日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 编程资源 > 编程问答 >内容正文

编程问答

nmap 扫描常见漏洞

發布時間:2025/3/21 编程问答 29 豆豆
生活随笔 收集整理的這篇文章主要介紹了 nmap 扫描常见漏洞 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

加上 --script=vuln 參數就可以了

nmap -T4 -A -v 192.168.1.133 --script=vuln

掃描結果,發現了兩個可用的漏洞

Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-09 22:51 CST NSE: Loaded 149 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 22:51 Completed NSE at 22:51, 10.01s elapsed Initiating NSE at 22:51 Completed NSE at 22:51, 0.00s elapsed Initiating ARP Ping Scan at 22:51 Scanning 192.168.1.133 [1 port] Completed ARP Ping Scan at 22:51, 0.00s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 22:51 Completed Parallel DNS resolution of 1 host. at 22:51, 0.00s elapsed Initiating SYN Stealth Scan at 22:51 Scanning sb-abae96df44ac.lan (192.168.1.133) [1000 ports] Discovered open port 135/tcp on 192.168.1.133 Discovered open port 139/tcp on 192.168.1.133 Discovered open port 1025/tcp on 192.168.1.133 Discovered open port 445/tcp on 192.168.1.133 Discovered open port 23/tcp on 192.168.1.133 Completed SYN Stealth Scan at 22:51, 1.25s elapsed (1000 total ports) Initiating Service scan at 22:51 Scanning 5 services on sb-abae96df44ac.lan (192.168.1.133) Completed Service scan at 22:51, 6.01s elapsed (5 services on 1 host) Initiating OS detection (try #1) against sb-abae96df44ac.lan (192.168.1.133) NSE: Script scanning 192.168.1.133. Initiating NSE at 22:51 Completed NSE at 22:51, 10.68s elapsed Initiating NSE at 22:51 Completed NSE at 22:51, 0.10s elapsed Nmap scan report for sb-abae96df44ac.lan (192.168.1.133) Host is up (0.00035s latency). Not shown: 995 closed ports PORT STATE SERVICE VERSION 23/tcp open telnet Microsoft Windows XP telnetd |_clamav-exec: ERROR: Script execution failed (use -d to debug) 135/tcp open msrpc Microsoft Windows RPC |_clamav-exec: ERROR: Script execution failed (use -d to debug) 139/tcp open netbios-ssn Microsoft Windows netbios-ssn |_clamav-exec: ERROR: Script execution failed (use -d to debug) 445/tcp open microsoft-ds Microsoft Windows 2003 or 2008 microsoft-ds |_clamav-exec: ERROR: Script execution failed (use -d to debug) 1025/tcp open msrpc Microsoft Windows RPC |_clamav-exec: ERROR: Script execution failed (use -d to debug) MAC Address: 08:00:27:63:28:BF (Oracle VirtualBox virtual NIC) Device type: general purpose Running: Microsoft Windows 2003 OS CPE: cpe:/o:microsoft:windows_server_2003::sp1 cpe:/o:microsoft:windows_server_2003::sp2 OS details: Microsoft Windows Server 2003 SP1 or SP2 Network Distance: 1 hop TCP Sequence Prediction: Difficulty=256 (Good luck!) IP ID Sequence Generation: Incremental Service Info: OSs: Windows XP, Windows; CPE: cpe:/o:microsoft:windows_xp, cpe:/o:microsoft:windows, cpe:/o:microsoft:windows_server_2003Host script results: | smb-vuln-ms08-067: | VULNERABLE: | Microsoft Windows system vulnerable to remote code execution (MS08-067) | State: VULNERABLE | IDs: CVE:CVE-2008-4250 | The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, | Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary | code via a crafted RPC request that triggers the overflow during path canonicalization. | | Disclosure date: 2008-10-23 | References: | https://technet.microsoft.com/en-us/library/security/ms08-067.aspx |_ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4250 |_smb-vuln-ms10-054: false |_smb-vuln-ms10-061: NT_STATUS_OBJECT_NAME_NOT_FOUND | smb-vuln-ms17-010: | VULNERABLE: | Remote Code Execution vulnerability in Microsoft SMBv1 servers (ms17-010) | State: VULNERABLE | IDs: CVE:CVE-2017-0143 | Risk factor: HIGH | A critical remote code execution vulnerability exists in Microsoft SMBv1 | servers (ms17-010). | | Disclosure date: 2017-03-14 | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0143 | https://technet.microsoft.com/en-us/library/security/ms17-010.aspx |_ https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/TRACEROUTE HOP RTT ADDRESS 1 0.35 ms sb-abae96df44ac.lan (192.168.1.133)NSE: Script Post-scanning. Initiating NSE at 22:51 Completed NSE at 22:51, 0.00s elapsed Initiating NSE at 22:51 Completed NSE at 22:51, 0.00s elapsed Read data files from: /usr/bin/../share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 31.46 secondsRaw packets sent: 1109 (49.494KB) | Rcvd: 1017 (41.242KB)

總結

以上是生活随笔為你收集整理的nmap 扫描常见漏洞的全部內容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。

主站蜘蛛池模板: a天堂在线 | 插插插综合视频 | 国产一区二区视频免费观看 | 日韩免费精品视频 | 国产做爰xxxⅹ性视频国 | www.黄色.| 91精品国产乱码 | 国产拍拍拍 | av片在线观看免费 | 亚洲香蕉在线视频 | 2021av | 成人在线播放网站 | 韩国三级hd中文字幕的背景音乐 | 国产成年网站 | 黄色777 | 亚洲性色av| 久久成人精品 | 国产精品theporn88 | 国产亚洲小视频 | 深夜网站在线观看 | 秋霞毛片 | 高h捆绑拘束调教小说 | 国产精品久久久久久三级 | 免费毛片观看 | 阿v天堂2014 这里有精品 | 欧美大肚乱孕交hd孕妇 | 另类专区亚洲 | 欧美精品第二页 | 久久久免费av | av片手机在线观看 | 欧美在线v | 日韩七区 | 黄色日b片 | 一区二区在线视频播放 | 无码人妻丰满熟妇啪啪欧美 | 网站色| 羞羞成人 | 久久99久久99精品免视看婷婷 | 精品97人妻无码中文永久在线 | 一级少妇精品久久久久久久 | 正在播放一区 | 免费污网站在线观看 | 欧洲久久久 | 久久精热 | 一本一道久久a久久综合蜜桃 | 淫僧荡尼巨乳(h)小说 | 成人在线视频免费观看 | 日韩精品视频观看 | 国产剧情精品 | 少妇一级视频 | 久久久久免费 | 亚洲欧美激情小说另类 | 国产极品美女高潮无套嗷嗷叫酒店 | 国产精品电影在线观看 | 亚洲永久在线观看 | 午夜av网 | 每日更新av| 中文字幕系列 | 欧美激情免费在线观看 | 波多野结衣在线视频免费观看 | 中文字幕在线导航 | 国产黄色视屏 | 风流老熟女一区二区三区 | 日日狠狠久久偷偷四色综合免费 | 亚洲精品成人 | 国产精品成人国产乱一区 | 95看片淫黄大片一级 | 北条麻妃在线一区 | av在线网站观看 | 亚洲AV综合色区国产精品天天 | 97国产在线 | 国产专区一区二区三区 | 国产精品一区av | 久久综合影视 | av中文字幕免费在线观看 | 人妻在客厅被c的呻吟 | 亚洲国产精品成人久久蜜臀 | 欧美成人黑人xx视频免费观看 | 国产精品日韩欧美一区二区三区 | 在线观看免费av网站 | 国产成人精品亚洲精品色欲 | 超碰人人99 | 日本大胆人体视频 | 韩国bj大尺度vip福利网站 | 色黄啪啪网 | 亚洲视频在线观看网址 | 香蕉视频在线播放 | 无码国内精品人妻少妇蜜桃视频 | 奇米第四色7777 | 久章草在线观看 | 成人精品一区二区三区在线 | 麻豆传媒视频入口 | 伊人久久大香线蕉成人综合网 | 日韩在线免费播放 | 一区二区国产欧美 | 在线免费日韩 | 欧美一区二区在线视频 | 视频一区亚洲 | 国产精品毛片一区二区在线看舒淇 |