 80/tcp open http 443/tcp open https Host script results: #脚本扫描结果 | dns-brute: | DNS Brute-force hostnames: #暴力破解出的主机名 | admin.benet.com - 69.172.201.208 | stats.benet.com - 69.172.201.208 ...
baidu.com (not scanned): 180.97.33.10 Not shown: 998 filtered ports PORT STATE SERVICE 80/tcp open http 443/tcp open https Host script results: | dns-brute: | DNS Brute-force hostnames: | admin.baidu.com - 10.26.109.19 | mx.baidu.com - 61.135.163.61 | svn.baidu.com - 10.65....
Host is up (0.0029s latency). Not shown: 65530 closed ports PORT STATE SERVICE 53/tcp open domain 80/tcp open http 443/tcp open https 37215/tcp open unknown 37443/tcp open unknown MAC Address: F4:A5:9D:6B:87:AA (Unknown) Nmap done: 1 IP address (1 host up) scanned in 6600.07 ...
Host script results: |_samba-vuln-cve-2012-1182: NT_STATUS_OBJECT_NAME_NOT_FOUND |_smb-vuln-ms10-054: false |_smb-vuln-ms10-061: NT_STATUS_OBJECT_NAME_NOT_FOUND Nmap done: 1 IP address (1 host up) scanned in 303.22 seconds
-- nmap -O --script hostrule <target>-- @output-- Host script results:-- | hostrule:-- |-- | name: Microsoft Windows 7 or 8.1 R1-- | classes:-- |-- | cpe:-- | cpe:/o:microsoft:windows_7-- | osgen: 7-- | vendor: Microsoft-- | osfamily: Windows-- | type: general...
linux_kernel Host script results: |_nbstat: NetBIOS name: METASPLOITABLE, NetBIOS user: , NetBIOS MAC: | smb-os-discovery: #SMB系统发现 | OS: Unix (Samba 3.0.20-Debian) #操作系统为Unix,Samba版本为2.0.20 | NetBIOS computer name: #NetBIOS计算机名称 | Workgroup: WORKGROUP #所在工作组 ...
Host script results: | smb-vuln-cve2009-3103: | VULNERABLE: | SMBv2 exploit (CVE-2009-3103, Microsoft Security Advisory 975497) | State: VULNERABLE | IDs: CVE:CVE-2009-3103 | Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and ...