┌──(root㉿kali)-[~] └─# nmap 10.10.8.128 Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-27 02:11 EDT Nmap scan report for 10.10.8.128 Host is up (0.00040s latency). Not shown: 989 closed tcp ports (reset) PORT STATE SERVICE 135/tcp open msrpc 139/tcp open netbios-ssn 445/tcp open microsoft-ds 3389/tcp open ms-wbt-server 5357/tcp open wsdapi 49152/tcp open unknown 49153/tcp open unknown 49154/tcp open unknown 49155/tcp open unknown 49156/tcp open unknown 49157/tcp open unknown MAC Address: 00:0C:29:98:0C:70 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 18.13 seconds
扫描存活主机
可以使用 -sn 参数快速判断对方存活主机:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
┌──(root㉿kali)-[~] └─# nmap -sn 10.10.8.0/24 Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-27 02:16 EDT Nmap scan report for 10.10.8.1 Host is up (0.00011s latency). MAC Address: 00:50:56:C0:00:08 (VMware) Nmap scan report for 10.10.8.2 Host is up (0.00019s latency). MAC Address: 00:50:56:EF:47:C3 (VMware) Nmap scan report for 10.10.8.128 Host is up (0.00014s latency). MAC Address: 00:0C:29:98:0C:70 (VMware) Nmap scan report for 10.10.8.254 Host is up (0.00019s latency). MAC Address: 00:50:56:FD:A4:C1 (VMware) Nmap scan report for 10.10.8.134 Host is up. Nmap done: 256 IP addresses (5 hosts up) scanned in 6.32 seconds
┌──(root㉿kali)-[~] └─# nmap -p1-65535 --min-rate 10000 10.10.8.128 Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-27 02:21 EDT Nmap scan report for 10.10.8.128 Host is up (0.00047s latency). Not shown: 65524 closed tcp ports (reset) PORT STATE SERVICE 135/tcp open msrpc 139/tcp open netbios-ssn 445/tcp open microsoft-ds 3389/tcp open ms-wbt-server 5357/tcp open wsdapi 49152/tcp open unknown 49153/tcp open unknown 49154/tcp open unknown 49155/tcp open unknown 49156/tcp open unknown 49157/tcp open unknown MAC Address: 00:0C:29:98:0C:70 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 26.31 seconds
┌──(root㉿kali)-[~] └─# nmap -p135,139,445,3389,5537 --min-rate 10000 -sV -O 10.10.8.128 Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-27 02:53 EDT Nmap scan report for 10.10.8.128 Host is up (0.00057s latency).
PORT STATE SERVICE VERSION 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds Microsoft Windows 7 - 10 microsoft-ds (workgroup: WORKGROUP) 3389/tcp open ms-wbt-server? 5537/tcp closed unknown MAC Address: 00:0C:29:98:0C:70 (VMware) Device type: general purpose Running: Microsoft Windows 7|2008|8.1 OS CPE: cpe:/o:microsoft:windows_7::- cpe:/o:microsoft:windows_7::sp1 cpe:/o:microsoft:windows_server_2008::sp1 cpe:/o:microsoft:windows_server_2008:r2 cpe:/o:microsoft:windows_8 cpe:/o:microsoft:windows_8.1 OS details: Microsoft Windows 7 SP0 - SP1, Windows Server 2008 SP1, Windows Server 2008 R2, Windows 8, or Windows 8.1 Update 1 Network Distance: 1 hop Service Info: Host: SECURITY-PC; OS: Windows; CPE: cpe:/o:microsoft:windows
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 29.49 seconds
┌──(root㉿kali)-[~] └─# nmap --script=vuln --min-rate 10000 10.10.8.128 Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-27 02:25 EDT Nmap scan report for 10.10.8.128 Host is up (0.0011s latency). Not shown: 989 closed tcp ports (reset) PORT STATE SERVICE 135/tcp open msrpc 139/tcp open netbios-ssn 445/tcp open microsoft-ds 3389/tcp open ms-wbt-server 5357/tcp open wsdapi 49152/tcp open unknown 49153/tcp open unknown 49154/tcp open unknown 49155/tcp open unknown 49156/tcp open unknown 49157/tcp open unknown MAC Address: 00:0C:29:98:0C:70 (VMware)
Host script results: |_samba-vuln-cve-2012-1182: NT_STATUS_ACCESS_DENIED | smb-vuln-ms17-010: | VULNERABLE: | Remote Code Execution vulnerability in Microsoft SMBv1 servers (ms17-010) | State: VULNERABLE | IDs: CVE:CVE-2017-0143 | Risk factor: HIGH | A critical remote code execution vulnerability exists in Microsoft SMBv1 | servers (ms17-010). | | Disclosure date: 2017-03-14 | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0143 | https://technet.microsoft.com/en-us/library/security/ms17-010.aspx |_ https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/ |_smb-vuln-ms10-061: NT_STATUS_ACCESS_DENIED |_smb-vuln-ms10-054: false
Nmap done: 1 IP address (1 host up) scanned in 112.02 seconds