SF-Port23-TCP:V=7.93%I=7%D=6/6%Time=647EE099%P=x86_64-pc-linux-gnu%r(NULL, SF:19,"\xff\xfd\x01\xff\xfd\x1f\xff\xfb\x01\xff\xfb\x03\r\r\nUsername:\x20 SF:")%r(GenericLines,31,"\xff\xfd\x01\xff\xfd\x1f\xff\xfb\x01\xff\xfb\x03\ SF:r\r\nUsername:\x20\r\nUsername:\x20\r\nUsername:\x20")%r(tn3270,37,"\xf SF:f\xfd\x01\xff\xfd\x1f\xff\xfb\x01\xff\xfb\x03\r\r\n\^@IBM-3279-4-E\xfb\ SF:^YUsername:\x20IBM-3279-4-E\x07")%r(GetRequest,6B,"\xff\xfd\x01\xff\xfd SF:\x1f\xff\xfb\x01\xff\xfb\x03\r\r\nGET\x20/\x20HTTP/1\.0\r\n\r\nUsername SF::\x20GET\x20/\x20HTTP/1\.0\r\nPassword:\x20\r\nBad\x20username\x20or\x2 SF:0password\r\nUsername:\x20")%r(RPCCheck,19,"\xff\xfd\x01\xff\xfd\x1f\xf SF:f\xfb\x01\xff\xfb\x03\r\r\n\x80\^@\^@\(r\xfe\^\]")%r(Help,2F,"\xff\xfd\ SF:x01\xff\xfd\x1f\xff\xfb\x01\xff\xfb\x03\r\r\nHELP\r\nUsername:\x20HELP\ SF:r\nPassword:\x20")%r(SIPOptions,26B,"\xff\xfd\x01\xff\xfd\x1f\xff\xfb\x SF:01\xff\xfb\x03\r\r\nOPTIONS\x20sip:nm\x20SIP/2\.0\r\nVia:\x20SIP/2\.0/T SF:CP\x20nm;branch=foo\r\nFrom:\x20<sip:nm@nm>;tag=root\r\nTo:\x20<sip:nm2 SF:@nm2>\r\nCall-ID:\x2050000\r\nCSeq:\x2042\x20OPTIONS\r\nMax-Forwards:\x SF:2070\r\nContent-Length:\x200\r\nContact:\x20<sip:nm@nm>\r\nAccept:\x20a SF:pplication/sdp\r\n\r\nUsername:\x20OPTIONS\x20sip:nm\x20SIP/2\.0\r\nPas SF:sword:\x20\r\nBad\x20username\x20or\x20password\r\nUsername:\x20From:\x SF:20<sip:nm@nm>;tag=root\r\nPassword:\x20\r\nBad\x20username\x20or\x20pas SF:sword\r\nUsername:\x20Call-ID:\x2050000\r\nPassword:\x20\r\nBad\x20user SF:name\x20or\x20password\r\nUsername:\x20Max-Forwards:\x2070\r\nPassword: SF:\x20\r\nBad\x20username\x20or\x20password\r\nUsername:\x20Contact:\x20< SF:sip:nm@nm>\r\nPassword:\x20\r\n\xe7\x94\xa8\xe6\x88\xb7\xe8\xa2\xab\xe7 SF:\xa6\x81\xe7\x94\xa8,\x20\xe8\xaf\xb760\xe7\xa7\x92\xe5\x90\x8e\xe9\x87 SF:\x8d\xe8\xaf\x95\.\r\nUsername:\x20\r\nUsername:\x20")%r(NCP,49,"\xff\x SF:fd\x01\xff\xfd\x1f\xff\xfb\x01\xff\xfb\x03\r\r\nDmdT\^@\^@\^@\x08\x20\x SF:08\x08\x20\x08\x08\x20\x08\x08\x20\x08\x08\x20\x08\x08\x20\x08\x08\x20\ SF:x08\x08\x20\x08\x08\x20\x08\x08\x20\x08\^@\^@\^@\^A\^@\^@\^@\^@\^@")是什么疑似
时间: 2023-08-22 12:07:34 浏览: 154
这个看起来像是一个nmap扫描的结果,其中包含了对TCP端口23进行的一些探测。具体来说,它使用了一些协议指令和响应信息,如GET、OPTIONS、Username等,来尝试与目标主机进行交互,以便了解是否存在某些服务或漏洞。需要注意的是,这个结果是一个十六进制字符串,需要通过解码或分析才能得到更有意义的信息。
相关问题
请帮我翻译 Starting Nmap 7.93 ( https://nmap.org ) at 2023-06-08 15:58 CST Pre-scan script results: | broadcast-avahi-dos: | Discovered hosts: | 224.0.0.251 | After NULL UDP avahi packet DoS (CVE-2011-1002). |_ Hosts are all up (not vulnerable). Nmap scan report for MiWiFi-RA72-srv (192.168.31.244) Host is up (0.026s latency). Not shown: 995 closed tcp ports (reset) PORT STATE SERVICE 80/tcp open http |_http-csrf: Couldn't find any CSRF vulnerabilities. |_http-dombased-xss: Couldn't find any DOM based XSS. |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. | http-slowloris-check: | VULNERABLE: | Slowloris DOS attack | State: LIKELY VULNERABLE | IDs: CVE:CVE-2007-6750 | Slowloris tries to keep many connections to the target web server open and hold | them open as long as possible. It accomplishes this by opening connections to | the target web server and sending a partial request. By doing so, it starves | the http server's resources causing Denial Of Service. | | Disclosure date: 2009-09-17 | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750 |_ http://ha.ckers.org/slowloris/ 443/tcp open https |_http-dombased-xss: Couldn't find any DOM based XSS. |_http-csrf: Couldn't find any CSRF vulnerabilities. |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. 631/tcp open ipp 8080/tcp open http-proxy 9100/tcp open jetdirect MAC Address: 6C:02:E0:20:74:2A (HP) Nmap done: 1 IP address (1 host up) scanned in 193.99 seconds
在2023年6月8日15:58 CST,开始扫描MiWiFi-RA72-srv (192.168.31.244)。预扫描脚本结果如下:| broadcast-avahi-dos: | 发现主机:| 224.0.0.251 | 在NULL UDP avahi数据包DoS之后(CVE-2011-1002),主机都是活跃的(没有漏洞)。 未显示:995个关闭的TCP端口(已重置)。端口状态和服务如下:80/tcp open http,443/tcp open https,631/tcp open ipp,8080/tcp open http-proxy,9100/tcp open jetdirect。MAC地址为6C:02:E0:20:74:2A(HP)。HTTP扫描结果:|_http-csrf:找不到任何CSRF漏洞。|_http-dombased-xss:找不到任何基于DOM的XSS。|_http-stored-xss:找不到任何存储的XSS漏洞。| http-slowloris-check:| 易受攻击:慢速loris DOS攻击| 状态:可能易受攻击| IDs:CVE:CVE-2007-6750 |慢速loris试图保持许多连接到目标网络服务器的打开状态,并尽可能长时间保持它们打开。它通过向目标网络服务器打开连接并发送部分请求来实现这一点。通过这样做,它会使http服务器的资源饥饿,从而导致拒绝服务。| |披露日期:2009-09-17| 引用:| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750|_ http://ha.ckers.org/slowloris/。扫描完成:1个IP地址(1个主机)在193.99秒内扫描。
用c语言写现在90号汽油6.95元/升、93号汽油7.44元/升、97号汽油7.93元/升。为吸引顾客,某自动加油站推出了“自助服务”和“协助服务”两个服务等级,分别可得到5%和3%的折扣。 本题要求编写程序,根据输入顾客的加油量a,汽油品种b(90、93或97)和服务类型c(m - 自助,e - 协助),计算并输出应付款。 输入格式: 输入在一行中给出两个整数和一个字符,分别表示顾客的加油量a,汽油品种b(90、93或97)和服务类型c(m - 自助,e - 协助)。 输出格式: 在一行中输出应付款额,保留小数点后2位。 输入样例: 40 97 m 输出样例: 301.34
好的,以下是C语言实现的代码:
```c
#include <stdio.h>
int main()
{
int a, b;
char c;
float price, discount, total;
scanf("%d %d %c", &a, &b, &c);
switch (b)
{
case 90:
price = 6.95;
break;
case 93:
price = 7.44;
break;
case 97:
price = 7.93;
break;
}
if (c == 'm')
discount = 0.05;
else if (c == 'e')
discount = 0.03;
total = a * price * (1 - discount);
printf("%.2f", total);
return 0;
}
```
这段代码中,我们使用了 `switch` 语句来根据输入的汽油品种 `b` 确定价格,然后根据输入的服务类型 `c` 确定折扣。最后,我们将应付款额打印到控制台上,保留两位小数。