┌──(root㉿kali)-[~/miaosec/maze-sec/crontab] └─# nmap -sn 192.168.2.0/24 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-09-09 10:08 CST Nmap scan report for 192.168.2.1 Host is up (0.00077s latency). MAC Address: 0A:00:27:00:00:09 (Unknown) Nmap scan report for 192.168.2.2 Host is up (0.00056s latency). MAC Address: 08:00:27:EF:C5:4A (Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.2.7 Host is up (0.0015s latency). MAC Address: 08:00:27:05:3E:D8 (Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.2.4 Host is up. Nmap done: 256 IP addresses (4 hosts up) scanned in 2.07 seconds
靶机IP:192.168.2.7
2、端口扫描
1.全端口扫描
1 2 3 4 5 6 7 8 9 10 11 12 13
┌──(root㉿kali)-[~/miaosec/maze-sec/crontab] └─# nmap --min-rate 10000 -p- 192.168.2.7 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-09-09 10:09 CST Nmap scan report for 192.168.2.7 Host is up (0.00035s latency). Not shown: 65532 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 5000/tcp open upnp MAC Address: 08:00:27:05:3E:D8 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 3.40 seconds
┌──(root㉿kali)-[~/miaosec/maze-sec/crontab] └─# nmap --min-rate 10000 -sT -sV -sC -O -p22,80,5000 192.168.2.7 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-09-09 10:09 CST Nmap scan report for 192.168.2.7 Host is up (0.00090s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11u3 (protocol 2.0) | ssh-hostkey: | 3072 f6:a3:b6:78:c4:62:af:44:bb:1a:a0:0c:08:6b:98:f7 (RSA) | 256 bb:e8:a2:31:d4:05:a9:c9:31:ff:62:f6:32:84:21:9d (ECDSA) |_ 256 3b:ae:34:64:4f:a5:75:b9:4a:b9:81:f9:89:76:99:eb (ED25519) 80/tcp open http Apache httpd 2.4.62 ((Debian)) |_http-title: Site doesn't have a title (text/html). |_http-server-header: Apache/2.4.62 (Debian) 5000/tcp open upnp? | fingerprint-strings: | GetRequest: | HTTP/1.1 200 OK | Server: Werkzeug/3.1.3 Python/3.9.2 | Date: Tue, 09 Sep 2025 02:09:38 GMT | Content-Type: text/html; charset=utf-8 | Content-Length: 532 | Connection: close | <!DOCTYPE html> | <html> | <html lang="en"> | <head> | <meta charset="UTF-8"> | </head> | <body> | <p1> | Marisa | DAZE</p1> | <br> | <br> | <p1> | Marisa | (bushi</p1> | <br> | <br> | <p1>Marisa | </p1> | <br> | <br> | <p1> | </p1> | <br> | <img src="/static/1.png"> | </body> | </html> | RTSPRequest: | <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" | "http://www.w3.org/TR/html4/strict.dtd"> | <html> | <head> | <meta http-equiv="Content-Type" content="text/html;charset=utf-8"> | <title>Error response</title> | </head> | <body> | <h1>Error response</h1> | <p>Error code: 400</p> | <p>Message: Bad request version ('RTSP/1.0').</p> | <p>Error code explanation: HTTPStatus.BAD_REQUEST - Bad request syntax or unsupported method.</p> | </body> |_ </html> 1 service unrecognized despite returning data. If you know the service/version, ... Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 4.X|5.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 OS details: Linux 4.15 - 5.8 Network Distance: 1 hop Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 94.95 seconds
┌──(root㉿kali)-[~/miaosec/maze-sec/crontab] └─# nmap -sU --top-ports 100 192.168.2.7 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-09-09 10:12 CST Nmap scan report for 192.168.2.7 Host is up (0.0012s latency). All 100 scanned ports on 192.168.2.7 are in ignored states. Not shown: 55 closed udp ports (port-unreach), 45 open|filtered udp ports (no-response) MAC Address: 08:00:27:05:3E:D8 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 50.64 seconds
没有开放的udp端口
4.漏洞脚本扫描
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
┌──(root㉿kali)-[~/miaosec/maze-sec/crontab] └─# nmap --script=vuln -p22,80,5000 192.168.2.7 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-09-09 10:16 CST Nmap scan report for 192.168.2.7 Host is up (0.00090s latency).
PORT STATE SERVICE 22/tcp open ssh 80/tcp open http |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. |_http-csrf: Couldn't find any CSRF vulnerabilities. |_http-dombased-xss: Couldn't find any DOM based XSS. 5000/tcp open upnp MAC Address: 08:00:27:05:3E:D8 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 31.36 seconds
marisa@Crontab:~$ cat /etc/crontab # /etc/crontab: system-wide crontab # Unlike any other crontab you don't have to run the `crontab' # command to install the new version when you edit this file # and files in /etc/cron.d. These files also have username fields, # that none of the other crontabs do.