zoukankan      html  css  js  c++  java
  • nmap教程(下)

    九.脚本引擎

    脚本文件存放在/usr/share/nmap/scripts目录下

    SCRIPT SCAN:
      -sC: equivalent to --script=default #启用默认类脚本
      --script=<Lua scripts>: <Lua scripts> is a comma separated list of
               directories, script-files or script-categories #根据指定的脚本名称执行相应的脚本
      --script-args=<n1=v1,[n2=v2,...]>: provide arguments to scripts #给脚本指定参数
      --script-args-file=filename: provide NSE script args in a file
      --script-trace: Show all data sent and received
      --script-updatedb: Update the script database.
      --script-help=<Lua scripts>: Show help about scripts.
               <Lua scripts> is a comma-separated list of script-files or
               script-categories.

     接下来进行实践

    nmap --script http-enum,http-headers,http-methods,http-php-version -p 80 192.168.56.101
    
    Starting Nmap 7.60 ( https://nmap.org ) at 2017-12-18 22:42 CST
    Nmap scan report for 192.168.56.101
    Host is up (0.00033s latency).
    
    PORT   STATE SERVICE
    80/tcp open  http
    | http-enum: 
    |   /tikiwiki/: Tikiwiki
    |   /test/: Test page
    |   /phpinfo.php: Possible information file
    |   /phpMyAdmin/: phpMyAdmin
    |   /doc/: Potentially interesting directory w/ listing on 'apache/2.2.8 (ubuntu) dav/2'
    |   /icons/: Potentially interesting folder w/ directory listing
    |_  /index/: Potentially interesting folder
    | http-headers: 
    |   Date: Mon, 18 Dec 2017 14:42:11 GMT
    |   Server: Apache/2.2.8 (Ubuntu) DAV/2
    |   X-Powered-By: PHP/5.2.4-2ubuntu5.10
    |   Connection: close
    |   Content-Type: text/html
    |   
    |_  (Request type: HEAD)
    | http-methods: 
    |_  Supported Methods: GET HEAD POST OPTIONS
    | http-php-version: Versions from logo query (less accurate): 5.1.3 - 5.1.6, 5.2.0 - 5.2.17
    | Versions from credits query (more accurate): 5.2.3 - 5.2.5, 5.2.6RC3
    |_Version from header x-powered-by: PHP/5.2.4-2ubuntu5.10
    MAC Address: 08:00:27:41:71:79 (Oracle VirtualBox virtual NIC)
    
    Nmap done: 1 IP address (1 host up) scanned in 3.62 seconds

    使用http-enum,http-headers,http-methods,http-php-version脚本对目标主机的80端口进行扫描可以得到更多的信息

    十.规避检测的选项

    FIREWALL/IDS EVASION AND SPOOFING:#防火墙/IDS躲避和欺骗
      -f; --mtu <val>: fragment packets (optionally w/given MTU) #使用小数据包
      -D <decoy1,decoy2[,ME],...>: Cloak a scan with decoys
      -S <IP_Address>: Spoof source address #指定假ip地址
      -e <iface>: Use specified interface
      -g/--source-port <portnum>: Use given port number  #模拟指定源端口
      --proxies <url1,[url2],...>: Relay connections through HTTP/SOCKS4 proxies
      --data <hex string>: Append a custom payload to sent packets
      --data-string <string>: Append a custom ASCII string to sent packets
      --data-length <num>: Append random data to sent packets #改变发送包的默认长度
      --ip-options <options>: Send packets with specified ip options
      --ttl <val>: Set IP time-to-live field
      --spoof-mac <mac address/prefix/vendor name>: Spoof your MAC address
      --badsum: Send packets with a bogus TCP/UDP/SCTP checksum
  • 相关阅读:
    【LSGDOJ 1408】邮局
    中间件小姐姐直播“带货”——阿里程序员必知的插件
    ChaosBlade 发布对 C++ 应用混沌实验的支持
    来自 Spring Cloud 官方的消息,Spring Cloud Alibaba 即将毕业
    大合集 | 9 场 Dubbo Meetup 回顾视频和PPT下载
    Future Maker | 领跑亚太 进击的阿里云数据库
    更简单易用的数据仓库,阿里云重磅推出分析型数据库3.0版
    AnalyticDB for MySQL 3.0 技术架构解析
    阿里云 EMAS HTTPDNS 联合函数计算重磅推出 SDNS 服务,三大能力获得突破
    新一代互联网传输协议QUIC浅析
  • 原文地址:https://www.cnblogs.com/sunshine-cat/p/8059951.html
Copyright © 2011-2022 走看看