Metasploitable scannen: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
(Die Seite wurde neu angelegt: „=Der Scan= *msf6 > db_nmap -sV 10.0.10.105 <pre> [*] Nmap: Starting Nmap 7.93 ( https://nmap.org ) at 2022-10-19 17:57 CEST [*] Nmap: Nmap scan report for 10.…“) |
(kein Unterschied)
|
Aktuelle Version vom 19. Oktober 2022, 15:59 Uhr
Der Scan
- msf6 > db_nmap -sV 10.0.10.105
[*] Nmap: Starting Nmap 7.93 ( https://nmap.org ) at 2022-10-19 17:57 CEST [*] Nmap: Nmap scan report for 10.0.10.105 [*] Nmap: Host is up (0.00011s latency). [*] Nmap: Not shown: 977 closed tcp ports (reset) [*] Nmap: PORT STATE SERVICE VERSION [*] Nmap: 21/tcp open ftp vsftpd 2.3.4 [*] Nmap: 22/tcp open ssh OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0) [*] Nmap: 23/tcp open telnet Linux telnetd [*] Nmap: 25/tcp open smtp Postfix smtpd [*] Nmap: 53/tcp open domain ISC BIND 9.4.2 [*] Nmap: 80/tcp open http Apache httpd 2.2.8 ((Ubuntu) DAV/2) [*] Nmap: 111/tcp open rpcbind 2 (RPC #100000) [*] Nmap: 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) [*] Nmap: 445/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) [*] Nmap: 512/tcp open exec? [*] Nmap: 513/tcp open login OpenBSD or Solaris rlogind [*] Nmap: 514/tcp open tcpwrapped [*] Nmap: 1099/tcp open java-rmi GNU Classpath grmiregistry [*] Nmap: 1524/tcp open bindshell Metasploitable root shell [*] Nmap: 2049/tcp open nfs 2-4 (RPC #100003) [*] Nmap: 2121/tcp open ftp ProFTPD 1.3.1 [*] Nmap: 3306/tcp open mysql MySQL 5.0.51a-3ubuntu5 [*] Nmap: 5432/tcp open postgresql PostgreSQL DB 8.3.0 - 8.3.7 [*] Nmap: 5900/tcp open vnc VNC (protocol 3.3) [*] Nmap: 6000/tcp open X11 (access denied) [*] Nmap: 6667/tcp open irc UnrealIRCd [*] Nmap: 8009/tcp open ajp13 Apache Jserv (Protocol v1.3) [*] Nmap: 8180/tcp open http Apache Tomcat/Coyote JSP engine 1.1 [*] Nmap: MAC Address: 08:00:27:71:8E:D1 (Oracle VirtualBox virtual NIC) [*] Nmap: Service Info: Hosts: metasploitable.localdomain, irc.Metasploitable.LAN; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel [*] Nmap: Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . [*] Nmap: Nmap done: 1 IP address (1 host up) scanned in 63.64 seconds