4 packets received by filter, 0 packets dropped by kernel Ending arp-scan 1.10.0: 256 hosts scanned in 1.939 seconds (132.03 hosts/sec). 4 responded ❯ export ip=192.168.60.180 ❯ rustscan -a $ip .----. .-. .-. .----..---. .----. .---. .--. .-. .-. | {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| | | .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ | `-' `-'`-----'`----' `-' `----' `---' `-' `-'`-' `-' The Modern Day Port Scanner. ________________________________________ : http://discord.skerritt.blog : : https://github.com/RustScan/RustScan : -------------------------------------- RustScan: Because guessing isn't hacking.
[~] The config file is expected to be at "/home/Pepster/.rustscan.toml" [!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers [!] Your file limit is very small, which negatively impacts RustScan's speed. Use the Docker image, or up the Ulimit with '--ulimit 5000'. Open 192.168.60.180:80 [~] Starting Script(s) [~] Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-14 13:02 CST Initiating ARP Ping Scan at 13:02 Scanning 192.168.60.180 [1 port] Completed ARP Ping Scan at 13:02, 0.05s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 13:02 Completed Parallel DNS resolution of 1 host. at 13:02, 0.01s elapsed DNS resolution of 1 IPs took 0.01s. Mode: Async [#: 3, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0] Initiating SYN Stealth Scan at 13:02 Scanning 192.168.60.180 [1 port] Discovered open port 80/tcp on 192.168.60.180 Completed SYN Stealth Scan at 13:02, 0.06s elapsed (1 total ports) Nmap scan report for 192.168.60.180 Host is up, received arp-response (0.00060s latency). Scanned at 2025-02-14 13:02:17 CST for 0s PORT STATE SERVICE REASON 80/tcp open http syn-ack ttl 64 MAC Address: 08:00:27:11:87:AE (Oracle VirtualBox virtual NIC) Read data files from: /usr/share/nmap Nmap done: 1 IP address (1 host up) scanned in 0.30 seconds Raw packets sent: 2 (72B) | Rcvd: 2 (72B)
</div> <!-- "Please, jubiscleudo, don't forget to activate the port knocking when exiting your section, and tell the boss not to forget to approve the .jpg file - [email protected]" --> <!-- 请,jubiscleudo,在离开您的区域时不要忘记激活端口敲击,并告诉老板不要忘记批准.jpg文件 - [email protected]> <script src="https://ajax.googleapis.com/ajax/libs/jquery/3.3.1/jquery.min.js"></script> <script src="js/script.js"></script> </body> </html>
❯ knock $ip 10000 4444 65535 ❯ rustscan -a $ip .----. .-. .-. .----..---. .----. .---. .--. .-. .-. | {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| | | .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ | `-' `-'`-----'`----' `-' `----' `---' `-' `-'`-' `-' The Modern Day Port Scanner. ________________________________________ : http://discord.skerritt.blog : : https://github.com/RustScan/RustScan : -------------------------------------- 0day was here ♥ [~] The config file is expected to be at "/home/Pepster/.rustscan.toml" [!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers [!] Your file limit is very small, which negatively impacts RustScan's speed. Use the Docker image, or up the Ulimit with '--ulimit 5000'. Open 192.168.60.180:22 Open 192.168.60.180:80 [~] Starting Script(s) [~] Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-14 13:25 CST Initiating ARP Ping Scan at 13:25 Scanning 192.168.60.180 [1 port] Completed ARP Ping Scan at 13:25, 0.08s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 13:25 Completed Parallel DNS resolution of 1 host. at 13:25, 0.02s elapsed DNS resolution of 1 IPs took 0.02s. Mode: Async [#: 3, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0] Initiating SYN Stealth Scan at 13:25 Scanning 192.168.60.180 [2 ports] Discovered open port 80/tcp on 192.168.60.180 Discovered open port 22/tcp on 192.168.60.180 Completed SYN Stealth Scan at 13:25, 0.04s elapsed (2 total ports) Nmap scan report for 192.168.60.180 Host is up, received arp-response (0.00056s latency). Scanned at 2025-02-14 13:25:43 CST for 0s
PORT STATE SERVICE REASON 22/tcp open ssh syn-ack ttl 64 80/tcp open http syn-ack ttl 64 MAC Address: 08:00:27:11:87:AE (Oracle VirtualBox virtual NIC)
Read data files from: /usr/share/nmap Nmap done: 1 IP address (1 host up) scanned in 0.31 seconds Raw packets sent: 3 (116B) | Rcvd: 3 (116B)
❯ nmap -6 08:00:27:11:87:AE Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-14 14:28 CST Failed to resolve "08:00:27:11:87:AE". WARNING: No targets were specified, so 0 hosts scanned. Nmap done: 0 IP addresses (0 hosts up) scanned in 0.01 seconds ❯ nmap -6 fe80::a00:27ff:fe11:87ae Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-14 14:28 CST Nmap scan report for fe80::a00:27ff:fe11:87ae Host is up (0.00090s latency). Not shown: 998 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http MAC Address: 08:00:27:11:87:AE (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 0.36 seconds ❯ ssh jubiscleudo@fe80::a00:27ff:fe11:87ae%eth0 The authenticity of host 'fe80::a00:27ff:fe11:87ae%eth0 (fe80::a00:27ff:fe11:87ae%eth0)' can't be established. ED25519 key fingerprint is SHA256:eKPnFiq8KwR3xWNP5ZL/aPJYYx+GZaCVrzrHIL4rem4. This host key is known by the following other names/addresses: ~/.ssh/known_hosts:7: [hashed name] Are you sure you want to continue connecting (yes/no/[fingerprint])? yes Warning: Permanently added 'fe80::a00:27ff:fe11:87ae%eth0' (ED25519) to the list of known hosts. jubiscleudo@fe80::a00:27ff:fe11:87ae%eth0's password: Welcome to Ubuntu 21.04 (GNU/Linux 5.11.0-16-generic x86_64)
System information as of Fri Feb 14 06:33:30 AM UTC 2025
System load: 0.0 Memory usage: 39% Processes: 111 Usage of /: 21.2% of 23.99GB Swap usage: 0% Users logged in: 0
=> There were exceptions while processing one or more plugins. See /var/log/landscape/sysinfo.log for more information.
0 updates can be installed immediately. 0 of these updates are security updates.
The list of available updates is more than a week old. To check for new updates run: sudo apt update Your Ubuntu release is not supported anymore. For upgrade information, please visit: http://www.ubuntu.com/releaseendoflife
New release '22.04.5 LTS' available. Run 'do-release-upgrade' to upgrade to it.
Last login: Fri Feb 14 05:26:19 2025 from 192.168.60.100 jubiscleudo@ubuntu20:~$