• ★Kali信息收集★8.Nmap :端口扫描


    ★Kali信息收集~ 0.Httrack 网站复制机

     

    http://www.cnblogs.com/dunitian/p/5061954.html

     

    ★Kali信息收集~ 1.Google Hacking + Github Hacking 
    http://www.cnblogs.com/dunitian/p/5074765.html

    ★Kali信息收集~2.Whois :域名信息

    http://www.cnblogs.com/dunitian/p/5074768.html

    ★Kali信息收集~3.子域名系列

    http://www.cnblogs.com/dunitian/p/5074772.html

    ★Kali信息收集~4.DNS系列

    http://www.cnblogs.com/dunitian/p/5074773.html

    ★Kali信息收集~ 5.The Harvester:邮箱挖掘器

    http://www.cnblogs.com/dunitian/p/5074776.html

    ★Kali信息收集~★6.Dmitry:汇总收集

    http://www.cnblogs.com/dunitian/p/5074777.html

    ★Kali信息收集~★7.FPing :ip段扫描

    http://www.cnblogs.com/dunitian/p/5074783.html

    ★Kali信息收集★8.Nmap :端口扫描

    http://www.cnblogs.com/dunitian/p/5074784.html

     

    • 参数:(ZenmapNmap图形化工具,不想打指令的可以直接使用)

      详细:https://nmap.org/man/zh/index.html

      Nmap 6.49BETA4 ( https://nmap.org )

      Usage: nmap [Scan Type(s)] [Options] {target specification}

      TARGET SPECIFICATION:

      Can pass hostnames, IP addresses, networks, etc.

      Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254

      -iL <inputfilename>: Input from list of hosts/networks

      -iR <num hosts>: Choose random targets

      --exclude <host1[,host2][,host3],...>: Exclude hosts/networks

      --excludefile <exclude_file>: Exclude list from file

      HOST DISCOVERY:

      -sL: List Scan - simply list targets to scan

      -sn: Ping Scan - disable port scan

      -Pn: Treat all hosts as online -- skip host discovery

      -PS/PA/PU/PY[portlist]: TCP SYN/ACK, UDP or SCTP discovery to given ports

      -PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes

      -PO[protocol list]: IP Protocol Ping

      -n/-R: Never do DNS resolution/Always resolve [default: sometimes]

      --dns-servers <serv1[,serv2],...>: Specify custom DNS servers

      --system-dns: Use OS's DNS resolver

      --traceroute: Trace hop path to each host

      SCAN TECHNIQUES:

      -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans

      -sU: UDP Scan

      -sN/sF/sX: TCP Null, FIN, and Xmas scans

      --scanflags <flags>: Customize TCP scan flags

      -sI <zombie host[:probeport]>: Idle scan

      -sY/sZ: SCTP INIT/COOKIE-ECHO scans

      -sO: IP protocol scan

      -b <FTP relay host>: FTP bounce scan

      PORT SPECIFICATION AND SCAN ORDER:

      -p <port ranges>: Only scan specified ports

      Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080,S:9

      --exclude-ports <port ranges>: Exclude the specified ports from scanning

      -F: Fast mode - Scan fewer ports than the default scan

      -r: Scan ports consecutively - don't randomize

      --top-ports <number>: Scan <number> most common ports

      --port-ratio <ratio>: Scan ports more common than <ratio>

      SERVICE/VERSION DETECTION:

      -sV: Probe open ports to determine service/version info

      --version-intensity <level>: Set from 0 (light) to 9 (try all probes)

      --version-light: Limit to most likely probes (intensity 2)

      --version-all: Try every single probe (intensity 9)

      --version-trace: Show detailed version scan activity (for debugging)

      SCRIPT SCAN:

      -sC: equivalent to --script=default

      --script=<Lua scripts>: <Lua scripts> is a comma separated list of

      directories, script-files or script-categories

      --script-args=<n1=v1,[n2=v2,...]>: provide arguments to scripts

      --script-args-file=filename: provide NSE script args in a file

      --script-trace: Show all data sent and received

      --script-updatedb: Update the script database.

      --script-help=<Lua scripts>: Show help about scripts.

      <Lua scripts> is a comma-separated list of script-files or

      script-categories.

      OS DETECTION:

      -O: Enable OS detection

      --osscan-limit: Limit OS detection to promising targets

      --osscan-guess: Guess OS more aggressively

      TIMING AND PERFORMANCE:

      Options which take <time> are in seconds, or append 'ms' (milliseconds),

      's' (seconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m).

      -T<0-5>: Set timing template (higher is faster)

      --min-hostgroup/max-hostgroup <size>: Parallel host scan group sizes

      --min-parallelism/max-parallelism <numprobes>: Probe parallelization

      --min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout <time>: Specifies

      probe round trip time.

      --max-retries <tries>: Caps number of port scan probe retransmissions.

      --host-timeout <time>: Give up on target after this long

      --scan-delay/--max-scan-delay <time>: Adjust delay between probes

      --min-rate <number>: Send packets no slower than <number> per second

      --max-rate <number>: Send packets no faster than <number> per second

      FIREWALL/IDS EVASION AND SPOOFING:

      -f; --mtu <val>: fragment packets (optionally w/given MTU)

      -D <decoy1,decoy2[,ME],...>: Cloak a scan with decoys

      -S <IP_Address>: Spoof source address

      -e <iface>: Use specified interface

      -g/--source-port <portnum>: Use given port number

      --proxies <url1,[url2],...>: Relay connections through HTTP/SOCKS4 proxies

      --data <hex string>: Append a custom payload to sent packets

      --data-string <string>: Append a custom ASCII string to sent packets

      --data-length <num>: Append random data to sent packets

      --ip-options <options>: Send packets with specified ip options

      --ttl <val>: Set IP time-to-live field

      --spoof-mac <mac address/prefix/vendor name>: Spoof your MAC address

      --badsum: Send packets with a bogus TCP/UDP/SCTP checksum

      OUTPUT:

      -oN/-oX/-oS/-oG <file>: Output scan in normal, XML, s|<rIpt kIddi3,

      and Grepable format, respectively, to the given filename.

      -oA <basename>: Output in the three major formats at once

      -v: Increase verbosity level (use -vv or more for greater effect)

      -d: Increase debugging level (use -dd or more for greater effect)

      --reason: Display the reason a port is in a particular state

      --open: Only show open (or possibly open) ports

      --packet-trace: Show all packets sent and received

      --iflist: Print host interfaces and routes (for debugging)

      --append-output: Append to rather than clobber specified output files

      --resume <filename>: Resume an aborted scan

      --stylesheet <path/URL>: XSL stylesheet to transform XML output to HTML

      --webxml: Reference stylesheet from Nmap.Org for more portable XML

      --no-stylesheet: Prevent associating of XSL stylesheet w/XML output

      MISC:

      -6: Enable IPv6 scanning

      -A: Enable OS detection, version detection, script scanning, and traceroute

      --datadir <dirname>: Specify custom Nmap data file location

      --send-eth/--send-ip: Send using raw ethernet frames or IP packets

      --privileged: Assume that the user is fully privileged

      --unprivileged: Assume the user lacks raw socket privileges

      -V: Print version number

      -h: Print this help summary page.

      EXAMPLES:

      nmap -v -A scanme.nmap.org

      nmap -v -sn 192.168.0.0/16 10.0.0.0/8

      nmap -v -iR 10000 -Pn -p 80

      SEE THE MAN PAGE (https://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES

      离线下载:http://pan.baidu.com/s/1dEiZdJV

    • 应用:(常用的速度快点,完整的更详细但慢点~【主要就是全端口扫而导致慢的】)
    •  识别系统:(先看看,后面有详解)

      nmap -O -Pn ip地址

         

         

         

    •  TCP扫描端口扫描中最稳定的,TCP三次握手

      常用nmap -sT -Pn ip地址

      完整nmap -sT -p- -Pn ip地址

      -sT TCP连接扫描(s=>哪种类型扫描? ==>t TCP类型)

      -p- 扫描所有端口 (不加就默认扫描1000个常用端口)

      -Pn 禁用Nmap网络发现功能,假定所有系统都是活动的

      批量扫描 egnmap -sT -p- -Pn 192.168.1.1-254

         

    •  SYN 扫描端口扫描中用的最多的,TCP两次握手(隐形扫描,速度快)

      常用nmap -sS -Pn ip地址

      完整nmap -sS -p- -Pn ip地址

      -sS -s => 哪种扫描类型?S=> SYN

         

    •  UDP 扫描DHCP,DNS,SNMP,TFTP等都使用了UDP协议)

      常用nmap -sU ip地址

      完整nmap -sUV ip地址

      U=> UDP, V=>版本信息 (-sV UDP扫描中添加版本扫描信息)

      不存在-PN参数(从UDP协议去理解,你发了就ok管他收没收到

         

    •  Xmas扫描RFC文档描述了系统的技术细节,如果得到RFC文档,那么就可能找到系统的漏洞,xmasnull扫描的目的正是基于这一原因。一般xmas针对unix或者linux系统比较有效

      常用nmap -sX -Pn ip地址

      完整nmap -sX -p- -Pn ip地址

         

    •  Null 扫描:和Xmas扫描相反,发送空数据包,打开端口不会返回相应信息关闭端口则返回一个RST数据包

      常用nmap -sN -Pn ip地址

      完整nmap -sN -p- -Pn ip地址

         

    • 扩充:扫描的时候按d可以显示debug信息,按其他的键(比如X)可以显示当前进度 XX.XX%

      Null扫描 Xmas扫描

       如果系统遵循了TCP RFC文档,那么不用完成连接,在发起连接的时候namp就可以判断出目标系统的状态。(PSXmas扫描和Null扫描都不会建立任何类型的通信通道。扫描目的就是为了判断哪些端口开或关)

      扫描的其他指令

      -sV 参数用于版本扫描

      -iL 批量扫描文件里面的ip

      -F: 快速模式-扫描较少,扫描默认端口

      -v 输出的时候更详细 (使用-vv 或更多的更大的作用)

      -A 启用操作系统检测、 版本检测、 脚本扫描

      -T 速度设置(最慢0 - 最快5避免被检测到则降低速度,如果赶时间就提高速度

         

    • 实战:(渗透中常用命令)
    •  快速扫描

      root@Kali:~# nmap -T4 -F 192.168.169.105

         

      Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-12-24 12:06 CST

      Nmap scan report for 192.168.169.105

      Host is up (1.7s latency).

      Not shown: 92 closed ports

      PORT STATE SERVICE

      80/tcp open http

      135/tcp open msrpc

      139/tcp open netbios-ssn

      443/tcp open https

      444/tcp open snpp

      445/tcp open microsoft-ds

      514/tcp filtered shell

      1433/tcp open ms-sql-s

         

      Nmap done: 1 IP address (1 host up) scanned in 16.67 seconds

         

    •  SYN迅速扫描:(TCP两次握手,隐蔽性高)

      root@Kali:~# nmap -sS -T4 -A -v cnblogs.com

         

      Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-12-23 17:00 CST

      NSE: Loaded 122 scripts for scanning.

      NSE: Script Pre-scanning.

      Initiating NSE at 17:00

      Completed NSE at 17:00, 0.00s elapsed

      Initiating NSE at 17:00

      Completed NSE at 17:00, 0.00s elapsed

      Initiating Ping Scan at 17:00

      Scanning cnblogs.com (42.121.252.58) [4 ports]

      Completed Ping Scan at 17:00, 0.20s elapsed (1 total hosts)

      Initiating Parallel DNS resolution of 1 host. at 17:00

      Completed Parallel DNS resolution of 1 host. at 17:00, 2.01s elapsed

      Initiating SYN Stealth Scan at 17:00

      Scanning cnblogs.com (42.121.252.58) [1000 ports]

      Discovered open port 443/tcp on 42.121.252.58

      Discovered open port 80/tcp on 42.121.252.58

      Increasing send delay for 42.121.252.58 from 0 to 5 due to 11 out of 20 dropped probes since last increase.

      Increasing send delay for 42.121.252.58 from 5 to 10 due to 11 out of 11 dropped probes since last increase.

      Completed SYN Stealth Scan at 17:01, 84.92s elapsed (1000 total ports)

      Initiating Service scan at 17:01

      Scanning 2 services on cnblogs.com (42.121.252.58)

      Completed Service scan at 17:01, 5.01s elapsed (2 services on 1 host)

      Initiating OS detection (try #1) against cnblogs.com (42.121.252.58)

      Retrying OS detection (try #2) against cnblogs.com (42.121.252.58)

      WARNING: OS didn't match until try #2

      Initiating Traceroute at 17:01

      Completed Traceroute at 17:01, 0.02s elapsed

      Initiating Parallel DNS resolution of 2 hosts. at 17:01

      Completed Parallel DNS resolution of 2 hosts. at 17:01, 0.15s elapsed

      NSE: Script scanning 42.121.252.58.

      Initiating NSE at 17:01

      Completed NSE at 17:02, 6.16s elapsed

      Initiating NSE at 17:02

      Completed NSE at 17:02, 0.00s elapsed

      Nmap scan report for cnblogs.com (42.121.252.58)

      Host is up (0.0048s latency).

      Not shown: 998 filtered ports

      PORT STATE SERVICE VERSION

      80/tcp open tcpwrapped

      |_http-favicon: Unknown favicon MD5: CDD795C4B3E1ED39250A6B1B1DB89E73

      |_http-methods: No Allow or Public header in OPTIONS response (status code 301)

      | http-title: xE5x8Dx9AxE5xAExA2xE5x9BxAD - xE5xBCx80xE5x8Fx91xE8x80x85xE7x9Ax84xE7xBDx91xE4xB8x8AxE5xAExB6xE5x9BxAD

      |_Requested resource was http://www.cnblogs.com/

      443/tcp open tcpwrapped

      | http-cisco-anyconnect:

      |_ ERROR: Not a Cisco ASA or unsupported version

      |_http-methods: No Allow or Public header in OPTIONS response (status code 400)

      |_http-title: 400 The plain HTTP request was sent to HTTPS port

      | ssl-cert: Subject: commonName=*.cnblogs.com

      | Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US

      | Public Key type: rsa

      | Public Key bits: 2048

      | Signature Algorithm: sha256WithRSAEncryption

      | Not valid before: 2015-09-28T08:12:38

      | Not valid after: 2016-07-27T12:31:38

      | MD5: 9b12 efe2 1f0c 7967 ca7c fe14 2a13 a200

      |_SHA-1: 29dd 13c4 11cd e03b de35 cad9 60ac e7e6 52de 8c44

      |_ssl-date: TLS randomness does not represent time

      | tls-nextprotoneg:

      |_ http/1.1

      Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port

      Device type: WAP|general purpose

      Running: Actiontec Linux, Linux 2.4.X|3.X

      OS CPE: cpe:/o:actiontec:linux_kernel cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:3

      OS details: Actiontec MI424WR-GEN3I WAP, DD-WRT v24-sp2 (Linux 2.4.37), Linux 3.2

      Network Distance: 2 hops

         

      TRACEROUTE (using port 80/tcp)

      HOP RTT ADDRESS

      1 0.04 ms 192.168.232.2

      2 0.04 ms 42.121.252.58

         

      NSE: Script Post-scanning.

      Initiating NSE at 17:02

      Completed NSE at 17:02, 0.00s elapsed

      Initiating NSE at 17:02

      Completed NSE at 17:02, 0.00s elapsed

      Read data files from: /usr/bin/../share/nmap

      OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .

      Nmap done: 1 IP address (1 host up) scanned in 108.48 seconds

      Raw packets sent: 3196 (145.286KB) | Rcvd: 195 (9.170KB)

         

    •  UDP迅速扫描

      root@Kali:~# nmap -sU -v 192.168.169.105

         

      Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-12-23 19:20 CST

      Initiating Ping Scan at 19:20

      Scanning 192.168.169.105 [4 ports]

      Completed Ping Scan at 19:20, 0.20s elapsed (1 total hosts)

      Initiating Parallel DNS resolution of 1 host. at 19:20

      Completed Parallel DNS resolution of 1 host. at 19:20, 2.01s elapsed

      Initiating UDP Scan at 19:20

      Scanning 192.168.169.105 [1000 ports]

      Discovered open port 137/udp on 192.168.169.105

      Completed UDP Scan at 19:20, 23.11s elapsed (1000 total ports)

      Nmap scan report for 192.168.169.105

      Host is up (0.0013s latency).

      Not shown: 998 open|filtered ports

      PORT STATE SERVICE

      137/udp open netbios-ns

      4500/udp closed nat-t-ike

         

      Read data files from: /usr/bin/../share/nmap

      Nmap done: 1 IP address (1 host up) scanned in 25.39 seconds

      Raw packets sent: 3006 (86.660KB) | Rcvd: 32 (1.654KB)

         

    •  ④迅速扫描(NoPing

      root@Kali:~# nmap -T4 -A -v -Pn 192.168.169.105

         

      Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-12-24 09:52 CST

      NSE: Loaded 122 scripts for scanning.

      NSE: Script Pre-scanning.

      Initiating NSE at 09:52

      Completed NSE at 09:52, 0.00s elapsed

      Initiating NSE at 09:52

      Completed NSE at 09:52, 0.00s elapsed

      Initiating Parallel DNS resolution of 1 host. at 09:52

      Completed Parallel DNS resolution of 1 host. at 09:52, 8.18s elapsed

      Initiating SYN Stealth Scan at 09:52

      Scanning 192.168.169.105 [1000 ports]

      Discovered open port 80/tcp on 192.168.169.105

      Increasing send delay for 192.168.169.105 from 0 to 5 due to 11 out of 15 dropped probes since last increase.

      Discovered open port 443/tcp on 192.168.169.105

      Discovered open port 135/tcp on 192.168.169.105

      Discovered open port 139/tcp on 192.168.169.105

      Discovered open port 445/tcp on 192.168.169.105

      Increasing send delay for 192.168.169.105 from 5 to 10 due to max_successful_tryno increase to 5

      Warning: 192.168.169.105 giving up on port because retransmission cap hit (6).

      SYN Stealth Scan Timing: About 8.99% done; ETC: 09:58 (0:05:14 remaining)

      SYN Stealth Scan Timing: About 14.66% done; ETC: 09:59 (0:05:55 remaining)

      SYN Stealth Scan Timing: About 22.24% done; ETC: 09:59 (0:05:18 remaining)

      SYN Stealth Scan Timing: About 29.91% done; ETC: 09:59 (0:04:43 remaining)

      Discovered open port 1433/tcp on 192.168.169.105

      SYN Stealth Scan Timing: About 37.97% done; ETC: 09:59 (0:04:07 remaining)

      Discovered open port 444/tcp on 192.168.169.105

      Discovered open port 2383/tcp on 192.168.169.105

      SYN Stealth Scan Timing: About 54.17% done; ETC: 09:58 (0:02:33 remaining)

      Discovered open port 2179/tcp on 192.168.169.105

      SYN Stealth Scan Timing: About 76.10% done; ETC: 09:57 (0:01:06 remaining)

      Discovered open port 912/tcp on 192.168.169.105

      Discovered open port 902/tcp on 192.168.169.105

      Completed SYN Stealth Scan at 09:57, 318.66s elapsed (1000 total ports)

      Initiating Service scan at 09:57

      Scanning 11 services on 192.168.169.105

      Completed Service scan at 09:58, 33.60s elapsed (11 services on 1 host)

      Initiating OS detection (try #1) against 192.168.169.105

      Initiating Traceroute at 09:58

      Completed Traceroute at 09:58, 1.01s elapsed

      Initiating Parallel DNS resolution of 2 hosts. at 09:58

      Completed Parallel DNS resolution of 2 hosts. at 09:58, 0.05s elapsed

      NSE: Script scanning 192.168.169.105.

      Initiating NSE at 09:58

      Completed NSE at 09:58, 13.23s elapsed

      Initiating NSE at 09:58

      Completed NSE at 09:58, 0.00s elapsed

      Nmap scan report for 192.168.169.105

      Host is up (0.59s latency).

      Not shown: 979 closed ports

      PORT STATE SERVICE VERSION

      80/tcp open http Microsoft IIS httpd 10.0

      | http-methods: OPTIONS TRACE GET HEAD POST

      | Potentially risky methods: TRACE

      |_See http://nmap.org/nsedoc/scripts/http-methods.html

      |_http-server-header: Microsoft-IIS/10.0

      |_http-title: IIS Windows

      135/tcp open msrpc Microsoft Windows RPC

      139/tcp open netbios-ssn Microsoft Windows 98 netbios-ssn

      443/tcp open ssl/http Apache httpd

      | http-auth:

      | HTTP/1.1 401 Authorization Required

         

      |_ Basic realm=VisualSVN Server

      | http-cisco-anyconnect:

      |_ ERROR: Not a Cisco ASA or unsupported version

      |_http-methods: No Allow or Public header in OPTIONS response (status code 401)

      |_http-server-header: Apache

      |_http-title: 401 Authorization Required

      | ssl-cert: Subject: commonName=DESKTOP-PTACRF6

      | Issuer: commonName=DESKTOP-PTACRF6

      | Public Key type: rsa

      | Public Key bits: 2048

      | Signature Algorithm: sha256WithRSAEncryption

      | Not valid before: 2015-12-06T14:04:50

      | Not valid after: 2025-12-03T14:04:50

      | MD5: c707 0eb2 71d6 5178 6687 9d2f 5594 dc01

      |_SHA-1: de83 b92f ad7d e0d0 125a 2f88 99d9 c741 6b51 bdcf

      |_ssl-date: TLS randomness does not represent time

      444/tcp open ssl/http VMware VirtualCenter Web service

      | http-cisco-anyconnect:

      |_ ERROR: Not a Cisco ASA or unsupported version

      |_http-methods: No Allow or Public header in OPTIONS response (status code 501)

      |_http-title: Site doesn't have a title (text; charset=plain).

      | ssl-cert: Subject: commonName=VMware/countryName=US

      | Issuer: commonName=VMware/countryName=US

      | Public Key type: rsa

      | Public Key bits: 2048

      | Signature Algorithm: sha256WithRSAEncryption

      | Not valid before: 2015-12-06T15:04:18

      | Not valid after: 2016-12-05T15:04:18

      | MD5: 6634 afe2 c934 e412 653c ee79 8fbe c64f

      |_SHA-1: da6f aaeb 31b4 51a8 73b6 403a 728d c0e5 a1e9 7c08

      |_ssl-date: TLS randomness does not represent time

      445/tcp open microsoft-ds (primary domain: WORKGROUP)

      514/tcp filtered shell

      902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP)

      912/tcp open vmware-auth VMware Authentication Daemon 1.0 (Uses VNC, SOAP)

      1198/tcp filtered cajo-discovery

      1433/tcp open ms-sql-s Microsoft SQL Server 2014 12.00.4100.00; SP1+

      1641/tcp filtered invision

      2179/tcp open vmrdp?

      2383/tcp open ms-olap4?

      2717/tcp filtered pn-requester

      2998/tcp filtered iss-realsec

      3814/tcp filtered neto-dcs

      5950/tcp filtered unknown

      9944/tcp filtered unknown

      10003/tcp filtered documentum_s

      44176/tcp filtered unknown

      1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :

      SF-Port445-TCP:V=6.49BETA4%I=7%D=12/24%Time=567B5124%P=i586-pc-linux-gnu%r

      SF:(SMBProgNeg,85,"x81xffSMBrx88x01@

      SF:@x06x01x11x07x032x01x04x11x01

      SF:0xfcxe3x01xadxb4x16x7fxee=xd1x01x20xfex08<B2xe4^

      SF:xe0xabx91PWORKGROUPDESKTOP-P

      SF:TACRFx006");

      Device type: general purpose

      Running: Microsoft Windows 7|2012|XP

      OS CPE: cpe:/o:microsoft:windows_7 cpe:/o:microsoft:windows_server_2012 cpe:/o:microsoft:windows_xp::sp3

      OS details: Microsoft Windows 7 or Windows Server 2012, Microsoft Windows XP SP3

      Network Distance: 2 hops

      TCP Sequence Prediction: Difficulty=258 (Good luck!)

      IP ID Sequence Generation: Incremental

      Service Info: Host: DESKTOP-PTACRF6; OSs: Windows, Windows 98; CPE: cpe:/o:microsoft:windows, cpe:/o:microsoft:windows_98

         

      Host script results:

      | ms-sql-info:

      | 192.168.169.105:1433:

      | Version:

      | Service pack level: SP1

      | Post-SP patches applied: true

      | name: Microsoft SQL Server 2014 SP1+

      | number: 12.00.4100.00

      | Product: Microsoft SQL Server 2014

      |_ TCP port: 1433

      | nbstat: NetBIOS name: DESKTOP-PTACRF6, NetBIOS user: <unknown>, NetBIOS MAC: ac:b5:7d:18:93:b9 (Liteon Technology)

      | Names:

      | DESKTOP-PTACRF6<00> Flags: <unique><active>

      | WORKGROUP<00> Flags: <group><active>

      |_ DESKTOP-PTACRF6<20> Flags: <unique><active>

      | smb-security-mode:

      | authentication_level: user

      | challenge_response: supported

      |_ message_signing: disabled (dangerous, but default)

      |_smbv2-enabled: Server supports SMBv2 protocol

         

      TRACEROUTE (using port 587/tcp)

      HOP RTT ADDRESS

      1 0.37 ms 192.168.232.2

      2 1000.57 ms 192.168.169.105

         

      NSE: Script Post-scanning.

      Initiating NSE at 09:58

      Completed NSE at 09:58, 0.00s elapsed

      Initiating NSE at 09:58

      Completed NSE at 09:58, 0.00s elapsed

      Read data files from: /usr/bin/../share/nmap

      OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .

      Nmap done: 1 IP address (1 host up) scanned in 382.58 seconds

      Raw packets sent: 3582 (159.270KB) | Rcvd: 3259 (130.738KB)

         

         

    •  ⑤快速扫描加强

      root@Kali:~# nmap -sV -T4 -O -F --version-light 192.168.169.105

         

      Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-12-24 12:10 CST

      Nmap scan report for 192.168.169.105

      Host is up (0.31s latency).

      Not shown: 92 closed ports

      PORT STATE SERVICE VERSION

      80/tcp open http Microsoft IIS httpd 10.0

      135/tcp open msrpc Microsoft Windows RPC

      139/tcp open netbios-ssn Microsoft Windows 98 netbios-ssn

      443/tcp open ssl/http Apache httpd

      444/tcp open ssl/http VMware VirtualCenter Web service

      445/tcp open microsoft-ds (primary domain: WORKGROUP)

      514/tcp filtered shell

      1433/tcp open ms-sql-s Microsoft SQL Server 2014

      Device type: general purpose

      Running: Microsoft Windows 7|2012|XP

      OS CPE: cpe:/o:microsoft:windows_7 cpe:/o:microsoft:windows_server_2012 cpe:/o:microsoft:windows_xp::sp3

      OS details: Microsoft Windows 7 or Windows Server 2012, Microsoft Windows XP SP3

      Service Info: Host: DESKTOP-PTACRF6; OSs: Windows, Windows 98; CPE: cpe:/o:microsoft:windows, cpe:/o:microsoft:windows_98

         

      OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .

      Nmap done: 1 IP address (1 host up) scanned in 47.93 seconds

         

    •  SYN全端口扫描

      [有些管理员端口不按常理来全端口扫才能发现好东西]

      root@Kali:~# nmap -sS -p- -T4 -A -v 192.168.169.105

         

      Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-12-24 09:07 CST

      NSE: Loaded 122 scripts for scanning.

      NSE: Script Pre-scanning.

      Initiating NSE at 09:07

      Completed NSE at 09:07, 0.00s elapsed

      Initiating NSE at 09:07

      Completed NSE at 09:07, 0.00s elapsed

      Initiating Ping Scan at 09:07

      Scanning 192.168.169.105 [4 ports]

      Completed Ping Scan at 09:07, 0.20s elapsed (1 total hosts)

      Initiating Parallel DNS resolution of 1 host. at 09:07

      Completed Parallel DNS resolution of 1 host. at 09:07, 0.06s elapsed

      Initiating SYN Stealth Scan at 09:07

      Scanning 192.168.169.105 [65535 ports]

      Discovered open port 135/tcp on 192.168.169.105

      Discovered open port 443/tcp on 192.168.169.105

      Discovered open port 80/tcp on 192.168.169.105

      Discovered open port 445/tcp on 192.168.169.105

      Discovered open port 139/tcp on 192.168.169.105

      Increasing send delay for 192.168.169.105 from 0 to 5 due to 45 out of 112 dropped probes since last increase.

      Increasing send delay for 192.168.169.105 from 5 to 10 due to 397 out of 991 dropped probes since last increase.

      SYN Stealth Scan Timing: About 5.11% done; ETC: 09:18 (0:09:35 remaining)

      Warning: 192.168.169.105 giving up on port because retransmission cap hit (6).

      SYN Stealth Scan Timing: About 8.41% done; ETC: 09:43 (0:32:52 remaining)

      SYN Stealth Scan Timing: About 8.89% done; ETC: 09:47 (0:36:03 remaining)

      Discovered open port 1549/tcp on 192.168.169.105

      SYN Stealth Scan Timing: About 14.17% done; ETC: 10:19 (1:01:18 remaining)

      SYN Stealth Scan Timing: About 14.89% done; ETC: 10:24 (1:04:57 remaining)

      SYN Stealth Scan Timing: About 15.50% done; ETC: 10:29 (1:08:46 remaining)

      Discovered open port 1539/tcp on 192.168.169.105

      SYN Stealth Scan Timing: About 16.79% done; ETC: 10:35 (1:12:56 remaining)

      SYN Stealth Scan Timing: About 17.95% done; ETC: 10:42 (1:17:19 remaining)

      SYN Stealth Scan Timing: About 19.25% done; ETC: 10:49 (1:22:05 remaining)

      SYN Stealth Scan Timing: About 20.88% done; ETC: 10:58 (1:27:13 remaining)

      Discovered open port 1553/tcp on 192.168.169.105

      SYN Stealth Scan Timing: About 22.52% done; ETC: 11:07 (1:32:45 remaining)

      SYN Stealth Scan Timing: About 23.78% done; ETC: 11:17 (1:38:46 remaining)

      Stats: 0:36:36 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan

      SYN Stealth Scan Timing: About 26.11% done; ETC: 11:28 (1:43:32 remaining)

      Stats: 0:36:39 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan

      SYN Stealth Scan Timing: About 26.12% done; ETC: 11:28 (1:43:36 remaining)

      ………………………………….比较耗时,就不详细输出了…………………………………

         

    •  ⑦大绝招:全面扫描

      nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 --script "default or (discovery and safe)" 192.168.169.105

         

      Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-12-24 12:28 CST

      NSE: Loaded 243 scripts for scanning.

      NSE: Script Pre-scanning.

      Initiating NSE at 12:28

      NSE: [mtrace] A source IP must be provided through fromip argument.

      Completed NSE at 12:28, 10.50s elapsed

      Initiating NSE at 12:28

      Completed NSE at 12:28, 0.00s elapsed

      Pre-scan script results:

      | broadcast-eigrp-discovery:

      |_ ERROR: Couldn't get an A.S value.

      | broadcast-igmp-discovery:

      | 192.168.232.1

      | Interface: eth0

      | Version: 2

      | Group: 224.0.0.251

      | Description: mDNS

      | 192.168.232.1

      | Interface: eth0

      | Version: 2

      | Group: 224.0.0.252

      | Description: Link-local Multicast Name Resolution (rfc4795)

      | 192.168.232.1

      | Interface: eth0

      | Version: 2

      | Group: 239.255.255.250

      | Description: Organization-Local Scope (rfc2365)

      |_ Use the newtargets script-arg to add the results as targets

      | broadcast-ping:

      | IP: 192.168.232.2 MAC: 00:50:56:f5:1a:80

      |_ Use --script-args=newtargets to add the results as targets

      | http-icloud-findmyiphone:

      |_ ERROR: No username or password was supplied

      | http-icloud-sendmsg:

      |_ ERROR: No username or password was supplied

      | targets-asn:

      |_ targets-asn.asn is a mandatory parameter

      Initiating Ping Scan at 12:28

      Scanning 192.168.169.105 [7 ports]

      Completed Ping Scan at 12:28, 0.20s elapsed (1 total hosts)

      Initiating Parallel DNS resolution of 1 host. at 12:28

      Completed Parallel DNS resolution of 1 host. at 12:28, 0.04s elapsed

      Initiating SYN Stealth Scan at 12:28

      Scanning 192.168.169.105 [1000 ports]

      ………………………………….比较耗时,就不详细输出了…………………………………

  • 相关阅读:
    所谓guard进程不能启动
    文件拒绝访问
    (转)Android 自定义 spinner (背景、字体颜色)
    (转)安装Android SDK时遇到Failed to rename directory
    (转)Download interrupted: Connection to https://dl-ssl.google.com refused
    安卓中Activity的onStart()和onResume()的区别是什么
    Could not find class 'org.ksoap2.serialization.SoapObject
    Android三种左右滑动效果 手势识别(转)
    The method of type must override a superclass method解决方式(转)
    MySQL插入中文时出现ERROR 1406 (22001): Data too long for column 'name' at row 1 (转)
  • 原文地址:https://www.cnblogs.com/dunitian/p/5074784.html
Copyright © 2020-2023  润新知