kali下msf中nmap的使用

发布时间:2020-09-07 03:09:57 作者:Chen__k
来源:网络 阅读:3714

网络拓扑:
kali下msf中nmap的使用
1.启动postgresql数据库:root@debian:~# service postgresql start
2.进入metasploit:root@debian:~# msfconsole
msf >
3.进行数据库连接:
ms```
f > db_connect msf_user:111111@127.0.0.1/msf_database
[] Rebuilding the module cache in the background...
msf > db_status
[
] postgresql connected to msf_database
4.利用nmap进行端口扫描
msf > db_nmap -sS 192.168.152.129
[] Nmap: Starting Nmap 7.60 ( https://nmap.org ) at 2018-02-26 02:01 UTC
[
] Nmap: Nmap scan report for 192.168.152.129
[] Nmap: Host is up (0.00043s latency).
[
] Nmap: Not shown: 979 closed ports
[] Nmap: PORT STATE SERVICE
[
] Nmap: 7/tcp open echo
[] Nmap: 9/tcp open discard
[
] Nmap: 13/tcp open daytime
[] Nmap: 17/tcp open qotd
[
] Nmap: 19/tcp open chargen
[] Nmap: 23/tcp open telnet
[
] Nmap: 25/tcp open smtp
[] Nmap: 42/tcp open nameserver
[
] Nmap: 53/tcp open domain
[] Nmap: 80/tcp open http
[
] Nmap: 110/tcp open pop3
[] Nmap: 135/tcp open msrpc
[
] Nmap: 139/tcp open netbios-ssn
[] Nmap: 445/tcp open microsoft-ds
[
] Nmap: 1025/tcp open NFS-or-IIS
[] Nmap: 1028/tcp open unknown
[
] Nmap: 1031/tcp open iad2
[] Nmap: 1032/tcp open iad3
[
] Nmap: 1033/tcp open netinfo
[] Nmap: 1035/tcp open multidropper
[
] Nmap: 1036/tcp open nsstp
[] Nmap: MAC Address: 00:0C:29:A2:5A:A9 (VMware)
[
] Nmap: Nmap done: 1 IP address (1 host up) scanned in 8.59 seconds


已经将windows主机开放端口扫描出来
推荐阅读:
  1. Kali下Metasploit的shellcode在windows中的使用
  2. kali 的 msfconsole 使用

免责声明:本站发布的内容(图片、视频和文字)以原创、转载和分享为主,文章观点不代表本网站立场,如果涉及侵权请联系站长邮箱:is@yisu.com进行举报,并提供相关证据,一经查实,将立刻删除涉嫌侵权内容。

kail nmap metasploit

上一篇:Android UTF-8转码实例详解

下一篇:Spring-cloud 服务发现与消费(以ribbon为例)

相关阅读

您好,登录后才能下订单哦!

密码登录
登录注册
其他方式登录
点击 登录注册 即表示同意《亿速云用户服务条款》