日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 编程资源 > 编程问答 >内容正文

编程问答

nmap 扫描常见漏洞

發布時間:2025/3/21 编程问答 29 豆豆
生活随笔 收集整理的這篇文章主要介紹了 nmap 扫描常见漏洞 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

加上 --script=vuln 參數就可以了

nmap -T4 -A -v 192.168.1.133 --script=vuln

掃描結果,發現了兩個可用的漏洞

Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-09 22:51 CST NSE: Loaded 149 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 22:51 Completed NSE at 22:51, 10.01s elapsed Initiating NSE at 22:51 Completed NSE at 22:51, 0.00s elapsed Initiating ARP Ping Scan at 22:51 Scanning 192.168.1.133 [1 port] Completed ARP Ping Scan at 22:51, 0.00s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 22:51 Completed Parallel DNS resolution of 1 host. at 22:51, 0.00s elapsed Initiating SYN Stealth Scan at 22:51 Scanning sb-abae96df44ac.lan (192.168.1.133) [1000 ports] Discovered open port 135/tcp on 192.168.1.133 Discovered open port 139/tcp on 192.168.1.133 Discovered open port 1025/tcp on 192.168.1.133 Discovered open port 445/tcp on 192.168.1.133 Discovered open port 23/tcp on 192.168.1.133 Completed SYN Stealth Scan at 22:51, 1.25s elapsed (1000 total ports) Initiating Service scan at 22:51 Scanning 5 services on sb-abae96df44ac.lan (192.168.1.133) Completed Service scan at 22:51, 6.01s elapsed (5 services on 1 host) Initiating OS detection (try #1) against sb-abae96df44ac.lan (192.168.1.133) NSE: Script scanning 192.168.1.133. Initiating NSE at 22:51 Completed NSE at 22:51, 10.68s elapsed Initiating NSE at 22:51 Completed NSE at 22:51, 0.10s elapsed Nmap scan report for sb-abae96df44ac.lan (192.168.1.133) Host is up (0.00035s latency). Not shown: 995 closed ports PORT STATE SERVICE VERSION 23/tcp open telnet Microsoft Windows XP telnetd |_clamav-exec: ERROR: Script execution failed (use -d to debug) 135/tcp open msrpc Microsoft Windows RPC |_clamav-exec: ERROR: Script execution failed (use -d to debug) 139/tcp open netbios-ssn Microsoft Windows netbios-ssn |_clamav-exec: ERROR: Script execution failed (use -d to debug) 445/tcp open microsoft-ds Microsoft Windows 2003 or 2008 microsoft-ds |_clamav-exec: ERROR: Script execution failed (use -d to debug) 1025/tcp open msrpc Microsoft Windows RPC |_clamav-exec: ERROR: Script execution failed (use -d to debug) MAC Address: 08:00:27:63:28:BF (Oracle VirtualBox virtual NIC) Device type: general purpose Running: Microsoft Windows 2003 OS CPE: cpe:/o:microsoft:windows_server_2003::sp1 cpe:/o:microsoft:windows_server_2003::sp2 OS details: Microsoft Windows Server 2003 SP1 or SP2 Network Distance: 1 hop TCP Sequence Prediction: Difficulty=256 (Good luck!) IP ID Sequence Generation: Incremental Service Info: OSs: Windows XP, Windows; CPE: cpe:/o:microsoft:windows_xp, cpe:/o:microsoft:windows, cpe:/o:microsoft:windows_server_2003Host script results: | smb-vuln-ms08-067: | VULNERABLE: | Microsoft Windows system vulnerable to remote code execution (MS08-067) | State: VULNERABLE | IDs: CVE:CVE-2008-4250 | The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, | Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary | code via a crafted RPC request that triggers the overflow during path canonicalization. | | Disclosure date: 2008-10-23 | References: | https://technet.microsoft.com/en-us/library/security/ms08-067.aspx |_ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4250 |_smb-vuln-ms10-054: false |_smb-vuln-ms10-061: NT_STATUS_OBJECT_NAME_NOT_FOUND | smb-vuln-ms17-010: | VULNERABLE: | Remote Code Execution vulnerability in Microsoft SMBv1 servers (ms17-010) | State: VULNERABLE | IDs: CVE:CVE-2017-0143 | Risk factor: HIGH | A critical remote code execution vulnerability exists in Microsoft SMBv1 | servers (ms17-010). | | Disclosure date: 2017-03-14 | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0143 | https://technet.microsoft.com/en-us/library/security/ms17-010.aspx |_ https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/TRACEROUTE HOP RTT ADDRESS 1 0.35 ms sb-abae96df44ac.lan (192.168.1.133)NSE: Script Post-scanning. Initiating NSE at 22:51 Completed NSE at 22:51, 0.00s elapsed Initiating NSE at 22:51 Completed NSE at 22:51, 0.00s elapsed Read data files from: /usr/bin/../share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 31.46 secondsRaw packets sent: 1109 (49.494KB) | Rcvd: 1017 (41.242KB)

總結

以上是生活随笔為你收集整理的nmap 扫描常见漏洞的全部內容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。

主站蜘蛛池模板: 男人午夜影院 | 国产精品高清网站 | 亚洲人一区 | www.男女| 三级爱爱 | 亚洲欧美自拍偷拍 | 人妻视频一区二区三区 | 国产 日韩 欧美 综合 | 操操av| 日本丰满大乳奶做爰 | 最新日韩在线视频 | 91国内精品视频 | 欧洲色播 | 色播综合| 日本人极品人妖高潮 | 日韩电影一区二区三区 | 久久er99热精品一区二区 | 日本黄色xxx | 在线观看日本视频 | 暖暖日本视频 | 蜜桃成人免费视频 | 国产在线视频在线观看 | 99久久成人| 综合久久久久综合 | 日本寂寞少妇 | 黄色a在线观看 | 91久久人澡人人添人人爽欧美 | 久久久7777 | 偷偷操不一样的99 | 天天搞夜夜 | 与子敌伦刺激对白播放的优点 | 琪琪色视频 | 国产主播在线播放 | wwwav在线| 免费在线观看av片 | 99久久精品免费看 | 黄色成人免费视频 | 中国肥胖女人真人毛片 | 美女100%无挡 | 第一章豪妇荡乳黄淑珍 | 各种含道具高h调教1v1男男 | 成人一级大片 | 国产性xxxx高清 | h网址在线观看 | 夜色视频在线观看 | 国产精品一区二区久久国产 | 91精品91久久久中77777 | 伊人99re| 韩日av网站 | 亚洲精品网址 | 亚洲国产精品无码久久久 | 另类男人与善交video | avtt久久 | 都市激情亚洲色图 | 1024金沙人妻一区二区三区 | 久久123 | 久久国产二区 | 精品无码av一区二区三区不卡 | 91丨porny丨首页 | 九九视频在线免费观看 | 亚洲第一成人在线 | 国产精品嫩 | 亚洲作爱网| 青青草娱乐视频 | 天堂网2018 | 国产4区 | 久久久久久久一区 | 噜噜噜噜私人影院 | 亚洲精品福利网站 | 天天综合网天天综合 | 欧美一区二区三区久久妖精 | jjzzjjzz欧美69巨大 | 久久天天| 91国产在线播放 | www,xxx日本| 午夜伦伦 | 国产福利午夜 | 成年人的视频网站 | 美女羞羞动态图 | 欧美三级在线看 | 丰满少妇一区二区三区视频 | 国产精品jizz | 午夜精品久久久久久久久久蜜桃 | 97se在线视频 | 钻石午夜影院 | 欧美一区二区三区四区五区六区 | 香蕉精品在线 | 久久午夜免费视频 | 永久免费在线播放 | 俺也去婷婷 | 国产最新在线视频 | 最近高清中文在线字幕在线观看 | 国产二区精品视频 | 日韩无遮挡 | 91亚洲国产成人久久精品麻豆 | 国产视频一区在线 | 欧美在线免费观看 | 亚洲天堂h| 99久久久久久久 |