刚刚用Metasploit Pro scan了一下云端服务器。RHOST直接输IP就好。

得到反馈如下:

[*] [2019.04.04-14:27:35] Scan initiated: Speed: 5, Max: 300m (Portscanning) (UDP probes) (Finger enumeration) (H.323 probes)
[+] [2019.04.04-14:27:35] Workspace:default Progress:1/177 (0%) Sweeping 10.0.165.30 with Nmap4 probes
[*] [2019.04.04-14:27:35] Scanning 1 hosts...
[*] [2019.04.04-14:27:51] Nmap Command (data:/opt/metasploit/common/share/nmap): /opt/metasploit/common/bin/nmap -sS -T5 -PP -PE -PM -PI -PA20,53,80,113,443,5060,10043 --host-timeout=300m -O --max-rtt-timeout=3000ms --initial-rtt-timeout=1000ms --min-rtt-timeout=1000ms --max-retries=2 --stats-every 10s --traceroute --min-hostgroup=64 -PS1,7,9,13,19,21-23,25,37,42,49,53,69-70,79-81,85,88,105,109-111,113,119,123,135,137-139,143,161,179,222,264,384,389,402,407,443-446,465,500,502,512-515,523-524,540,548,554,587,617,623,631,655,689,705,771,783,831,873,888,902,910,912,921,993,995,998-1000,1024-1025,1030,1035,1090,1098-1103,1128-1129,1158,1199,1211,1220,1234,1241,1300,1311,1352,1414,1433-1435,1440,1471,1494,1521,1530,1533,1581-1582,1604,1720,1723,1743,1755,1811,1883,1900,2000-2001,2049,2067,2100,2103,2121,2199,2207,2222,2323,2362,2375,2379-2381,2404,2480,2525,2533,2598,2638,2809-2810,2947,2967,2990,3000-3001,3037,3050,3057,3128,3181,3200,3217,3273,3299,3306,3310,3333,3389,3460,3465,3500,3628,3632,3690,3702,3780,3790,3817,3900,4000,4070,4322,4433,4444-4445,4592,4659,4672,4679,4750,4786,4800,4848,5000,5009,5038,5040,5051,5060-5061,5093,5168,5180,5227,5247,5250,5351,5353,5355,5400,5405,5432-5433,5466,5498,5520-5521,5554-5555,5560,5580,5631-5632,5666,5800,5814,5858,5900-5910,5920,5984-5986,5999-6000,6050,6060,6066,6070,6080,6082,6101,6106,6112,6161,6262,6379,6405,6502-6504,6542,6660-6661,6667,6789,6905,6988,6996,7000-7001,7021,7071,7080,7144,7181,7210,7272,7414,7426,7443,7510,7547,7579-7580,7700,7770,7777-7778,7787,7800-7801,7878-7879,7890,7902,8000-8001,8008,8014,8020,8023,8028,8030,8050-8051,8080-8082,8085-8088,8090-8091,8095,8101,8161,8180-8181,8205,8222,8300,8303,8333,8400,8443-8445,8500,8503,8642,8686,8701,8787,8800,8812,8834,8880,8883,8888-8890,8899,8901-8903,8980,8999-9005,9010,9050,9080-9081,9084,9090,9099-9100,9111,9124,9152,9200,9251,9256,9300,9390-9391,9495,9500,9711,9788,9809-9815,9855,9875-9876,9910,9991,9999-10001,10008,10050-10051,10080,10098-10099,10162,10202-10203,10333,10443,10616,10628,11000-11001,11099,11211,11234,11333,11460,12000,12174,12203,12221,12345,12397,12401,13003,13013,13364,13500,13579,13838,14000,14330,15000-15001,15200,16000,16102,16992,17185,17200,18881,18980,19300,19810,20000,20010,20031,20034,20101,20111,20171,20222,20256,22006,22222,23423,23472,23791,23943,25000,25025,25672,26000,26122,26256,27000,27015,27017,27888,27960,28222,28784,30000,30718,31001,31099,32022,32764,32913,33000,34205,34443,37718,37777,38080,38292,40007,41025,41080,41523-41524,44334,44818,45230,46823-46824,47001-47002,48080,48899,49152,50000-50004,50013,50050,50500-50504,52302,52869,53413,54345,55552-55554,57772,62078,62514,65535 --min-rate=500 -PU40830 -iL /tmp/nmap20190404-355-oh4ldn -p1,7,9,13,19,21-23,25,37,42,49,53,69-70,79-81,85,88,105,109-111,113,119,123,135,137-139,143,161,179,222,264,384,389,402,407,443-446,465,500,502,512-515,523-524,540,548,554,587,617,623,631,655,689,705,771,783,831,873,888,902,910,912,921,993,995,998-1000,1024-1025,1030,1035,1090,1098-1103,1128-1129,1158,1199,1211,1220,1234,1241,1300,1311,1352,1414,1433-1435,1440,1471,1494,1521,1530,1533,1581-1582,1604,1720,1723,1743,1755,1811,1883,1900,2000-2001,2049,2067,2100,2103,2121,2199,2207,2222,2323,2362,2375,2379-2381,2404,2480,2525,2533,2598,2638,2809-2810,2947,2967,2990,3000-3001,3037,3050,3057,3128,3181,3200,3217,3273,3299,3306,3310,3333,3389,3460,3465,3500,3628,3632,3690,3702,3780,3790,3817,3900,4000,4070,4322,4433,4444-4445,4592,4659,4672,4679,4750,4786,4800,4848,5000,5009,5038,5040,5051,5060-5061,5093,5168,5180,5227,5247,5250,5351,5353,5355,5400,5405,5432-5433,5466,5498,5520-5521,5554-5555,5560,5580,5631-5632,5666,5800,5814,5858,5900-5910,5920,5984-5986,5999-6000,6050,6060,6066,6070,6080,6082,6101,6106,6112,6161,6262,6379,6405,6502-6504,6542,6660-6661,6667,6789,6905,6988,6996,7000-7001,7021,7071,7080,7144,7181,7210,7272,7414,7426,7443,7510,7547,7579-7580,7700,7770,7777-7778,7787,7800-7801,7878-7879,7890,7902,8000-8001,8008,8014,8020,8023,8028,8030,8050-8051,8080-8082,8085-8088,8090-8091,8095,8101,8161,8180-8181,8205,8222,8300,8303,8333,8400,8443-8445,8500,8503,8642,8686,8701,8787,8800,8812,8834,8880,8883,8888-8890,8899,8901-8903,8980,8999-9005,9010,9050,9080-9081,9084,9090,9099-9100,9111,9124,9152,9200,9251,9256,9300,9390-9391,9495,9500,9711,9788,9809-9815,9855,9875-9876,9910,9991,9999-10001,10008,10050-10051,10080,10098-10099,10162,10202-10203,10333,10443,10616,10628,11000-11001,11099,11211,11234,11333,11460,12000,12174,12203,12221,12345,12397,12401,13003,13013,13364,13500,13579,13838,14000,14330,15000-15001,15200,16000,16102,16992,17185,17200,18881,18980,19300,19810,20000,20010,20031,20034,20101,20111,20171,20222,20256,22006,22222,23423,23472,23791,23943,25000,25025,25672,26000,26122,26256,27000,27015,27017,27888,27960,28222,28784,30000,30718,31001,31099,32022,32764,32913,33000,34205,34443,37718,37777,38080,38292,40007,41025,41080,41523-41524,44334,44818,45230,46823-46824,47001-47002,48080,48899,49152,50000-50004,50013,50050,50500-50504,52302,52869,53413,54345,55552-55554,57772,62078,62514,65535
[*] [2019.04.04-14:27:51] Nmap Output:
[*] [2019.04.04-14:27:51] Nmap Output: Starting Nmap 7.01 ( https://nmap.org ) at 2019-04-04 14:27 CST
[*] [2019.04.04-14:27:57] Nmap Output: Nmap scan report for 10.0.165.30
[*] [2019.04.04-14:27:57] Nmap Output: Host is up (0.011s latency).
[*] [2019.04.04-14:27:57] Nmap Output: Not shown: 501 closed ports
[*] [2019.04.04-14:27:57] Nmap Output: PORT STATE SERVICE
[*] [2019.04.04-14:27:57] Nmap Output: 22/tcp open ssh
[*] [2019.04.04-14:27:57] Nmap Output: 80/tcp open http
[*] [2019.04.04-14:27:57] Nmap Output: 443/tcp open https
[*] [2019.04.04-14:27:57] Nmap Output: 1883/tcp open unknown
[*] [2019.04.04-14:27:57] Nmap Output: 3306/tcp open mysql
[*] [2019.04.04-14:27:57] Nmap Output: 5000/tcp open upnp
[*] [2019.04.04-14:27:57] Nmap Output: 8000/tcp open http-alt
[*] [2019.04.04-14:27:57] Nmap Output: 9100/tcp open jetdirect
[*] [2019.04.04-14:27:57] Nmap Output: 10050/tcp open unknown
[*] [2019.04.04-14:27:57] Nmap Output: Device type: general purpose
[*] [2019.04.04-14:27:57] Nmap Output: Running: Linux 3.X|4.X
[*] [2019.04.04-14:27:57] Nmap Output: OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
[*] [2019.04.04-14:27:57] Nmap Output: OS details: Linux 3.2 - 4.0
[*] [2019.04.04-14:27:57] Nmap Output: Network Distance: 2 hops
[*] [2019.04.04-14:27:57] Nmap Output:
[*] [2019.04.04-14:27:57] Nmap Output: TRACEROUTE (using port 110/tcp)
[*] [2019.04.04-14:27:57] Nmap Output: HOP RTT ADDRESS
[*] [2019.04.04-14:27:57] Nmap Output: 1 10.55 ms 10.0.176.1
[*] [2019.04.04-14:27:57] Nmap Output: 2 3.06 ms 10.0.165.30
[*] [2019.04.04-14:27:57] Nmap Output:
[*] [2019.04.04-14:27:57] Nmap Output: OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
[*] [2019.04.04-14:27:57] Nmap Output: Nmap done: 1 IP address (1 host up) scanned in 5.74 seconds
[*] [2019.04.04-14:27:57] Nmap Results: Importing scan data.
[+] [2019.04.04-14:27:57] Workspace:default Progress:3/177 (1%) Sweeping 10.0.165.30 with UDP probes
[*] [2019.04.04-14:27:57] Sending 13 probes to 10.0.165.30->10.0.165.30 (1 hosts)
[+] [2019.04.04-14:28:12] Workspace:default Progress:5/177 (2%) Sweeping 10.0.165.30 with HTTP probes
[+] [2019.04.04-14:28:12] 10.0.165.30:80 nginx/1.10.3 (Ubuntu)
[+] [2019.04.04-14:28:13] 10.0.165.30:443 nginx/1.10.3 (Ubuntu)
[+] [2019.04.04-14:28:13] 10.0.165.30:8000 nginx/1.10.3 (Ubuntu)
[+] [2019.04.04-14:28:13] Workspace:default Progress:45/177 (25%) Sweeping 10.0.165.30 with SSH probes
[+] [2019.04.04-14:28:13] 10.0.165.30:22 - SSH server version: SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.7 ( service.version=7.2p2 openssh.comment=Ubuntu-4ubuntu2.7 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH service.cpe23=cpe:/a:openbsd:openssh:7.2p2 os.vendor=Ubuntu os.family=Linux os.product=Linux os.certainty=0.75 os.cpe23=cpe:/o:canonical:ubuntu_linux:- service.protocol=ssh fingerprint_db=ssh.banner )
[+] [2019.04.04-14:28:13] Workspace:default Progress:57/177 (32%) Sweeping 10.0.165.30 with MySQL probes
[*] [2019.04.04-14:28:13] 10.0.165.30:3306 - 10.0.165.30:3306 is running MySQL, but responds with an error: \x04Host '10.0.176.101' is not allowed to connect to this MySQL server
[+] [2019.04.04-14:28:13] Workspace:default Progress:63/177 (35%) Sweeping 10.0.165.30 with VxWorks probes
[+] [2019.04.04-14:28:23] Workspace:default Progress:168/177 (94%) Sweeping 10.0.165.30 with WinRM probes
[-] [2019.04.04-14:28:23] 10.0.165.30:80 Does not appear to be a WinRM server
[-] [2019.04.04-14:28:23] 10.0.165.30:443 Does not appear to be a WinRM server
[+] [2019.04.04-14:28:23] Workspace:default Progress:172/177 (97%) Normalizing system information
[+] [2019.04.04-14:28:24] Workspace:default Progress:1/2 (50%) Normalizing 10.0.165.30
[+] [2019.04.04-14:28:24] Workspace:default Progress:2/2 (100%) Normalization complete
[+] [2019.04.04-14:28:24] Workspace:default Progress:173/177 (97%) Identifying unknown services
[+] [2019.04.04-14:28:24] Workspace:default Progress:174/177 (98%) Normalizing system information for newly identified services
[+] [2019.04.04-14:28:24] Workspace:default Progress:1/2 (50%) Normalizing 10.0.165.30
[+] [2019.04.04-14:28:24] Workspace:default Progress:2/2 (100%) Normalization complete
[+] [2019.04.04-14:28:24] Workspace:default Progress:175/177 (98%) Sweeping newly found services
[+] [2019.04.04-14:28:24] Workspace:default Progress:176/177 (99%) Normalizing system information for newly identified services
[+] [2019.04.04-14:28:24] Workspace:default Progress:1/2 (50%) Normalizing 10.0.165.30
[+] [2019.04.04-14:28:24] Workspace:default Progress:2/2 (100%) Normalization complete
[+] [2019.04.04-14:28:24] Discovered Host: 10.0.165.30 (10.0.165.30)
[+] [2019.04.04-14:28:24] Workspace:default Progress:177/177 (100%) Sweep of 10.0.165.30-10.0.165.30 complete (1 new host, 9 new services)

记录一下msf的学习使用的更多相关文章

  1. 开通博客第一天,记录此时此刻,开始学习加强c#

    从2017年6月毕业到现在,不断的学习.net,在工作中不断的加强技术,终于在此时此刻决定开通博客,记录此后每一天学习的技术点,两年来,每天所涉及的技术点很杂,学了这个忘了那个,总感觉在进步却总是觉得 ...

  2. Oracle 数据库中对记录进行分页处理——学习笔记

    学习到 oracle 的视图的时候,了解到对 Oracle 中数据的记录进行分页处理和 Mysql 提供的 limit 来进行分页处理大有不同,limit 是 mysql 中特有的关键字. 那么在 o ...

  3. web进阶之jQuery操作DOM元素&&MySQL记录操作&&PHP面向对象学习笔记

    hi 保持学习数量和质量 1.jQuery操作DOM元素 ----使用attr()方法控制元素的属性 attr()方法的作用是设置或者返回元素的属性,其中attr(属性名)格式是获取元素属性名的值,a ...

  4. 2016 5.03开始记录我的it学习。

    好多谢立成师兄给我这个网址,我发现博客园不仅仅可以随笔记载很多东西,还是一个资源丰富的网站,接下来的四年我会用心去记录这些学习的点滴.

  5. [转]Oracle学习记录 九 Prc C学习

    经过前面的了解,现在想用C语言来编程了,搜索了很多东西,后来决定先用Pro C来进行学习 在安装完Oracle数据库后就可以进行编程了,里面有一个命令proc就是对程序进行预编译的. 在这记一下,这是 ...

  6. 【IOS实例小计】今日开贴,记录我的ios学习生涯,留下点滴,留下快乐,成荫后人。

    今天开贴来记录自己的ios学习过程,本人目前小白一个,由于对ios感兴趣,所以开始学习,原职java程序,呵呵,勿喷. 本次的[ios实例小计]主要参考一文http://blog.sina.com.c ...

  7. 记录我的 python 学习历程-Day13 匿名函数、内置函数 II、闭包

    一.匿名函数 以后面试或者工作中经常用匿名函数 lambda,也叫一句话函数. 课上练习: # 正常函数: def func(a, b): return a + b print(func(4, 6)) ...

  8. 程序语言与编程实践4-> 蓝桥杯C/C++备赛记录2 | 第二周学习训练

    0323,又是一周星期三,按道理该总结了.这周前几天写题比较多,后面事情多了起来,就没怎么写了.主要方向是洛谷的基本语法熟悉,PTA平台数据结构的一些题目. 0323附上: 题目比较多,所以文章可能有 ...

  9. 记录一次Quartz2D学习(一)

    经常看点 drawRect的重写  但是不知道这究竟是神马 今天开始学习这一块的东西,更确切地说是深入 早在view的时候 就经常会调用layer的maskToBounds属性,其实 重写 drawR ...

随机推荐

  1. DDB---查询与优化

    摘要:分布式数据库(Distributed DB)是数据库中非常重要的一个部分,随着要处理的数据越来越多,分布式逐渐成为了一种策略.主要有:分布式操作系统,分布式程序设计语言,分布式文件系统,分布式数 ...

  2. UnitZ Battlegrounds beta5 - Unity吃鸡类型游戏模版 源码 仿绝地求生

    Requires Unity 2018.2.6 or higher.The first battle royale game starter kit on Asset Store, all syste ...

  3. WEB-INF目录下的jsp怎么引用外部文件:js,css等

    在项目中,为了安全.我们通常会将jsp文件放在WEB-INF下面,对于放在WEB-INF下面的js或是css等资源文件.我们通常可以通过相对路径来引用,而如果是放在WEB-INF之外的js 或是 cs ...

  4. CentOS7+CDH5.14.0安装全流程记录,图文详解全程实测-1虚拟机安装及环境初始化

    1.软件准备: VMware-workstation-full-14.1.2-8497320.exe CentOS-7-x86_64-DVD-1804.iso 2.VMare激活码: AU5WA-0E ...

  5. java_31 数据表的操作

    1.主键约束 特点非空,只用于表示当前的记录. 设置主键:create table 表名(sid int primary key); 删除主键:alter table 表名 drop primary ...

  6. Win10下windows mobile设备中心连接不上的方法无法启动

    微软Win10自动更细补丁后windows mobile设备中心就无法启动了 需要重新启动相关的服务并授予 本机登录用户 权限 1.点击屏幕左下角“开始”图标,点击“运行”,在弹出的输入框中输入“se ...

  7. python3 requestsGET请求传参

    GET方式传参方式一: import requests url = 'http://www.baidu.com/s?page=2' # 使用?携带参数 r = requests.get(url) pr ...

  8. GPS坐标系

    本次测试之坑,人车定位偏差,分析如下 车的定位由后台提供,由gps上报位置,采用WGS-84坐标系 前端(app/小程序)使用腾讯地图,或者高德地图,采用的是GCJ-02坐标系,或者在GCJ-02基础 ...

  9. shell逻辑运算总结, 包括[[]]与[]的区别,&&与-a的区别,||与-o的区别

    1. 关于文件和目录 -f  判断某普通文件是否存在 -d  判断某目录是否存在 -b  判断某文件是否块设备 -c  判断某文件是否字符设备 -S  判断某文件是否socket(待修正) -L  判 ...

  10. get windows auth code

    public static WindowsIdentityInfo GetWindowsIdentityInfo(HttpContext context) { WindowsIdentityInfo ...