我试图了解Nmap NSE脚本是如何工作的。我用几个脚本扫描一个主机,但它们都没有显示任何东西,甚至没有说没有结果查找。Nmap这样做正常吗?示例如下所示,我运行了3个不同的脚本,但它们都返回相同的内容。
s# nmap -T4 --script ftp-proftpd-backdoor.nse 192.168.13.205
Starting Nmap 6.47 ( http://nmap.org ) at 2015-08-18 01:34 EDT
Nmap scan report for 192.168.13.205
Host is up (0.22s latency).
Not shown: 982 closed ports
PORT STATE SERVICE
21/tcp open ftp
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
1026/tcp open LSA-or-nterm
1029/tcp open ms-lsa
1030/tcp open iad1
1036/tcp open nsstp
1521/tcp open oracle
2030/tcp open device2
2100/tcp open amiganetfs
3372/tcp open msdtc
3389/tcp open ms-wbt-server
4443/tcp open pharos
7778/tcp open interwise
8080/tcp open http-proxy
MAC Address: 00:50:56:AF:3E:05 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 15.21 seconds
root@kali:/usr/share/nmap/scripts# nmap -T4 --script ftp-vuln-cve2010-4221.nse 192.168.13.205
Starting Nmap 6.47 ( http://nmap.org ) at 2015-08-18 01:35 EDT
Nmap scan report for 192.168.13.205
Host is up (0.22s latency).
Not shown: 982 closed ports
PORT STATE SERVICE
21/tcp open ftp
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
1026/tcp open LSA-or-nterm
1029/tcp open ms-lsa
1030/tcp open iad1
1036/tcp open nsstp
1521/tcp open oracle
2030/tcp open device2
2100/tcp open amiganetfs
3372/tcp open msdtc
3389/tcp open ms-wbt-server
4443/tcp open pharos
7778/tcp open interwise
8080/tcp open http-proxy
MAC Address: 00:50:56:AF:3E:05 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 16.65 seconds
root@kali:/usr/share/nmap/scripts#
s# nmap -T4 --script ftp-anon 192.168.13.205
Starting Nmap 6.47 ( http://nmap.org ) at 2015-08-18 01:45 EDT
Nmap scan report for 192.168.13.205
Host is up (0.22s latency).
Not shown: 983 closed ports
PORT STATE SERVICE
21/tcp open ftp
|_ftp-anon: Anonymous FTP login allowed (FTP code 230)
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
1026/tcp open LSA-or-nterm
1029/tcp open ms-lsa
1030/tcp open iad1
1036/tcp open nsstp
1521/tcp open oracle
2030/tcp open device2
2100/tcp open amiganetfs
3372/tcp open msdtc
4443/tcp open pharos
7778/tcp open interwise
8080/tcp open http-proxy
MAC Address: 00:50:56:AF:3E:05 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 16.21 seconds
root@kali:/usr/share/nmap/scripts# 发布于 2015-08-19 14:00:40
在3种情况下,NSE脚本将不产生输出:
-sV选项调用版本检测扫描。-v选项)这样做。您还可以使用-d调试标志获得有用的信息。
这条规则的一个显著的例外是脚本的"vuln“类别,或者更准确地说,是那些使用NSE库的脚本。要从这些脚本获得“无漏洞”输出,请使用--script-args vulns.showall。-d,您将看到一个可以发送给Nmap开发人员(dev@nmap.org)的Lua堆栈跟踪。https://stackoverflow.com/questions/32064472
复制相似问题