[研究]nmap 7.95 (Kali Linux 2025.1c) 掃描 DVWA 網站的弱點
2025-05-09
********************************************************************************
[研究] Damn Vulnerable Web App (DVWA) 1.10 滲透測試練習(靶機)平台安裝 (Windows 2025)
https://shaurong.blogspot.com/2025/05/damn-vulnerable-web-app-dvwa-110.html
┌──(kali㉿kali)-[~]
└─$ nmap -v --script vuln https://192.168.128.144/dvwa/
Starting Nmap 7.95 ( https://nmap.org ) at 2025-05-08 23:20 EDT
NSE: Loaded 105 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 23:20
Completed NSE at 23:20, 10.00s elapsed
Initiating NSE at 23:20
Completed NSE at 23:20, 0.00s elapsed
Unable to split netmask from target expression: "https://192.168.128.144/dvwa/"
NSE: Script Post-scanning.
Initiating NSE at 23:20
Completed NSE at 23:20, 0.00s elapsed
Initiating NSE at 23:20
Completed NSE at 23:20, 0.00s elapsed
Read data files from: /usr/share/nmap
WARNING: No targets were specified, so 0 hosts scanned.
Nmap done: 0 IP addresses (0 hosts up) scanned in 10.19 seconds
Raw packets sent: 0 (0B) | Rcvd: 0 (0B)
┌──(kali㉿kali)-[~]
└─$
|
(完)
相關

沒有留言:
張貼留言