nmap -A -v -p 1-65535 192.168.198.137 --script=vuln
# 结果
┌──(root㉿kali)-[/home/varin]
└─# nmap -A -v -p 1-65535 192.168.198.137 --script=vuln
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-08-08 16:07 CST
NSE: Loaded 150 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 16:07
Stats: 0:00:08 elapsed; 0 hosts completed (0 up), 0 undergoing Script Pre-Scan
NSE: Active NSE Script Threads: 1 (1 waiting)
NSE Timing: About 0.00% done
NSE Timing: About 33.33% done; ETC: 16:09 (0:01:08 remaining)
Completed NSE at 16:08, 34.06s elapsed
Initiating NSE at 16:08
Completed NSE at 16:08, 0.00s elapsed
Pre-scan script results:
| broadcast-avahi-dos:
| Discovered hosts:
| 224.0.0.251
| After NULL UDP avahi packet DoS (CVE-2011-1002).
|_ Hosts are all up (not vulnerable).
Initiating ARP Ping Scan at 16:08
Scanning 192.168.198.137 [1 port]
Completed ARP Ping Scan at 16:08, 0.05s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 16:08
Completed Parallel DNS resolution of 1 host. at 16:08, 0.01s elapsed
Initiating SYN Stealth Scan at 16:08
Scanning 192.168.198.137 [65535 ports]
Discovered open port 80/tcp on 192.168.198.137
Discovered open port 22/tcp on 192.168.198.137
Completed SYN Stealth Scan at 16:08, 5.45s elapsed (65535 total ports)
Initiating Service scan at 16:08
Scanning 2 services on 192.168.198.137
Completed Service scan at 16:08, 24.76s elapsed (2 services on 1 host)
Initiating OS detection (try #1) against 192.168.198.137
NSE: Script scanning 192.168.198.137.
Initiating NSE at 16:08
Completed NSE at 16:10, 114.87s elapsed
Initiating NSE at 16:10
Completed NSE at 16:10, 0.04s elapsed
Nmap scan report for 192.168.198.137
Host is up (0.0033s latency).
Not shown: 65533 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u6 (protocol 2.0)
80/tcp open http Apache httpd 2.4.25 ((Debian))
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-csrf:
| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.198.137
| Found the following possible CSRF vulnerabilities:
|
| Path: http://192.168.198.137:80/
| Form id: search-block-form
| Form action: /search/node
|
| Path: http://192.168.198.137:80/search/node
| Form id: search-form
| Form action: /search/node
|
| Path: http://192.168.198.137:80/search/node
| Form id: search-block-form
| Form action: /search/node
|
| Path: http://192.168.198.137:80/node/1
| Form id: search-block-form
| Form action: /search/node
|
| Path: http://192.168.198.137:80/user/login
| Form id: user-login-form
| Form action: /user/login
|
| Path: http://192.168.198.137:80/user/login
| Form id: search-block-form
| Form action: /search/node
|
| Path: http://192.168.198.137:80/search/node
| Form id: search-form
| Form action: /search/node
|
| Path: http://192.168.198.137:80/search/node
| Form id: search-block-form
| Form action: /search/node
|
| Path: http://192.168.198.137:80/search/node/help
| Form id: search-block-form
| Form action: /search/node
|
| Path: http://192.168.198.137:80/search/node
| Form id: search-form
| Form action: /search/node
|
| Path: http://192.168.198.137:80/search/node
| Form id: search-block-form
| Form action: /search/node
|
| Path: http://192.168.198.137:80/node/
| Form id: search-block-form
| Form action: /search/node
|
| Path: http://192.168.198.137:80/user/login
| Form id: user-login-form
| Form action: /user/login
|
| Path: http://192.168.198.137:80/user/login
| Form id: search-block-form
| Form action: /search/node
|
| Path: http://192.168.198.137:80/user/password
| Form id: user-pass
| Form action: /user/password
|
| Path: http://192.168.198.137:80/user/password
| Form id: search-block-form
| Form action: /search/node
|
| Path: http://192.168.198.137:80/search/node/
| Form id: search-form
| Form action: /search/node/
|
| Path: http://192.168.198.137:80/search/node/
| Form id: search-block-form
|_ Form action: /search/node
|_http-server-header: Apache/2.4.25 (Debian)
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
| http-enum:
| /rss.xml: RSS or Atom feed
| /robots.txt: Robots file
| /INSTALL.txt: Drupal file
| /: Drupal version 8
|_ /README.txt: Interesting, a readme.
MAC Address: 00:0C:29:9D:C5:A2 (VMware)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.9
Uptime guess: 0.304 days (since Thu Aug 8 08:53:28 2024)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=261 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE
HOP RTT ADDRESS
1 3.33 ms 192.168.198.137
NSE: Script Post-scanning.
Initiating NSE at 16:10
Completed NSE at 16:10, 0.00s elapsed
Initiating NSE at 16:10
Completed NSE at 16:10, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 186.00 seconds
Raw packets sent: 65558 (2.885MB) | Rcvd: 65550 (2.623MB)