• ctf:kali工具wireshark,nmap


    wireshark得在视窗里打开

    root@kali:~# nmap --script broadcast-dhcp-discover 
    Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-01 04:48 EST
    Pre-scan script results:
    | broadcast-dhcp-discover: 
    |   Response 1 of 1: 
    |     Interface: eth0
    |     IP Offered: 192.168.3.53
    |     DHCP Message Type: DHCPOFFER
    |     Server Identifier: 192.168.3.1
    |     IP Address Lease Time: 1d00h00m00s
    |     Renewal Time Value: 12h00m00s
    |     Rebinding Time Value: 21h00m00s
    |     Subnet Mask: 255.255.255.0
    |     Router: 192.168.3.1
    |_    Domain Name Server: 192.168.3.1
    WARNING: No targets were specified, so 0 hosts scanned.
    Nmap done: 0 IP addresses (0 hosts up) scanned in 10.28 seconds
                                                                                                                                                                                                          
    root@kali:~# nmap -O 192.168.3.1 -p 80
    Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-01 04:51 EST
    Nmap scan report for 192.168.3.1
    Host is up (0.0046s latency).

    PORT   STATE SERVICE
    80/tcp open  http
    MAC Address: 54:25:EA:99:9A:5C (Huawei Technologies)
    Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
    Device type: general purpose|broadband router
    Running: Linux 2.6.X|3.X
    OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:3.10
    OS details: Linux 2.6.32 - 3.10, Linux 2.6.32 - 3.13, DD-WRT v24 or v30 (Linux 3.10), Linux 3.2 - 3.16
    Network Distance: 1 hop

    OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
    Nmap done: 1 IP address (1 host up) scanned in 1.79 seconds
                                                                                                                                                                                                          
    root@kali:~# nmap -O 192.168.3.86 -p 80
    Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-01 04:51 EST
    Nmap scan report for 192.168.3.86
    Host is up (0.00025s latency).

    PORT   STATE  SERVICE
    80/tcp closed http
    MAC Address: 50:84:92:93:8D:9D (Intel Corporate)
    Too many fingerprints match this host to give specific OS details
    Network Distance: 1 hop

    OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
    Nmap done: 1 IP address (1 host up) scanned in 1.76 seconds
                                                                                                                                                                                                          
    root@kali:~# nmap -O 192.168.3.86      
    Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-01 04:51 EST
    Nmap scan report for 192.168.3.86
    Host is up (0.00020s latency).
    Not shown: 996 closed tcp ports (reset)
    PORT     STATE SERVICE
    135/tcp  open  msrpc
    139/tcp  open  netbios-ssn
    445/tcp  open  microsoft-ds
    8000/tcp open  http-alt
    MAC Address: 50:84:92:93:8D:9D (Intel Corporate)
    Device type: general purpose
    Running: Microsoft Windows 10
    OS CPE: cpe:/o:microsoft:windows_10
    OS details: Microsoft Windows 10 1709 - 1909
    Network Distance: 1 hop

    OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
    Nmap done: 1 IP address (1 host up) scanned in 4.50 seconds
                                                                                                                                                                                                          
    root@kali:~# nmap -O -sV 192.168.3.86
    Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-01 04:54 EST
    Nmap scan report for 192.168.3.86
    Host is up (0.00023s latency).
    Not shown: 996 closed tcp ports (reset)
    PORT     STATE SERVICE       VERSION
    135/tcp  open  msrpc         Microsoft Windows RPC
    139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
    445/tcp  open  microsoft-ds?
    8000/tcp open  http          BaseHTTPServer 0.6 (Python 3.7.4)
    MAC Address: 50:84:92:93:8D:9D (Intel Corporate)
    Device type: general purpose
    Running: Microsoft Windows 10
    OS CPE: cpe:/o:microsoft:windows_10
    OS details: Microsoft Windows 10 1709 - 1909
    Network Distance: 1 hop
    Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

    OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
    Nmap done: 1 IP address (1 host up) scanned in 9.10 seconds
                                                                                                                                                                                                          
    root@kali:~# nmap -O -sV 192.168.3.52
    Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-01 04:57 EST
    Nmap scan report for 192.168.3.52
    Host is up (0.000042s latency).
    Not shown: 999 closed tcp ports (reset)
    PORT   STATE SERVICE VERSION
    22/tcp open  ssh     OpenSSH 9.0p1 Debian 1+b2 (protocol 2.0)
    Device type: general purpose
    Running: Linux 2.6.X
    OS CPE: cpe:/o:linux:linux_kernel:2.6.32
    OS details: Linux 2.6.32
    Network Distance: 0 hops
    Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

    OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
    Nmap done: 1 IP address (1 host up) scanned in 1.81 seconds

  • 相关阅读:
    libtorch之tensor的使用
    20.支持向量机—数学原理知识
    精通机器学习必须掌握的20大算法
    String字符串的存储原理
    ruoyi接口权限校验
    OpenCV开发笔记(七十六):相机标定(一):识别棋盘并绘制角点
    java计算机毕业设计ssm在线教学管理系统
    Python自动化小技巧03——自动统计文件里面的文字和词汇频数
    网络爬虫之HTTP原理
    windows下的volatility取证分析与讲解
  • 原文地址:https://blog.csdn.net/viviliving/article/details/128144201