┌──(root㉿kali)-[~/miaosec/maze-sec/login] └─# nmap -sn 192.168.2.0/24 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-09-14 18:05 CST Nmap scan report for 192.168.2.1 Host is up (0.00039s latency). MAC Address: 0A:00:27:00:00:07 (Unknown) Nmap scan report for 192.168.2.2 Host is up (0.00028s latency). MAC Address: 08:00:27:EA:4D:3E (Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.2.10 Host is up (0.00052s latency). MAC Address: 08:00:27:B1:97:C1 (Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.2.4 Host is up. Nmap done: 256 IP addresses (4 hosts up) scanned in 2.14 seconds
靶机IP:192.168.2.10
2、端口扫描
1.全端口扫描
1 2 3 4 5 6 7 8 9 10 11 12 13
┌──(root㉿kali)-[~/miaosec/maze-sec/login] └─# nmap --min-rate 10000 -p- 192.168.2.10 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-09-14 18:05 CST Nmap scan report for 192.168.2.10 Host is up (0.00019s latency). Not shown: 65532 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 9090/tcp open zeus-admin MAC Address: 08:00:27:B1:97:C1 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 4.42 seconds
┌──(root㉿kali)-[~/miaosec/maze-sec/login] └─# nmap --script=vuln -p22,80,9090 192.168.2.10 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-09-14 18:08 CST Nmap scan report for 192.168.2.10 Host is up (0.00043s latency).
PORT STATE SERVICE 22/tcp open ssh 80/tcp open http |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. | http-csrf: | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.2.10 | Found the following possible CSRF vulnerabilities: | | Path: http://192.168.2.10:80/vote/index.php | Form id: vote_count | Form action: vote.php | | Path: http://192.168.2.10:80/vote/vote.php | Form id: vote_count |_ Form action: vote.php |_http-dombased-xss: Couldn't find any DOM based XSS. 9090/tcp open zeus-admin MAC Address: 08:00:27:B1:97:C1 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 40.76 seconds