靶场思路演练之w1r3s-v1.1
-
nmap 扫描
TCP 扫描
$ sudo nmap -sT --min-rate 10000 -p- 10.10.10.130Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-03-27 22:59 EDT
Nmap scan report for 10.10.10.130
Host is up (0.00059s latency).
Not shown: 55528 filtered tcp ports (no-response), 10003 closed tcp ports (conn-refused)
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
80/tcp open http
3306/tcp open mysql
MAC Address...
阅读原文