##當我們要枚舉靶機所有開放的埠ports的時候,可以用-p-來執行,但速度太慢
##所以我們可以掃tcp的前1000埠來代替
┌─[eu-academy-6]─[]─[]─[~]
└──╼ [★]$ nmap 10.129.196.222 -sS -oA target
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-10-27 07:47 CDT
Nmap scan report for 10.129.196.222
Host is up (0.051s latency).
Not shown: 993 closed tcp ports (reset)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
110/tcp open pop3
139/tcp open netbios-ssn
143/tcp open imap
445/tcp open microsoft-ds
31337/tcp open Elite
##注意-oA target 代表將結果用各種型態的檔案類別來儲存,檔名前面加上target
##然後用ls指令來看,確實有儲存
┌─[eu-academy-6]─[]─[]─[~]
└──╼ [★]$ ls
cacert.der Downloads Public target.xml tnet.nmap
Desktop Music target.gnmap Templates tnet.xml
Documents Pictures target.nmap tnet.gnmap Videos
##接著執行xsltproc執行,將xml檔案轉換成html檔案
┌─[eu-academy-6]─[]─[]─[~]
└──╼ [★]$ xsltproc target.xml -o target.html

沒有留言:
發佈留言
歡迎留下寶貴意見