_壮 2024-04-15 10:05 采纳率: 0%
浏览 2

关于#网络#的问题:可以获取主机信息操作系统、主机名、IP、MAC、厂商等信息外,能否获取到主机更具体的指纹信息(语言-java)

对内网中的主机进行探测,可以获取主机信息操作系统、主机名、IP、MAC、厂商等信息外,能否获取到主机更具体的指纹信息

  • 写回答

6条回答 默认 最新

  • 码农阿豪@新空间 新星创作者: 前端开发技术领域 2024-04-15 10:07
    关注
    让阿豪来帮你解答,本回答参考chatgpt3.5编写提供,如果还有疑问可以评论或留言
    可以通过渗透测试工具或者漏洞扫描工具获取主机更具体的指纹信息,例如可以使用Nmap工具进行操作系统版本、开放端口、协议及服务等信息的探测,也可以使用Metasploit进行漏洞扫描、渗透测试等操作,获取更详细的主机指纹信息。 例如,使用Nmap获取主机的详细信息: 命令:nmap -A 192.168.1.1 输出: Starting Nmap 7.70 ( https://nmap.org ) at 2021-09-17 10:18 CST Nmap scan report for 192.168.1.1 Host is up (0.0075s latency). Not shown: 998 closed ports PORT STATE SERVICE VERSION 23/tcp open telnet BusyBox telnetd 80/tcp open http lighttpd 1.4.35 | http-methods: |_ Supported Methods: GET HEAD POST OPTIONS |_http-server-header: lighttpd/1.4.35 |_http-title: Site doesn't have a title (text/html; charset=utf-8). 443/tcp open ssl/https? |_ssl-date: 2021-09-17T02:18:19-06:00; 0s from now | ssl-cert: Subject: commonName=www.example.com | Not valid before: 2019-06-21T03:04:45 |_Not valid after: 2020-06-21T03:04:45 |_sslv2: server still supports SSLv2 1900/tcp open upnp Linux upnpd |_upnp-info: 1.0 1.0 Device type: broadband router|webcam|WAP|printer |_routerboard-info: MikroTik RB951Ui-2HnD, RouterOS v6.42.6, QCA9533 cpu |_http-title: Site doesn't have a title (text/html; charset=utf-8). MAC Address: 00:11:22:33:44:55 (Unknown) Aggressive OS guesses: Linux 2.6.32 - 3.13, Linux 2.6.32 - 4.6 (92%), ASUS RT-N56U WAP (Linux 2.6.22), Brother HL-2150N printer (96%), Linux 3.1 - 3.2 (96%), Linux 3.2 (96%), Linux 3.2 - 4.9 (96%), Linux 3.3 or 4.0 (96%), Linux 3.5 - 3.9 (96%), Linux 3.7 - 3.10 (96%) No exact OS matches for host (test conditions non-ideal). TCP/IP fingerprint: OS:SCAN(V=7.70%E=4%D=9/17%OT=23%CT=1%CU=34223%PV=N%DS=1%DC=D%G=Y%M=001122% OS:TM=61417B25%P=x86_64-pc-linux-gnu)SEQ(SP=108%GCD=1%ISR=10F%TI=Z%CI=Z%II= OS:I%TS=8)OPS(O1=M54DST11NW7%O2=M54DST11NW7%O3=M54DNNT11NW7%O4=M54DST11NW7%O OS:5=M54DST11NW7%O6=M54DST11)WIN(W1=FFFF%W2=FFFF%W3=FFFF%W4=FFFF%W5=FFFF%W6= OS:FFFF)ECN(R=Y%DF=Y%T=40%W=FFFF%O=M54DNNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A= OS:S+%F=AS%RD=0%Q=)T2(R=Y%DF=Y%T=40%WO=0%S=Z%A=S%F=AR%O=%RD=0%Q=)T3(R=Y%DF= OS:Y%T=40%W=FFFF%S=O%A=S+%F=AS%O=M54DNNT11NW7%RD=0%Q=)T4(R=Y%DF=Y%T=40%WO=0 OS:%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6 OS:(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=FFFF%S=O%A= OS:S+%F=AS%O=%RD=0%Q=)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPC=G%RI OS:D=G%RCD=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S) Network Distance: 1 hop Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel TRACEROUTE HOP RTT ADDRESS 1 7.53 ms 192.168.1.1 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 16.15 seconds 从输出中可以看到主机的IP地址、MAC地址、操作系统、厂商信息、开放端口、服务信息等详细信息。
    评论

报告相同问题?

问题事件

  • 创建了问题 4月15日