刚刚用Metasploit Pro scan了一下云端服务器。RHOST直接输IP就好。

得到反馈如下:

[*] [2019.04.04-14:27:35] Scan initiated: Speed: 5, Max: 300m (Portscanning) (UDP probes) (Finger enumeration) (H.323 probes)
[+] [2019.04.04-14:27:35] Workspace:default Progress:1/177 (0%) Sweeping 10.0.165.30 with Nmap4 probes
[*] [2019.04.04-14:27:35] Scanning 1 hosts...
[*] [2019.04.04-14:27:51] Nmap Command (data:/opt/metasploit/common/share/nmap): /opt/metasploit/common/bin/nmap -sS -T5 -PP -PE -PM -PI -PA20,53,80,113,443,5060,10043 --host-timeout=300m -O --max-rtt-timeout=3000ms --initial-rtt-timeout=1000ms --min-rtt-timeout=1000ms --max-retries=2 --stats-every 10s --traceroute --min-hostgroup=64 -PS1,7,9,13,19,21-23,25,37,42,49,53,69-70,79-81,85,88,105,109-111,113,119,123,135,137-139,143,161,179,222,264,384,389,402,407,443-446,465,500,502,512-515,523-524,540,548,554,587,617,623,631,655,689,705,771,783,831,873,888,902,910,912,921,993,995,998-1000,1024-1025,1030,1035,1090,1098-1103,1128-1129,1158,1199,1211,1220,1234,1241,1300,1311,1352,1414,1433-1435,1440,1471,1494,1521,1530,1533,1581-1582,1604,1720,1723,1743,1755,1811,1883,1900,2000-2001,2049,2067,2100,2103,2121,2199,2207,2222,2323,2362,2375,2379-2381,2404,2480,2525,2533,2598,2638,2809-2810,2947,2967,2990,3000-3001,3037,3050,3057,3128,3181,3200,3217,3273,3299,3306,3310,3333,3389,3460,3465,3500,3628,3632,3690,3702,3780,3790,3817,3900,4000,4070,4322,4433,4444-4445,4592,4659,4672,4679,4750,4786,4800,4848,5000,5009,5038,5040,5051,5060-5061,5093,5168,5180,5227,5247,5250,5351,5353,5355,5400,5405,5432-5433,5466,5498,5520-5521,5554-5555,5560,5580,5631-5632,5666,5800,5814,5858,5900-5910,5920,5984-5986,5999-6000,6050,6060,6066,6070,6080,6082,6101,6106,6112,6161,6262,6379,6405,6502-6504,6542,6660-6661,6667,6789,6905,6988,6996,7000-7001,7021,7071,7080,7144,7181,7210,7272,7414,7426,7443,7510,7547,7579-7580,7700,7770,7777-7778,7787,7800-7801,7878-7879,7890,7902,8000-8001,8008,8014,8020,8023,8028,8030,8050-8051,8080-8082,8085-8088,8090-8091,8095,8101,8161,8180-8181,8205,8222,8300,8303,8333,8400,8443-8445,8500,8503,8642,8686,8701,8787,8800,8812,8834,8880,8883,8888-8890,8899,8901-8903,8980,8999-9005,9010,9050,9080-9081,9084,9090,9099-9100,9111,9124,9152,9200,9251,9256,9300,9390-9391,9495,9500,9711,9788,9809-9815,9855,9875-9876,9910,9991,9999-10001,10008,10050-10051,10080,10098-10099,10162,10202-10203,10333,10443,10616,10628,11000-11001,11099,11211,11234,11333,11460,12000,12174,12203,12221,12345,12397,12401,13003,13013,13364,13500,13579,13838,14000,14330,15000-15001,15200,16000,16102,16992,17185,17200,18881,18980,19300,19810,20000,20010,20031,20034,20101,20111,20171,20222,20256,22006,22222,23423,23472,23791,23943,25000,25025,25672,26000,26122,26256,27000,27015,27017,27888,27960,28222,28784,30000,30718,31001,31099,32022,32764,32913,33000,34205,34443,37718,37777,38080,38292,40007,41025,41080,41523-41524,44334,44818,45230,46823-46824,47001-47002,48080,48899,49152,50000-50004,50013,50050,50500-50504,52302,52869,53413,54345,55552-55554,57772,62078,62514,65535 --min-rate=500 -PU40830 -iL /tmp/nmap20190404-355-oh4ldn -p1,7,9,13,19,21-23,25,37,42,49,53,69-70,79-81,85,88,105,109-111,113,119,123,135,137-139,143,161,179,222,264,384,389,402,407,443-446,465,500,502,512-515,523-524,540,548,554,587,617,623,631,655,689,705,771,783,831,873,888,902,910,912,921,993,995,998-1000,1024-1025,1030,1035,1090,1098-1103,1128-1129,1158,1199,1211,1220,1234,1241,1300,1311,1352,1414,1433-1435,1440,1471,1494,1521,1530,1533,1581-1582,1604,1720,1723,1743,1755,1811,1883,1900,2000-2001,2049,2067,2100,2103,2121,2199,2207,2222,2323,2362,2375,2379-2381,2404,2480,2525,2533,2598,2638,2809-2810,2947,2967,2990,3000-3001,3037,3050,3057,3128,3181,3200,3217,3273,3299,3306,3310,3333,3389,3460,3465,3500,3628,3632,3690,3702,3780,3790,3817,3900,4000,4070,4322,4433,4444-4445,4592,4659,4672,4679,4750,4786,4800,4848,5000,5009,5038,5040,5051,5060-5061,5093,5168,5180,5227,5247,5250,5351,5353,5355,5400,5405,5432-5433,5466,5498,5520-5521,5554-5555,5560,5580,5631-5632,5666,5800,5814,5858,5900-5910,5920,5984-5986,5999-6000,6050,6060,6066,6070,6080,6082,6101,6106,6112,6161,6262,6379,6405,6502-6504,6542,6660-6661,6667,6789,6905,6988,6996,7000-7001,7021,7071,7080,7144,7181,7210,7272,7414,7426,7443,7510,7547,7579-7580,7700,7770,7777-7778,7787,7800-7801,7878-7879,7890,7902,8000-8001,8008,8014,8020,8023,8028,8030,8050-8051,8080-8082,8085-8088,8090-8091,8095,8101,8161,8180-8181,8205,8222,8300,8303,8333,8400,8443-8445,8500,8503,8642,8686,8701,8787,8800,8812,8834,8880,8883,8888-8890,8899,8901-8903,8980,8999-9005,9010,9050,9080-9081,9084,9090,9099-9100,9111,9124,9152,9200,9251,9256,9300,9390-9391,9495,9500,9711,9788,9809-9815,9855,9875-9876,9910,9991,9999-10001,10008,10050-10051,10080,10098-10099,10162,10202-10203,10333,10443,10616,10628,11000-11001,11099,11211,11234,11333,11460,12000,12174,12203,12221,12345,12397,12401,13003,13013,13364,13500,13579,13838,14000,14330,15000-15001,15200,16000,16102,16992,17185,17200,18881,18980,19300,19810,20000,20010,20031,20034,20101,20111,20171,20222,20256,22006,22222,23423,23472,23791,23943,25000,25025,25672,26000,26122,26256,27000,27015,27017,27888,27960,28222,28784,30000,30718,31001,31099,32022,32764,32913,33000,34205,34443,37718,37777,38080,38292,40007,41025,41080,41523-41524,44334,44818,45230,46823-46824,47001-47002,48080,48899,49152,50000-50004,50013,50050,50500-50504,52302,52869,53413,54345,55552-55554,57772,62078,62514,65535
[*] [2019.04.04-14:27:51] Nmap Output:
[*] [2019.04.04-14:27:51] Nmap Output: Starting Nmap 7.01 ( https://nmap.org ) at 2019-04-04 14:27 CST
[*] [2019.04.04-14:27:57] Nmap Output: Nmap scan report for 10.0.165.30
[*] [2019.04.04-14:27:57] Nmap Output: Host is up (0.011s latency).
[*] [2019.04.04-14:27:57] Nmap Output: Not shown: 501 closed ports
[*] [2019.04.04-14:27:57] Nmap Output: PORT STATE SERVICE
[*] [2019.04.04-14:27:57] Nmap Output: 22/tcp open ssh
[*] [2019.04.04-14:27:57] Nmap Output: 80/tcp open http
[*] [2019.04.04-14:27:57] Nmap Output: 443/tcp open https
[*] [2019.04.04-14:27:57] Nmap Output: 1883/tcp open unknown
[*] [2019.04.04-14:27:57] Nmap Output: 3306/tcp open mysql
[*] [2019.04.04-14:27:57] Nmap Output: 5000/tcp open upnp
[*] [2019.04.04-14:27:57] Nmap Output: 8000/tcp open http-alt
[*] [2019.04.04-14:27:57] Nmap Output: 9100/tcp open jetdirect
[*] [2019.04.04-14:27:57] Nmap Output: 10050/tcp open unknown
[*] [2019.04.04-14:27:57] Nmap Output: Device type: general purpose
[*] [2019.04.04-14:27:57] Nmap Output: Running: Linux 3.X|4.X
[*] [2019.04.04-14:27:57] Nmap Output: OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
[*] [2019.04.04-14:27:57] Nmap Output: OS details: Linux 3.2 - 4.0
[*] [2019.04.04-14:27:57] Nmap Output: Network Distance: 2 hops
[*] [2019.04.04-14:27:57] Nmap Output:
[*] [2019.04.04-14:27:57] Nmap Output: TRACEROUTE (using port 110/tcp)
[*] [2019.04.04-14:27:57] Nmap Output: HOP RTT ADDRESS
[*] [2019.04.04-14:27:57] Nmap Output: 1 10.55 ms 10.0.176.1
[*] [2019.04.04-14:27:57] Nmap Output: 2 3.06 ms 10.0.165.30
[*] [2019.04.04-14:27:57] Nmap Output:
[*] [2019.04.04-14:27:57] Nmap Output: OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
[*] [2019.04.04-14:27:57] Nmap Output: Nmap done: 1 IP address (1 host up) scanned in 5.74 seconds
[*] [2019.04.04-14:27:57] Nmap Results: Importing scan data.
[+] [2019.04.04-14:27:57] Workspace:default Progress:3/177 (1%) Sweeping 10.0.165.30 with UDP probes
[*] [2019.04.04-14:27:57] Sending 13 probes to 10.0.165.30->10.0.165.30 (1 hosts)
[+] [2019.04.04-14:28:12] Workspace:default Progress:5/177 (2%) Sweeping 10.0.165.30 with HTTP probes
[+] [2019.04.04-14:28:12] 10.0.165.30:80 nginx/1.10.3 (Ubuntu)
[+] [2019.04.04-14:28:13] 10.0.165.30:443 nginx/1.10.3 (Ubuntu)
[+] [2019.04.04-14:28:13] 10.0.165.30:8000 nginx/1.10.3 (Ubuntu)
[+] [2019.04.04-14:28:13] Workspace:default Progress:45/177 (25%) Sweeping 10.0.165.30 with SSH probes
[+] [2019.04.04-14:28:13] 10.0.165.30:22 - SSH server version: SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.7 ( service.version=7.2p2 openssh.comment=Ubuntu-4ubuntu2.7 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH service.cpe23=cpe:/a:openbsd:openssh:7.2p2 os.vendor=Ubuntu os.family=Linux os.product=Linux os.certainty=0.75 os.cpe23=cpe:/o:canonical:ubuntu_linux:- service.protocol=ssh fingerprint_db=ssh.banner )
[+] [2019.04.04-14:28:13] Workspace:default Progress:57/177 (32%) Sweeping 10.0.165.30 with MySQL probes
[*] [2019.04.04-14:28:13] 10.0.165.30:3306 - 10.0.165.30:3306 is running MySQL, but responds with an error: \x04Host '10.0.176.101' is not allowed to connect to this MySQL server
[+] [2019.04.04-14:28:13] Workspace:default Progress:63/177 (35%) Sweeping 10.0.165.30 with VxWorks probes
[+] [2019.04.04-14:28:23] Workspace:default Progress:168/177 (94%) Sweeping 10.0.165.30 with WinRM probes
[-] [2019.04.04-14:28:23] 10.0.165.30:80 Does not appear to be a WinRM server
[-] [2019.04.04-14:28:23] 10.0.165.30:443 Does not appear to be a WinRM server
[+] [2019.04.04-14:28:23] Workspace:default Progress:172/177 (97%) Normalizing system information
[+] [2019.04.04-14:28:24] Workspace:default Progress:1/2 (50%) Normalizing 10.0.165.30
[+] [2019.04.04-14:28:24] Workspace:default Progress:2/2 (100%) Normalization complete
[+] [2019.04.04-14:28:24] Workspace:default Progress:173/177 (97%) Identifying unknown services
[+] [2019.04.04-14:28:24] Workspace:default Progress:174/177 (98%) Normalizing system information for newly identified services
[+] [2019.04.04-14:28:24] Workspace:default Progress:1/2 (50%) Normalizing 10.0.165.30
[+] [2019.04.04-14:28:24] Workspace:default Progress:2/2 (100%) Normalization complete
[+] [2019.04.04-14:28:24] Workspace:default Progress:175/177 (98%) Sweeping newly found services
[+] [2019.04.04-14:28:24] Workspace:default Progress:176/177 (99%) Normalizing system information for newly identified services
[+] [2019.04.04-14:28:24] Workspace:default Progress:1/2 (50%) Normalizing 10.0.165.30
[+] [2019.04.04-14:28:24] Workspace:default Progress:2/2 (100%) Normalization complete
[+] [2019.04.04-14:28:24] Discovered Host: 10.0.165.30 (10.0.165.30)
[+] [2019.04.04-14:28:24] Workspace:default Progress:177/177 (100%) Sweep of 10.0.165.30-10.0.165.30 complete (1 new host, 9 new services)

记录一下msf的学习使用的更多相关文章

  1. 开通博客第一天,记录此时此刻,开始学习加强c#

    从2017年6月毕业到现在,不断的学习.net,在工作中不断的加强技术,终于在此时此刻决定开通博客,记录此后每一天学习的技术点,两年来,每天所涉及的技术点很杂,学了这个忘了那个,总感觉在进步却总是觉得 ...

  2. Oracle 数据库中对记录进行分页处理——学习笔记

    学习到 oracle 的视图的时候,了解到对 Oracle 中数据的记录进行分页处理和 Mysql 提供的 limit 来进行分页处理大有不同,limit 是 mysql 中特有的关键字. 那么在 o ...

  3. web进阶之jQuery操作DOM元素&&MySQL记录操作&&PHP面向对象学习笔记

    hi 保持学习数量和质量 1.jQuery操作DOM元素 ----使用attr()方法控制元素的属性 attr()方法的作用是设置或者返回元素的属性,其中attr(属性名)格式是获取元素属性名的值,a ...

  4. 2016 5.03开始记录我的it学习。

    好多谢立成师兄给我这个网址,我发现博客园不仅仅可以随笔记载很多东西,还是一个资源丰富的网站,接下来的四年我会用心去记录这些学习的点滴.

  5. [转]Oracle学习记录 九 Prc C学习

    经过前面的了解,现在想用C语言来编程了,搜索了很多东西,后来决定先用Pro C来进行学习 在安装完Oracle数据库后就可以进行编程了,里面有一个命令proc就是对程序进行预编译的. 在这记一下,这是 ...

  6. 【IOS实例小计】今日开贴,记录我的ios学习生涯,留下点滴,留下快乐,成荫后人。

    今天开贴来记录自己的ios学习过程,本人目前小白一个,由于对ios感兴趣,所以开始学习,原职java程序,呵呵,勿喷. 本次的[ios实例小计]主要参考一文http://blog.sina.com.c ...

  7. 记录我的 python 学习历程-Day13 匿名函数、内置函数 II、闭包

    一.匿名函数 以后面试或者工作中经常用匿名函数 lambda,也叫一句话函数. 课上练习: # 正常函数: def func(a, b): return a + b print(func(4, 6)) ...

  8. 程序语言与编程实践4-> 蓝桥杯C/C++备赛记录2 | 第二周学习训练

    0323,又是一周星期三,按道理该总结了.这周前几天写题比较多,后面事情多了起来,就没怎么写了.主要方向是洛谷的基本语法熟悉,PTA平台数据结构的一些题目. 0323附上: 题目比较多,所以文章可能有 ...

  9. 记录一次Quartz2D学习(一)

    经常看点 drawRect的重写  但是不知道这究竟是神马 今天开始学习这一块的东西,更确切地说是深入 早在view的时候 就经常会调用layer的maskToBounds属性,其实 重写 drawR ...

随机推荐

  1. 初识Attention机制(NLP领域)

    Attention 机制. 参考:https://blog.csdn.net/xiewenbo/article/details/79382785 要是关注深度学习在自然语言处理方面的研究进展,我相信你 ...

  2. jemter聚合报告参数指标

    1.聚合报告指标含义 2.性能指标的名称与含义 1)并发:        所有用户在同一时刻对系统执行操作,一般指做同一件事情或操作.2)在线:        所有用户在一段时间内对系统执行操作.3) ...

  3. windows server 2012R2 故障转移集群配置

    配置说明: AD:10.10.1.10/24  Node-2:10.10.1.20/24 Node-3:10.10.1.30/24 zhangsan-PC:10.10.1.50/24  VIP1:10 ...

  4. php hook编程机制

    说明 hook,中文翻译为钩子,编程中的钩子类似我们现实中的钩子,需要挂在东西的时候    直接挂载到上面即可.程序中也是,需要运行的代码挂载到上面即可.         具体思想就是:在项目代码中, ...

  5. CentOS7+CDH5.14.0安装全流程记录,图文详解全程实测-4配置NTP服务

    配置NTP服务.标准的做法是配置NTP服务器,但是这里为了方便就用简化的方式配置了. 这个在安装初期,不是必须的,只要保证各机器的时间同步就行,使用如下命令可以查看时间是否同步: [root@cdh1 ...

  6. iTerm2使用技巧

    iTerm2实用技巧 搜索及文本复制 使用“cmd+f”可以调出搜索框进行文本搜索,然后有个很奇妙的快捷键“tab”键,使用它后会自动高亮当前文本后面的内容.最后按enter键将高亮文本复制到剪切板上 ...

  7. 分布式系统-主键唯一id,订单编号生成-雪花算法-SnowFlake

    分布式系统下 我们每台设备(分布式系统-独立的应用空间-或者docker环境) * SnowFlake的优点是,整体上按照时间自增排序,并且整个分布式系统内不会产生ID碰撞(由数据中心ID和机器ID作 ...

  8. 分析abex-crackme#1

    1.分析环境2.运行程序,了解大致的运行过程3.运行Ollydbg调试程序3.1.分析结果简述4.破解4.1.方法一4.2.方法二5.运行结果6.与书中不同之处 1.分析环境 操作系统:Win10 1 ...

  9. [原]Webpack 3 + AngularJS1.* + Bootstrap 4 + Mapbox-gl

    直接上步骤 一.创建项目 1. 使用VSCode建立项目目录结构如下: 文档结构 wabg ├── http │ ├── app.js │ ├── controllers │ │ └── index. ...

  10. 微信小程序上拉下拉刷新

    小程序提供了,onPullDownRefresh和onReachBottom两个事件函数监听下拉和上拉事件函数.提示加载中,取消加载中 效果: js文件 // pages/enterprise/ent ...