被攻击者IP:192.168.128.149 操作系统:Windows Server 2003
第一步,检测数据库的连接状态:
msf > db_status
[*] postgresql connected to msf
第二步:开始扫描运行的服务:
msf > db_nmap -sS -sV -O -n 192.168.128.149
[*] Nmap: Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-06 16:54 CST
[*] Nmap: Nmap scan report for 192.168.128.149
[*] Nmap: Host is up (0.00025s latency).
[*] Nmap: Not shown: 986 closed ports
[*] Nmap: PORT STATE SERVICE VERSION
[*] Nmap: 21/tcp open ftp Microsoft ftpd
[*] Nmap: 80/tcp open http Microsoft IIS httpd 6.0
[*] Nmap: 135/tcp open msrpc Microsoft Windows RPC
[*] Nmap: 139/tcp open netbios-ssn Microsoft Windows netbios-ssn
[*] Nmap: 445/tcp open microsoft-ds Microsoft Windows 2003 or 2008 microsoft-ds
[*] Nmap: 777/tcp open multiling-http?
[*] Nmap: 1025/tcp open msrpc Microsoft Windows RPC
[*] Nmap: 1026/tcp open msrpc Microsoft Windows RPC
[*] Nmap: 1027/tcp open msrpc Microsoft Windows RPC
[*] Nmap: 1031/tcp open msrpc Microsoft Windows RPC
[*] Nmap: 6002/tcp o