靶机地址
https://www.vulnhub.com/entry/digitalworldlocal-bravery,281/
深入交流学习:webMsec
安装靶机
打开kali,扫存活主机
nmap -sP 192.168.160.0/24
靶机ip
192.168.160.128
扫一波端口和服务:
./nmapAuto -H 192.168.160.128 -t All
PORT STATE SERVICE
22/tcp open ssh
53/tcp open domain
80/tcp open http
111/tcp open rpcbind
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
2049/tcp open nfs
3306/tcp open mysql
8080/tcp open http-proxy
20048/tcp open mountd
37904/tcp open unknown
43859/tcp open unknown
MAC Address: 00:0C:29:78:46:B7 (VMware)
Making a script scan on extra ports: 20048, 37904, 43859
PORT STATE SERVICE VERSION
20048/tcp open mountd 1-3 (RPC #100005)
37904/tcp open status 1 (RPC #100024)
43859/tcp open nlockmgr 1-4 (RPC #100021)
MAC Address: 00:0C:29:78:46:B7 (VMware)
8080/tcp open http nginx 1.12.2
|_http-open-proxy: Proxy might be redirecting requests
| http-robots.txt: 4 disallowed entries
|_/cgi-bin/ /qwertyuiop.html /private /public
|