nmap -sV 192.168.56.105 Starting Nmap 7.92 ( https://nmap.org ) at 2022-02-27 22:33 EST Nmap scan report for 192.168.56.105 Host is up (0.00034s latency). Not shown: 981 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 21/tcp open ftp Microsoft ftpd 22/tcp open ssh OpenSSH 7.1 (protocol 2.0) 80/tcp open http Microsoft IIS httpd 7.5 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds 3306/tcp open mysql MySQL 5.5.20-log
Metasploit tip: Open an interactive Ruby terminal with irb
msf6 >
版本扫描
本次扫描只是这对服务器上的ssh使用版本进行扫描,看看是否可以展示一些有用信息
输入search ssh_version
输入use auxiliary/scanner/ssh/ssh_version以及进行配置
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
msf6 > use auxiliary/scanner/ssh/ssh_version msf6 auxiliary(scanner/ssh/ssh_version) > show options
Name Current Setting Required Description ---- --------------- -------- ----------- RHOSTS yes The target host(s), see https://github.com/rapid7/metasploit- RPORT 22 yes The target port (TCP) THREADS 1 yes The number of concurrent threads (max one per host) TIMEOUT 30 yes Timeout for the SSH probe