root@kali:~# nmap -sn -v 192.168.56.0/24 Nmap scan report for 192.168.56.105 Host is up (0.00022s latency). MAC Address: 08:00:27:CF:65:22 (Oracle VirtualBox virtual NIC)
1 2 3 4
root@kali:~# nmap -p- -v -sV -Pn 192.168.56.105 PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.0p1 Ubuntu 6build1 (Ubuntu Linux; protocol 2.0) 80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
1 2 3 4 5 6 7 8 9 10 11 12
root@kali:~# nmap -p 22,80 -Pn -sV -A -T5 -v --script=vuln 192.168.56.105 PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.0p1 Ubuntu 6build1 (Ubuntu Linux; protocol 2.0) |_clamav-exec: ERROR: Script execution failed (use -d to debug) 80/tcp open http Apache httpd 2.4.41 ((Ubuntu)) |_clamav-exec: ERROR: Script execution failed (use -d to debug) |_http-csrf: Couldn't find any CSRF vulnerabilities. |_http-dombased-xss: Couldn't find any DOM based XSS. | http-enum: |_ /scripts/: Potentially interesting directory w/ listing on 'apache/2.4.41 (ubuntu)' |_http-server-header: Apache/2.4.41 (Ubuntu) |_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
root@kali:~# cewl http://192.168.56.105/websec/ > oshacknos3.txt root@kali:~# cat oshacknos3.txt CeWL 5.4.6 (Exclusion) Robin Wood (robin@digi.ninja) (https://digi.ninja/) hackNos Bootstrap and com Start www JavaScript Navigation About Services Portfolio Contact Security Find Out More Securityx has everything you need get your new website running time All the templates themes are open source free download easy use strings attached Get Started Your Service contact hacknos core Plugin Custom scripts for this template