本文共 3551 字,大约阅读时间需要 11 分钟。
msf > nmap -n -oX my.xml 192.168.144.0/24 [*] exec: nmap -n -oX my.xml 192.168.144.0/24 --使用nmap来扫描本地网络,扫描结果会自动生成XML文件形式添加到Metasploit中。 Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-11-07 07:55 EST Nmap scan report for 192.168.144.1 Host is up (0.00028s latency). Not shown: 990 filtered ports PORT STATE SERVICE 135/tcp open msrpc 139/tcp open netbios-ssn 443/tcp open https 445/tcp open microsoft-ds 902/tcp open iss-realsecure 912/tcp open apex-mesh 2869/tcp open icslap 5357/tcp open wsdapi 49155/tcp open unknown 49156/tcp open unknown MAC Address: 00:50:56:C0:00:08 (VMware) Nmap scan report for 192.168.144.2 Host is up (0.00035s latency). All 1000 scanned ports on 192.168.144.2 are closed MAC Address: 00:50:56:E6:0A:6D (VMware) Nmap scan report for 192.168.144.135 Host is up (0.00028s latency). Not shown: 999 closed ports PORT STATE SERVICE 22/tcp open ssh MAC Address: 00:0C:29:84:5D:10 (VMware) Nmap scan report for 192.168.144.254 Host is up (0.037s latency). All 1000 scanned ports on 192.168.144.254 are filtered MAC Address: 00:50:56:F4:50:B2 (VMware) Nmap scan report for 192.168.144.130 Host is up (0.0000020s latency). Not shown: 999 closed ports PORT STATE SERVICE 22/tcp open ssh Nmap done: 256 IP addresses (5 hosts up) scanned in 328.80 seconds msf > db_import my.xml ---将nmap输出的结果已XML文件形式导入Metasploit中,调用以上命令。 [*] Importing 'Nmap XML' data [*] Import: Parsing with 'Nokogiri v1.6.6.2' [*] Importing host 192.168.144.1 [*] Importing host 192.168.144.135 [*] Importing host 192.168.144.130 [*] Successfully imported /root/my.xml msf > hosts ---通过hosts命令查询nmap输出的数据。 Hosts ===== address mac name os_name os_flavor os_sp purpose info comments ------- --- ---- ------- --------- ----- ------- ---- -------- 192.168.144.1 00:50:56:c0:00:08 Unknown device 192.168.144.130 Unknown device 192.168.144.135 00:0c:29:84:5d:10 Unknown device msf > services ---通过services命令,查看Metasploit中可用的服务。 Services ======== host port proto name state info ---- ---- ----- ---- ----- ---- 192.168.144.1 49156 tcp unknown open 192.168.144.1 49155 tcp unknown open 192.168.144.1 135 tcp msrpc open 192.168.144.1 139 tcp netbios-ssn open 192.168.144.1 443 tcp https open 192.168.144.1 445 tcp microsoft-ds open 192.168.144.1 5357 tcp wsdapi open 192.168.144.1 912 tcp apex-mesh open 192.168.144.1 2869 tcp icslap open 192.168.144.1 902 tcp iss-realsecure open 192.168.144.130 22 tcp ssh open 192.168.144.135 22 tcp ssh open msf > db_nmap -n -A 192.168.144.135 --使用db_nmap命令对目标主机使用nmap命令进行扫描。 [*] Nmap: Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-11-07 08:15 EST [*] Nmap: Nmap scan report for 192.168.144.135 [*] Nmap: Host is up (0.00023s latency). [*] Nmap: Not shown: 999 closed ports [*] Nmap: PORT STATE SERVICE VERSION [*] Nmap: 22/tcp open ssh OpenSSH 6.9p1 Ubuntu 2 (Ubuntu Linux; protocol 2.0) [*] Nmap: | ssh-hostkey: [*] Nmap: | 2048 7f:73:b2:c0:9c:fe:ec:3b:ff:48:59:ae:ad:dc:68:7f (RSA) [*] Nmap: |_ 256 f9:1d:c1:ef:a3:8a:b1:19:96:9d:34:25:9c:ca:4c:53 (ECDSA) [*] Nmap: MAC Address: 00:0C:29:84:5D:10 (VMware) [*] Nmap: Device type: general purpose [*] Nmap: Running: Linux 3.X [*] Nmap: OS CPE: cpe:/o:linux:linux_kernel:3 [*] Nmap: OS details: Linux 3.2 - 3.19 [*] Nmap: Network Distance: 1 hop [*] Nmap: Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel [*] Nmap: TRACEROUTE [*] Nmap: HOP RTT ADDRESS [*] Nmap: 1 0.23 ms 192.168.144.135 [*] Nmap: OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . [*] Nmap: Nmap done: 1 IP address (1 host up) scanned in 8.55 seconds转载地址:http://tjuti.baihongyu.com/