Kali 中文网

 找回密码
 立即注册

QQ登录

只需一步,快速开始

扫一扫,访问微社区

搜索
查看: 1189|回复: 5

[探讨] 【初探kali】使用namp扫描

[复制链接]
发表于 2018-4-21 17:02:10 | 显示全部楼层 |阅读模式
本人小白一只,以前学过linux一点皮毛,工作后转行与计算机无关行业,现在生活需要,需从新掌握bt5,翻出以前的资料发现已经完全看不懂,后几经转折找到了“kali”网上获取的知识是BT5的升级版!
自己小试牛刀,随便在网上找到了一个目标网站,并对其进行了SYN扫描。
发这篇帖子的目的,因为自己有过网络基础,但是苦于自己能力不足无法实现到应用场景,现想有志同道合的朋友,一起交流,一起实践!
为了生活,抗拒平凡的生活。
本人自己也采集了不少关于网络安全方面的资料,如有一起学习的朋友,可以加QQ2373848200,一起探讨
扫描结果如下:
Starting Nmap 7.60 ( https://nmap.org ) at 2018-04-21 16:04 CST
Nmap scan report for 42.81.62.205
Host is up (0.041s latency).
Not shown: 984 closed ports
PORT     STATE    SERVICE        VERSION
22/tcp   filtered ssh
80/tcp   open     http           nginx
|_http-server-header: nginx
|_http-title: 403 Forbidden
135/tcp  filtered msrpc
139/tcp  filtered netbios-ssn
443/tcp  open     ssl/http       nginx
|_http-server-header: nginx
|_http-title: 411 Length Required
| ssl-cert: Subject: commonName=*.hexun.com/organizationName=Beijing Hexun Online Consulting Co.,Ltd/stateOrProvinceName=Beijing/countryName=CN
| Subject Alternative Name: DNS:*.hexun.com, DNS:hexun.com
| Not valid before: 2016-07-07T00:00:00
|_Not valid after:  2019-09-05T23:59:59
|_ssl-date: 2018-04-21T08:05:24+00:00; +16s from scanner time.
| tls-nextprotoneg:
|_  http/1.1
445/tcp  filtered microsoft-ds
593/tcp  filtered http-rpc-epmap
901/tcp  filtered samba-swat
1025/tcp filtered NFS-or-IIS
1434/tcp filtered ms-sql-m
2000/tcp open     tcpwrapped
3128/tcp filtered squid-http
4444/tcp filtered krb524
5060/tcp open     tcpwrapped
6129/tcp filtered unknown
6667/tcp filtered irc
Device type: general purpose|media device|firewall|broadband router
Running (JUST GUESSING): Linux 2.6.X|3.X (95%), Tiandy embedded (94%), IPCop 2.X|1.X (91%), D-Link embedded (89%), IPFire 2.X (89%)
OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.2 cpe:/o:linux:linux_kernel:3.4 cpe:/o:ipcop:ipcop:2 cpe:/h:dlink:dsl-2890al cpe:/o:linux:linux_kernel:2.6.25.20 cpe:/o:ipcop:ipcop:1.9.19 cpe:/o:ipfire:ipfire:2.9
Aggressive OS guesses: Linux 2.6.32 (95%), Linux 3.2 (95%), Tiandy NVR (94%), IPCop 2 firewall (Linux 3.4) (91%), Linux 3.0 (91%), IPCop 2.0 (Linux 2.6.32) (91%), Linux 3.18 (89%), Linux 2.6.18 - 2.6.22 (89%), D-Link DSL-2890AL ADSL router (89%), OpenWrt Kamikaze 8.09 (Linux 2.6.25.20) (89%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 18 hops

Host script results:
|_clock-skew: mean: 15s, deviation: 0s, median: 15s

TRACEROUTE (using port 3389/tcp)
HOP RTT      ADDRESS
1   4.82 ms  192.168.1.1
2   8.62 ms  100.64.0.1
3   10.85 ms 120.202.4.41
4   ...
5   14.33 ms localhost (120.202.0.214)
6   ... 13
14  35.47 ms 42.81.48.10
15  37.63 ms 42.81.49.62
16  ... 17
18  38.90 ms 42.81.62.205

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 30.52 seconds



+1
1193°C
4
  • 人生捕手520
  • 154032402
  • hash.zhang
  • hash.zhang
过: 他们
发表于 2018-4-23 20:54:59 | 显示全部楼层
加你好友了 ,一起学习
回复 支持 反对

使用道具 举报

发表于 2018-4-28 18:50:16 | 显示全部楼层
一起进步一起学习
回复 支持 反对

使用道具 举报

发表于 2018-4-30 20:00:07 | 显示全部楼层
小白一枚,扫描后的内容要从哪入手分析?
回复 支持 反对

使用道具 举报

发表于 2018-4-30 20:01:16 | 显示全部楼层
root@kali:/# nmap -v 42.81.62.205

Starting Nmap 7.60 ( https://nmap.org ) at 2018-04-30 04:57 PDT
Initiating Ping Scan at 04:57
Scanning 42.81.62.205 [4 ports]
Completed Ping Scan at 04:57, 0.05s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 04:57
Completed Parallel DNS resolution of 1 host. at 04:57, 0.13s elapsed
Initiating SYN Stealth Scan at 04:57
Scanning 42.81.62.205 [1000 ports]
Discovered open port 443/tcp on 42.81.62.205
Discovered open port 80/tcp on 42.81.62.205
Discovered open port 5060/tcp on 42.81.62.205
Discovered open port 2000/tcp on 42.81.62.205
Completed SYN Stealth Scan at 04:58, 63.48s elapsed (1000 total ports)
Nmap scan report for 42.81.62.205
Host is up (1.1s latency).
Not shown: 984 closed ports
PORT     STATE    SERVICE
22/tcp   filtered ssh
80/tcp   open     http
135/tcp  filtered msrpc
139/tcp  filtered netbios-ssn
443/tcp  open     https
445/tcp  filtered microsoft-ds
514/tcp  filtered shell
593/tcp  filtered http-rpc-epmap
901/tcp  filtered samba-swat
1025/tcp filtered NFS-or-IIS
2000/tcp open     cisco-sccp
3128/tcp filtered squid-http
4444/tcp filtered krb524
5060/tcp open     sip
6129/tcp filtered unknown
6667/tcp filtered irc

Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 63.85 seconds
           Raw packets sent: 1100 (48.372KB) | Rcvd: 1089 (43.576KB)
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

关闭

站长推荐上一条 /1 下一条

Kali linux ( 蜀ICP备10027298号-4 ) Topics |


免责声明:
Kali linux中文网所发布的一切教程文章仅限用于学习和研究目的;不得将上述内容用于商业或者非法用途,否则,一切后果请用户自负。本站信息来自网络,版权争议与本站无关。您必须在下载后的24个小时之内,从您的电脑中彻底删除上述内容。

GMT+8, 2018-10-15 01:52 , Processed in 0.284305 second(s), 25 queries , Gzip On.

Powered by Discuz!

© 2009-2016 CNNS

快速回复 返回顶部 返回列表