刚刚用Metasploit Pro scan了一下云端服务器。RHOST直接输IP就好。
得到反馈如下:
[*] [2019.04.04-14:27:35] Scan initiated: Speed: 5, Max: 300m (Portscanning) (UDP probes) (Finger enumeration) (H.323 probes)
[+] [2019.04.04-14:27:35] Workspace:default Progress:1/177 (0%) Sweeping 10.0.165.30 with Nmap4 probes
[*] [2019.04.04-14:27:35] Scanning 1 hosts...
[*] [2019.04.04-14:27:51] Nmap Command (data:/opt/metasploit/common/share/nmap): /opt/metasploit/common/bin/nmap -sS -T5 -PP -PE -PM -PI -PA20,53,80,113,443,5060,10043 --host-timeout=300m -O --max-rtt-timeout=3000ms --initial-rtt-timeout=1000ms --min-rtt-timeout=1000ms --max-retries=2 --stats-every 10s --traceroute --min-hostgroup=64 -PS1,7,9,13,19,21-23,25,37,42,49,53,69-70,79-81,85,88,105,109-111,113,119,123,135,137-139,143,161,179,222,264,384,389,402,407,443-446,465,500,502,512-515,523-524,540,548,554,587,617,623,631,655,689,705,771,783,831,873,888,902,910,912,921,993,995,998-1000,1024-1025,1030,1035,1090,1098-1103,1128-1129,1158,1199,1211,1220,1234,1241,1300,1311,1352,1414,1433-1435,1440,1471,1494,1521,1530,1533,1581-1582,1604,1720,1723,1743,1755,1811,1883,1900,2000-2001,2049,2067,2100,2103,2121,2199,2207,2222,2323,2362,2375,2379-2381,2404,2480,2525,2533,2598,2638,2809-2810,2947,2967,2990,3000-3001,3037,3050,3057,3128,3181,3200,3217,3273,3299,3306,3310,3333,3389,3460,3465,3500,3628,3632,3690,3702,3780,3790,3817,3900,4000,4070,4322,4433,4444-4445,4592,4659,4672,4679,4750,4786,4800,4848,5000,5009,5038,5040,5051,5060-5061,5093,5168,5180,5227,5247,5250,5351,5353,5355,5400,5405,5432-5433,5466,5498,5520-5521,5554-5555,5560,5580,5631-5632,5666,5800,5814,5858,5900-5910,5920,5984-5986,5999-6000,6050,6060,6066,6070,6080,6082,6101,6106,6112,6161,6262,6379,6405,6502-6504,6542,6660-6661,6667,6789,6905,6988,6996,7000-7001,7021,7071,7080,7144,7181,7210,7272,7414,7426,7443,7510,7547,7579-7580,7700,7770,7777-7778,7787,7800-7801,7878-7879,7890,7902,8000-8001,8008,8014,8020,8023,8028,8030,8050-8051,8080-8082,8085-8088,8090-8091,8095,8101,8161,8180-8181,8205,8222,8300,8303,8333,8400,8443-8445,8500,8503,8642,8686,8701,8787,8800,8812,8834,8880,8883,8888-8890,8899,8901-8903,8980,8999-9005,9010,9050,9080-9081,9084,9090,9099-9100,9111,9124,9152,9200,9251,9256,9300,9390-9391,9495,9500,9711,9788,9809-9815,9855,9875-9876,9910,9991,9999-10001,10008,10050-10051,10080,10098-10099,10162,10202-10203,10333,10443,10616,10628,11000-11001,11099,11211,11234,11333,11460,12000,12174,12203,12221,12345,12397,12401,13003,13013,13364,13500,13579,13838,14000,14330,15000-15001,15200,16000,16102,16992,17185,17200,18881,18980,19300,19810,20000,20010,20031,20034,20101,20111,20171,20222,20256,22006,22222,23423,23472,23791,23943,25000,25025,25672,26000,26122,26256,27000,27015,27017,27888,27960,28222,28784,30000,30718,31001,31099,32022,32764,32913,33000,34205,34443,37718,37777,38080,38292,40007,41025,41080,41523-41524,44334,44818,45230,46823-46824,47001-47002,48080,48899,49152,50000-50004,50013,50050,50500-50504,52302,52869,53413,54345,55552-55554,57772,62078,62514,65535 --min-rate=500 -PU40830 -iL /tmp/nmap20190404-355-oh4ldn -p1,7,9,13,19,21-23,25,37,42,49,53,69-70,79-81,85,88,105,109-111,113,119,123,135,137-139,143,161,179,222,264,384,389,402,407,443-446,465,500,502,512-515,523-524,540,548,554,587,617,623,631,655,689,705,771,783,831,873,888,902,910,912,921,993,995,998-1000,1024-1025,1030,1035,1090,1098-1103,1128-1129,1158,1199,1211,1220,1234,1241,1300,1311,1352,1414,1433-1435,1440,1471,1494,1521,1530,1533,1581-1582,1604,1720,1723,1743,1755,1811,1883,1900,2000-2001,2049,2067,2100,2103,2121,2199,2207,2222,2323,2362,2375,2379-2381,2404,2480,2525,2533,2598,2638,2809-2810,2947,2967,2990,3000-3001,3037,3050,3057,3128,3181,3200,3217,3273,3299,3306,3310,3333,3389,3460,3465,3500,3628,3632,3690,3702,3780,3790,3817,3900,4000,4070,4322,4433,4444-4445,4592,4659,4672,4679,4750,4786,4800,4848,5000,5009,5038,5040,5051,5060-5061,5093,5168,5180,5227,5247,5250,5351,5353,5355,5400,5405,5432-5433,5466,5498,5520-5521,5554-5555,5560,5580,5631-5632,5666,5800,5814,5858,5900-5910,5920,5984-5986,5999-6000,6050,6060,6066,6070,6080,6082,6101,6106,6112,6161,6262,6379,6405,6502-6504,6542,6660-6661,6667,6789,6905,6988,6996,7000-7001,7021,7071,7080,7144,7181,7210,7272,7414,7426,7443,7510,7547,7579-7580,7700,7770,7777-7778,7787,7800-7801,7878-7879,7890,7902,8000-8001,8008,8014,8020,8023,8028,8030,8050-8051,8080-8082,8085-8088,8090-8091,8095,8101,8161,8180-8181,8205,8222,8300,8303,8333,8400,8443-8445,8500,8503,8642,8686,8701,8787,8800,8812,8834,8880,8883,8888-8890,8899,8901-8903,8980,8999-9005,9010,9050,9080-9081,9084,9090,9099-9100,9111,9124,9152,9200,9251,9256,9300,9390-9391,9495,9500,9711,9788,9809-9815,9855,9875-9876,9910,9991,9999-10001,10008,10050-10051,10080,10098-10099,10162,10202-10203,10333,10443,10616,10628,11000-11001,11099,11211,11234,11333,11460,12000,12174,12203,12221,12345,12397,12401,13003,13013,13364,13500,13579,13838,14000,14330,15000-15001,15200,16000,16102,16992,17185,17200,18881,18980,19300,19810,20000,20010,20031,20034,20101,20111,20171,20222,20256,22006,22222,23423,23472,23791,23943,25000,25025,25672,26000,26122,26256,27000,27015,27017,27888,27960,28222,28784,30000,30718,31001,31099,32022,32764,32913,33000,34205,34443,37718,37777,38080,38292,40007,41025,41080,41523-41524,44334,44818,45230,46823-46824,47001-47002,48080,48899,49152,50000-50004,50013,50050,50500-50504,52302,52869,53413,54345,55552-55554,57772,62078,62514,65535
[*] [2019.04.04-14:27:51] Nmap Output:
[*] [2019.04.04-14:27:51] Nmap Output: Starting Nmap 7.01 ( https://nmap.org ) at 2019-04-04 14:27 CST
[*] [2019.04.04-14:27:57] Nmap Output: Nmap scan report for 10.0.165.30
[*] [2019.04.04-14:27:57] Nmap Output: Host is up (0.011s latency).
[*] [2019.04.04-14:27:57] Nmap Output: Not shown: 501 closed ports
[*] [2019.04.04-14:27:57] Nmap Output: PORT STATE SERVICE
[*] [2019.04.04-14:27:57] Nmap Output: 22/tcp open ssh
[*] [2019.04.04-14:27:57] Nmap Output: 80/tcp open http
[*] [2019.04.04-14:27:57] Nmap Output: 443/tcp open https
[*] [2019.04.04-14:27:57] Nmap Output: 1883/tcp open unknown
[*] [2019.04.04-14:27:57] Nmap Output: 3306/tcp open mysql
[*] [2019.04.04-14:27:57] Nmap Output: 5000/tcp open upnp
[*] [2019.04.04-14:27:57] Nmap Output: 8000/tcp open http-alt
[*] [2019.04.04-14:27:57] Nmap Output: 9100/tcp open jetdirect
[*] [2019.04.04-14:27:57] Nmap Output: 10050/tcp open unknown
[*] [2019.04.04-14:27:57] Nmap Output: Device type: general purpose
[*] [2019.04.04-14:27:57] Nmap Output: Running: Linux 3.X|4.X
[*] [2019.04.04-14:27:57] Nmap Output: OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
[*] [2019.04.04-14:27:57] Nmap Output: OS details: Linux 3.2 - 4.0
[*] [2019.04.04-14:27:57] Nmap Output: Network Distance: 2 hops
[*] [2019.04.04-14:27:57] Nmap Output:
[*] [2019.04.04-14:27:57] Nmap Output: TRACEROUTE (using port 110/tcp)
[*] [2019.04.04-14:27:57] Nmap Output: HOP RTT ADDRESS
[*] [2019.04.04-14:27:57] Nmap Output: 1 10.55 ms 10.0.176.1
[*] [2019.04.04-14:27:57] Nmap Output: 2 3.06 ms 10.0.165.30
[*] [2019.04.04-14:27:57] Nmap Output:
[*] [2019.04.04-14:27:57] Nmap Output: OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
[*] [2019.04.04-14:27:57] Nmap Output: Nmap done: 1 IP address (1 host up) scanned in 5.74 seconds
[*] [2019.04.04-14:27:57] Nmap Results: Importing scan data.
[+] [2019.04.04-14:27:57] Workspace:default Progress:3/177 (1%) Sweeping 10.0.165.30 with UDP probes
[*] [2019.04.04-14:27:57] Sending 13 probes to 10.0.165.30->10.0.165.30 (1 hosts)
[+] [2019.04.04-14:28:12] Workspace:default Progress:5/177 (2%) Sweeping 10.0.165.30 with HTTP probes
[+] [2019.04.04-14:28:12] 10.0.165.30:80 nginx/1.10.3 (Ubuntu)
[+] [2019.04.04-14:28:13] 10.0.165.30:443 nginx/1.10.3 (Ubuntu)
[+] [2019.04.04-14:28:13] 10.0.165.30:8000 nginx/1.10.3 (Ubuntu)
[+] [2019.04.04-14:28:13] Workspace:default Progress:45/177 (25%) Sweeping 10.0.165.30 with SSH probes
[+] [2019.04.04-14:28:13] 10.0.165.30:22 - SSH server version: SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.7 ( service.version=7.2p2 openssh.comment=Ubuntu-4ubuntu2.7 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH service.cpe23=cpe:/a:openbsd:openssh:7.2p2 os.vendor=Ubuntu os.family=Linux os.product=Linux os.certainty=0.75 os.cpe23=cpe:/o:canonical:ubuntu_linux:- service.protocol=ssh fingerprint_db=ssh.banner )
[+] [2019.04.04-14:28:13] Workspace:default Progress:57/177 (32%) Sweeping 10.0.165.30 with MySQL probes
[*] [2019.04.04-14:28:13] 10.0.165.30:3306 - 10.0.165.30:3306 is running MySQL, but responds with an error: \x04Host '10.0.176.101' is not allowed to connect to this MySQL server
[+] [2019.04.04-14:28:13] Workspace:default Progress:63/177 (35%) Sweeping 10.0.165.30 with VxWorks probes
[+] [2019.04.04-14:28:23] Workspace:default Progress:168/177 (94%) Sweeping 10.0.165.30 with WinRM probes
[-] [2019.04.04-14:28:23] 10.0.165.30:80 Does not appear to be a WinRM server
[-] [2019.04.04-14:28:23] 10.0.165.30:443 Does not appear to be a WinRM server
[+] [2019.04.04-14:28:23] Workspace:default Progress:172/177 (97%) Normalizing system information
[+] [2019.04.04-14:28:24] Workspace:default Progress:1/2 (50%) Normalizing 10.0.165.30
[+] [2019.04.04-14:28:24] Workspace:default Progress:2/2 (100%) Normalization complete
[+] [2019.04.04-14:28:24] Workspace:default Progress:173/177 (97%) Identifying unknown services
[+] [2019.04.04-14:28:24] Workspace:default Progress:174/177 (98%) Normalizing system information for newly identified services
[+] [2019.04.04-14:28:24] Workspace:default Progress:1/2 (50%) Normalizing 10.0.165.30
[+] [2019.04.04-14:28:24] Workspace:default Progress:2/2 (100%) Normalization complete
[+] [2019.04.04-14:28:24] Workspace:default Progress:175/177 (98%) Sweeping newly found services
[+] [2019.04.04-14:28:24] Workspace:default Progress:176/177 (99%) Normalizing system information for newly identified services
[+] [2019.04.04-14:28:24] Workspace:default Progress:1/2 (50%) Normalizing 10.0.165.30
[+] [2019.04.04-14:28:24] Workspace:default Progress:2/2 (100%) Normalization complete
[+] [2019.04.04-14:28:24] Discovered Host: 10.0.165.30 (10.0.165.30)
[+] [2019.04.04-14:28:24] Workspace:default Progress:177/177 (100%) Sweep of 10.0.165.30-10.0.165.30 complete (1 new host, 9 new services)
- 开通博客第一天,记录此时此刻,开始学习加强c#
从2017年6月毕业到现在,不断的学习.net,在工作中不断的加强技术,终于在此时此刻决定开通博客,记录此后每一天学习的技术点,两年来,每天所涉及的技术点很杂,学了这个忘了那个,总感觉在进步却总是觉得 ...
- Oracle 数据库中对记录进行分页处理——学习笔记
学习到 oracle 的视图的时候,了解到对 Oracle 中数据的记录进行分页处理和 Mysql 提供的 limit 来进行分页处理大有不同,limit 是 mysql 中特有的关键字. 那么在 o ...
- web进阶之jQuery操作DOM元素&&MySQL记录操作&&PHP面向对象学习笔记
hi 保持学习数量和质量 1.jQuery操作DOM元素 ----使用attr()方法控制元素的属性 attr()方法的作用是设置或者返回元素的属性,其中attr(属性名)格式是获取元素属性名的值,a ...
- 2016 5.03开始记录我的it学习。
好多谢立成师兄给我这个网址,我发现博客园不仅仅可以随笔记载很多东西,还是一个资源丰富的网站,接下来的四年我会用心去记录这些学习的点滴.
- [转]Oracle学习记录 九 Prc C学习
经过前面的了解,现在想用C语言来编程了,搜索了很多东西,后来决定先用Pro C来进行学习 在安装完Oracle数据库后就可以进行编程了,里面有一个命令proc就是对程序进行预编译的. 在这记一下,这是 ...
- 【IOS实例小计】今日开贴,记录我的ios学习生涯,留下点滴,留下快乐,成荫后人。
今天开贴来记录自己的ios学习过程,本人目前小白一个,由于对ios感兴趣,所以开始学习,原职java程序,呵呵,勿喷. 本次的[ios实例小计]主要参考一文http://blog.sina.com.c ...
- 记录我的 python 学习历程-Day13 匿名函数、内置函数 II、闭包
一.匿名函数 以后面试或者工作中经常用匿名函数 lambda,也叫一句话函数. 课上练习: # 正常函数: def func(a, b): return a + b print(func(4, 6)) ...
- 程序语言与编程实践4-> 蓝桥杯C/C++备赛记录2 | 第二周学习训练
0323,又是一周星期三,按道理该总结了.这周前几天写题比较多,后面事情多了起来,就没怎么写了.主要方向是洛谷的基本语法熟悉,PTA平台数据结构的一些题目. 0323附上: 题目比较多,所以文章可能有 ...
- 记录一次Quartz2D学习(一)
经常看点 drawRect的重写 但是不知道这究竟是神马 今天开始学习这一块的东西,更确切地说是深入 早在view的时候 就经常会调用layer的maskToBounds属性,其实 重写 drawR ...
随机推荐
- Angularjs 滚动条控制
控制滚动条 依赖 $location, $anchorScroll $scope.gotoTop = function () { $location.hash("top"); $a ...
- ajax 常用功能 结构分解
ajax 和后台交互基本结构 0.触发的事件. 1.获取参数 2.url 3.请求方法get/post 4.对返回结果的处理 .done如果有返加 .fail 失败 $(function () { / ...
- 关于HTML5中的sessionStorage的会话级缓存使用
sessionStorage作为HTML5的Web Storage的两种存储方式之一. 用于本地存储一个会话(session)中的数据,这些数据只有在同一个会话中的页面才能访问并且当会话结束后数 ...
- synchronized 同步函数的竞争关系验证
synchronized是Java中的关键字,是一种同步锁.它修饰的对象有以下几种: 1. 修饰一个代码块,被修饰的代码块称为同步语句块,其作用的范围是大括号{}括起来的代码,作用的对象是调用这个代码 ...
- Struts2源码解析-----转载
前面一节描述的Struts2很多东西,这节是对源码进行分析描述,通过这一节应该对struts2有了清楚认识! 还是把Struts2这个框图贴出来: 第一步:HttpServletRequest进入到S ...
- mongodb cxx driver学习
mongodb 增删改查 insert 向集合中增加一个文档 remove 删除文档 update 更新(修改)某些文档 文档替换 文档修改器,只修改文档某个部分 find 返回集合中所有文档 fin ...
- mysql 函数介绍
含义 一组预先编译好的SQL语句集合,可以理解成批处理语句 提高代码的重用性 简化操作 减少了编译次数并且减少了和数据库服务器的连接次数, 提高了效率 区别 : 存储过程:可以有0个返回,也可以有多个 ...
- A Model of Saliency-Based Visual Attention for Rapid Scene Analysis
A Model of Saliency-Based Visual Attention for Rapid Scene Analysis 题目:A Model of Saliency-Based Vis ...
- Linux 查看网络状态工具
1. iftop 效果如下图: 界面上面显示的是类似刻度尺的刻度范围,为显示流量图形的长条作标尺用的. 中间的<= =>这两个左右箭头,表示的是流量的方向. TX:发送流量RX:接收流量T ...
- oo第八次作业
oo第八次作业 第五次作业分析: 1.度量图: 2.类图: 第五次作业由于是第一次接触多线程,所以导致自己的经验不足,因此最终也没有完成作业,到最后任然不能实现三部电梯的有效调度,所以导致了这次作业的 ...