wireshark得在视窗里打开
root@kali:~# nmap --script broadcast-dhcp-discover
Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-01 04:48 EST
Pre-scan script results:
| broadcast-dhcp-discover:
| Response 1 of 1:
| Interface: eth0
| IP Offered: 192.168.3.53
| DHCP Message Type: DHCPOFFER
| Server Identifier: 192.168.3.1
| IP Address Lease Time: 1d00h00m00s
| Renewal Time Value: 12h00m00s
| Rebinding Time Value: 21h00m00s
| Subnet Mask: 255.255.255.0
| Router: 192.168.3.1
|_ Domain Name Server: 192.168.3.1
WARNING: No targets were specified, so 0 hosts scanned.
Nmap done: 0 IP addresses (0 hosts up) scanned in 10.28 seconds
root@kali:~# nmap -O 192.168.3.1 -p 80
Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-01 04:51 EST
Nmap scan report for 192.168.3.1
Host is up (0.0046s latency).
PORT STATE SERVICE
80/tcp open http
MAC Address: 54:25:EA:99:9A:5C (Huawei Technologies)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose|broadband router
Running: Linux 2.6.X|3.X
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:3.10
OS details: Linux 2.6.32 - 3.10, Linux 2.6.32 - 3.13, DD-WRT v24 or v30 (Linux 3.10), Linux 3.2 - 3.16
Network Distance: 1 hop
OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 1.79 seconds
root@kali:~# nmap -O 192.168.3.86 -p 80
Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-01 04:51 EST
Nmap scan report for 192.168.3.86
Host is up (0.00025s latency).
PORT STATE SERVICE
80/tcp closed http
MAC Address: 50:84:92:93:8D:9D (Intel Corporate)
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop
OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 1.76 seconds
root@kali:~# nmap -O 192.168.3.86
Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-01 04:51 EST
Nmap scan report for 192.168.3.86
Host is up (0.00020s latency).
Not shown: 996 closed tcp ports (reset)
PORT STATE SERVICE
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
8000/tcp open http-alt
MAC Address: 50:84:92:93:8D:9D (Intel Corporate)
Device type: general purpose
Running: Microsoft Windows 10
OS CPE: cpe:/o:microsoft:windows_10
OS details: Microsoft Windows 10 1709 - 1909
Network Distance: 1 hop
OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 4.50 seconds
root@kali:~# nmap -O -sV 192.168.3.86
Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-01 04:54 EST
Nmap scan report for 192.168.3.86
Host is up (0.00023s latency).
Not shown: 996 closed tcp ports (reset)
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds?
8000/tcp open http BaseHTTPServer 0.6 (Python 3.7.4)
MAC Address: 50:84:92:93:8D:9D (Intel Corporate)
Device type: general purpose
Running: Microsoft Windows 10
OS CPE: cpe:/o:microsoft:windows_10
OS details: Microsoft Windows 10 1709 - 1909
Network Distance: 1 hop
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 9.10 seconds
root@kali:~# nmap -O -sV 192.168.3.52
Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-01 04:57 EST
Nmap scan report for 192.168.3.52
Host is up (0.000042s latency).
Not shown: 999 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 9.0p1 Debian 1+b2 (protocol 2.0)
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6.32
OS details: Linux 2.6.32
Network Distance: 0 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 1.81 seconds