root@kaliattack:~# ip a 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000 link/ether 00:0c:29:75:0a:17 brd ff:ff:ff:ff:ff:ff inet192.168.1.4/24 brd 192.168.1.255 scope global dynamic noprefixroute eth0 valid_lft76222sec preferred_lft 76222sec inet6 fe80::20c:29ff:fe75:a17/64 scope link noprefixroute valid_lft forever preferred_lft forever
扫描靶机
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
root@kaliattack:~# nmap -sP 192.168.1.4/24 Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-1912:54 CST Nmap scan report for 192.168.1.1 (192.168.1.1) Host is up (0.0024s latency). MAC Address: B4:DE:DF:5D:FE:70 (zte) Nmap scan report for 192.168.1.2 (192.168.1.2) Host is up (0.0023s latency). MAC Address: FC:7C:02:9C:00:59 (Phicomm (Shanghai)) Nmap scan report for laptop-lkst0l6r (192.168.1.3) Host is up (0.000077s latency). MAC Address: 00:0E:C6:BB:D2:3F (Asix Electronics) Nmap scan report for acid (192.168.1.5) Host is up (0.00030s latency). MAC Address: 00:0C:29:83:5A:CF (VMware) Nmap scan report for kaliattack (192.168.1.4) Host is up. Nmap done: 256 IP addresses (5 hosts up) scanned in 1.97 seconds
靶机在 192.168.1.5,物理机在 192.168.1.3
扫描所有65535个端口,并做服务指纹识别
1 2 3 4 5 6 7 8 9 10 11
root@kaliattack:~# nmap -p1-65535 -sV 192.168.1.5 Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-2010:34 CST Nmap scan report for acid (192.168.1.5) Host is up (0.0028s latency). Not shown: 65534 closed ports PORT STATE SERVICE VERSION 33447/tcp open http Apache httpd 2.4.10 ((Ubuntu)) MAC Address: 00:0C:29:83:5A:CF (VMware)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 18.13 seconds
PING 192.168.1.4 (192.168.1.4) 56(84) bytes of data. 64 bytes from 192.168.1.4: icmp_seq=1 ttl=64 time=0.356 ms 64 bytes from 192.168.1.4: icmp_seq=2 ttl=64 time=0.297 ms 64 bytes from 192.168.1.4: icmp_seq=3 ttl=64 time=0.352 ms