❯ sudo arp-scan -l [sudo] password for Pepster: Interface: eth0, type: EN10MB, MAC: 5e:bb:f6:9e:ee:fa, IPv4: 192.168.60.100 Starting arp-scan 1.10.0 with 256 hosts (https://github.com/royhills/arp-scan) 192.168.60.1 00:50:56:c0:00:08 VMware, Inc. 192.168.60.2 00:50:56:e4:1a:e5 VMware, Inc. 192.168.60.143 08:00:27:ca:dc:49 PCS Systemtechnik GmbH 192.168.60.254 00:50:56:ed:2f:2b VMware, Inc.
4 packets received by filter, 0 packets dropped by kernel Ending arp-scan 1.10.0: 256 hosts scanned in 2.065 seconds (123.97 hosts/sec). 4 responded ❯ export ip=192.168.60.143 ❯ rustscan -a $ip .----. .-. .-. .----..---. .----. .---. .--. .-. .-. | {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| | | .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ | `-' `-'`-----'`----' `-' `----' `---' `-' `-'`-' `-' The Modern Day Port Scanner. ________________________________________ : http://discord.skerritt.blog : : https://github.com/RustScan/RustScan : -------------------------------------- RustScan: Making sure 'closed' isn't just a state of mind.
[~] The config file is expected to be at "/home/Pepster/.rustscan.toml" [!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers [!] Your file limit is very small, which negatively impacts RustScan's speed. Use the Docker image, or up the Ulimit with '--ulimit 5000'. Open 192.168.60.143:22 Open 192.168.60.143:3000 [~] Starting Script(s) [~] Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-21 13:39 CST Initiating ARP Ping Scan at 13:39 Scanning 192.168.60.143 [1 port] Completed ARP Ping Scan at 13:39, 0.08s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 13:39 Completed Parallel DNS resolution of 1 host. at 13:39, 0.01s elapsed DNS resolution of 1 IPs took 0.01s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0] Initiating SYN Stealth Scan at 13:39 Scanning 192.168.60.143 [2 ports] Discovered open port 22/tcp on 192.168.60.143 Discovered open port 3000/tcp on 192.168.60.143 Completed SYN Stealth Scan at 13:39, 0.04s elapsed (2 total ports) Nmap scan report for 192.168.60.143 Host is up, received arp-response (0.00052s latency). Scanned at 2025-04-21 13:39:09 CST for 0s PORT STATE SERVICE REASON 22/tcp open ssh syn-ack ttl 64 3000/tcp open ppp syn-ack ttl 64 MAC Address: 08:00:27:CA:DC:49 (PCS Systemtechnik/Oracle VirtualBox virtual NIC) Read data files from: /usr/share/nmap Nmap done: 1 IP address (1 host up) scanned in 0.31 seconds Raw packets sent: 3 (116B) | Rcvd: 3 (116B)
存在3000端口开放
尝试访问一下
结果一直超时,浏览器也没法直接访问
利用rustscan带全参数扫描,发现是套了SSL证书的Https站点
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 64 OpenSSH 9.2p1 Debian 2+deb12u2 (protocol 2.0) | ssh-hostkey: | 256 e7:ce:f2:f6:5d:a7:47:5a:16:2f:90:07:07:33:4e:a9 (ECDSA) | ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBLuHH80SwA8Qff3pGOY4aBesL0Aeesw6jqX+pbtR9O7w8jlbyNhuHmjjABb/34BxFp2oBx8o5xuZVXS1cE9nAlE= | 256 09:db:b7:e8:ee:d4:52:b8:49:c3:cc:29:a5:6e:07:35 (ED25519) |_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICKFE9s2IvPGAJ7Pt0kSC8t9OXYUrueJQQplSC2wbYtY 3000/tcp open ssl/ppp? syn-ack ttl 64 | ssl-cert: Subject: organizationName=Internet Widgits Pty Ltd/stateOrProvinceName=Some-State/countryName=FR | Issuer: organizationName=Internet Widgits Pty Ltd/stateOrProvinceName=Some-State/countryName=FR | Public Key type: rsa | Public Key bits: 2048 | Signature Algorithm: sha256WithRSAEncryption | Not valid before: 2024-05-20T15:36:20 | Not valid after: 2038-01-27T15:36:20 | MD5: 6ac6:1f8b:e3f8:dce0:4b1a:d12b:1259:386d | SHA-1: c423:6072:834f:77b9:396c:6907:8e29:08d6:f8c7:631d ……………………省略