Starting Nmap 7.70 ( https://nmap.org ) at 2023-06-06 11:17 ?D1ú±ê×?ê±?? NSE: Loaded 148 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 11:17 Completed NSE at 11:17, 0.00s elapsed Initiating NSE at 11:17 Completed NSE at 11:17, 0.00s elapsed Initiating Ping Scan at 11:17 Scanning 122.227.161.206 [4 ports] Completed Ping Scan at 11:17, 4.94s elapsed (1 total hosts) Nmap scan report for 122.227.161.206 [host down] NSE: Script Post-scanning. Initiating NSE at 11:17 Completed NSE at 11:17, 0.00s elapsed Initiating NSE at 11:17 Completed NSE at 11:17, 0.00s elapsed Read data files from: D:\Nmap Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 17.90 seconds Raw packets sent: 8 (304B) | Rcvd: 0 (0B)表示什么意思
时间: 2024-04-26 18:24:35 浏览: 5
这是一个 Nmap 端口扫描的结果报告。报告显示扫描了 IP 地址为 122.227.161.206 的主机,扫描时间为 17.90 秒。然而,结果报告显示该主机处于宕机状态,无法访问。报告中的“[host down]”表示该主机已经下线或者无法响应。建议可以尝试使用 -Pn 参数来跳过 ping 测试,这样可能会有更好的扫描结果。
相关问题
https://www.kali.org/
https://www.kali.org/ 是一个网络安全工具集合,主要用于渗透测试和漏洞分析。它基于Debian Linux操作系统,包含了大量的安全工具,如Metasploit、Nmap、Wireshark等。Kali Linux也被广泛应用于网络安全教育和研究领域。
请帮我翻译 Starting Nmap 7.93 ( https://nmap.org ) at 2023-06-08 15:58 CST Pre-scan script results: | broadcast-avahi-dos: | Discovered hosts: | 224.0.0.251 | After NULL UDP avahi packet DoS (CVE-2011-1002). |_ Hosts are all up (not vulnerable). Nmap scan report for MiWiFi-RA72-srv (192.168.31.244) Host is up (0.026s latency). Not shown: 995 closed tcp ports (reset) PORT STATE SERVICE 80/tcp open http |_http-csrf: Couldn't find any CSRF vulnerabilities. |_http-dombased-xss: Couldn't find any DOM based XSS. |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. | http-slowloris-check: | VULNERABLE: | Slowloris DOS attack | State: LIKELY VULNERABLE | IDs: CVE:CVE-2007-6750 | Slowloris tries to keep many connections to the target web server open and hold | them open as long as possible. It accomplishes this by opening connections to | the target web server and sending a partial request. By doing so, it starves | the http server's resources causing Denial Of Service. | | Disclosure date: 2009-09-17 | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750 |_ http://ha.ckers.org/slowloris/ 443/tcp open https |_http-dombased-xss: Couldn't find any DOM based XSS. |_http-csrf: Couldn't find any CSRF vulnerabilities. |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. 631/tcp open ipp 8080/tcp open http-proxy 9100/tcp open jetdirect MAC Address: 6C:02:E0:20:74:2A (HP) Nmap done: 1 IP address (1 host up) scanned in 193.99 seconds
在2023年6月8日15:58 CST,开始扫描MiWiFi-RA72-srv (192.168.31.244)。预扫描脚本结果如下:| broadcast-avahi-dos: | 发现主机:| 224.0.0.251 | 在NULL UDP avahi数据包DoS之后(CVE-2011-1002),主机都是活跃的(没有漏洞)。 未显示:995个关闭的TCP端口(已重置)。端口状态和服务如下:80/tcp open http,443/tcp open https,631/tcp open ipp,8080/tcp open http-proxy,9100/tcp open jetdirect。MAC地址为6C:02:E0:20:74:2A(HP)。HTTP扫描结果:|_http-csrf:找不到任何CSRF漏洞。|_http-dombased-xss:找不到任何基于DOM的XSS。|_http-stored-xss:找不到任何存储的XSS漏洞。| http-slowloris-check:| 易受攻击:慢速loris DOS攻击| 状态:可能易受攻击| IDs:CVE:CVE-2007-6750 |慢速loris试图保持许多连接到目标网络服务器的打开状态,并尽可能长时间保持它们打开。它通过向目标网络服务器打开连接并发送部分请求来实现这一点。通过这样做,它会使http服务器的资源饥饿,从而导致拒绝服务。| |披露日期:2009-09-17| 引用:| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750|_ http://ha.ckers.org/slowloris/。扫描完成:1个IP地址(1个主机)在193.99秒内扫描。