目标IP 10.10.10.137
因为是靶机所以二话不说nmap 扫一下
nmap 获得信息如下:
# Nmap 7.70 scan initiated Fri Aug 2 10:51:40 2019 as: nmap -sT -sV -O -T4 -o nmap.scan 10.10.10.137
Warning: 10.10.10.137 giving up on port because retransmission cap hit (6).
Nmap scan report for 10.10.10.137
Host is up (0.29s latency).
Not shown: 994 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 3.0.3+ (ext.1)
22/tcp open ssh?
80/tcp open http Apache httpd 2.4.38 ((FreeBSD) PHP/7.3.3)
3000/tcp open http Node.js Express framework
3580/tcp filtered nati-svrloc
8000/tcp open http Ajenti http control panel
Aggressive OS guesses: Linux 3.2 (95%), Linux 4.4 (94%), Actiontec MI424WR-GEN3I WAP (93%), DD-WRT v24-sp2 (Linux 2.4.37) (92%), Microsoft Windows XP SP3 (90%), Microsoft Windows XP SP3 or Windows 7 or Windows Server 2012 (90%), TiVo series 1 (Linux 2.1.24-TiVo-2.5) (88%), Allie