利用Metasploit Framework測試一些網站
[TOC]
Cheat Sheet
1 |
|
SmartDaily
IP: 34.81.5.101
Security Header Result
nmap
- nmap Result ```bash nmap -vv 34.81.5.101 [*] exec: nmap -vv 34.81.5.101
Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-02 01:49 EDT Initiating Ping Scan at 01:49 Scanning 34.81.5.101 [2 ports] Completed Ping Scan at 01:49, 0.01s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 01:49 Completed Parallel DNS resolution of 1 host. at 01:49, 0.01s elapsed Initiating Connect Scan at 01:49 Scanning 101.5.81.34.bc.googleusercontent.com (34.81.5.101) [1000 ports] Discovered open port 443/tcp on 34.81.5.101 Discovered open port 80/tcp on 34.81.5.101 Increasing send delay for 34.81.5.101 from 0 to 5 due to 11 out of 14 dropped probes since last increase. Increasing send delay for 34.81.5.101 from 5 to 10 due to 11 out of 11 dropped probes since last increase. Increasing send delay for 34.81.5.101 from 10 to 20 due to 11 out of 11 dropped probes since last increase. Increasing send delay for 34.81.5.101 from 20 to 40 due to 11 out of 15 dropped probes since last increase. Completed Connect Scan at 01:50, 75.06s elapsed (1000 total ports) Nmap scan report for 101.5.81.34.bc.googleusercontent.com (34.81.5.101) Host is up, received syn-ack (0.0085s latency). Scanned at 2023-10-02 01:49:05 EDT for 75s Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE REASON 80/tcp open http syn-ack 443/tcp open https syn-ack
Read data files from: /usr/bin/../share/nmap Nmap done: 1 IP address (1 host up) scanned in 75.09 seconds
1 |
|
開的Port: 21/25/80/110/143/443
飛像資訊
- IP:
199.15.163.148 - Security Header Result
nmap
- nmap Result ```bash $ nmap -vv 199.15.163.148 [*] exec: nmap -vv 199.15.163.148
Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-02 01:50 EDT Initiating Ping Scan at 01:50 Scanning 199.15.163.148 [2 ports] Completed Ping Scan at 01:50, 0.15s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 01:50 Completed Parallel DNS resolution of 1 host. at 01:50, 0.14s elapsed Initiating Connect Scan at 01:50 Scanning unalocated.163.wixsite.com (199.15.163.148) [1000 ports] Discovered open port 80/tcp on 199.15.163.148 Discovered open port 443/tcp on 199.15.163.148 Connect Scan Timing: About 18.15% done; ETC: 01:53 (0:02:20 remaining) Connect Scan Timing: About 21.00% done; ETC: 01:55 (0:03:49 remaining) Increasing send delay for 199.15.163.148 from 0 to 5 due to 11 out of 16 dropped probes since last increase. Connect Scan Timing: About 68.50% done; ETC: 01:52 (0:00:42 remaining) Completed Connect Scan at 01:52, 99.59s elapsed (1000 total ports) Nmap scan report for unalocated.163.wixsite.com (199.15.163.148) Host is up, received syn-ack (0.17s latency). Scanned at 2023-10-02 01:50:41 EDT for 99s Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE REASON 80/tcp open http syn-ack 443/tcp open https syn-ack
Read data files from: /usr/bin/../share/nmap Nmap done: 1 IP address (1 host up) scanned in 99.90 seconds ```
開的Port: 80/443