User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36
这个大哥攻击成功了
c复制代码
http://120.77.82.232:8080/
但是开放了一些端口,就不干你了
c复制代码
C:\Users\hi>nmap -sV 120.77.82.232
Starting Nmap 7.93 ( https://nmap.org ) at 2024-04-24 15:26 中国标准时间
NSOCK ERROR [0.0770s] ssl_init_helper(): OpenSSL legacy provider failed to load.
Nmap scan report for 120.77.82.232
Host is up (0.040s latency).
Not shown: 991 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
22/tcp closed ssh
53/tcp closed domain
113/tcp closed ident
1080/tcp closed socks
1688/tcp open nsjtp-data?
3389/tcp closed ms-wbt-server
5566/tcp closed westec-connect
6000/tcp closed X11
8080/tcp open http SimpleHTTPServer 0.6 (Python 3.9.2)
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port1688-TCP:V=7.93%I=7%D=4/24%Time=6628B473%P=i686-pc-windows-windows%
SF:r(WMSRequest,20,"\x05\0\x03#\x10\0\0\0\x20\0\0\0\x02\0\0\0\x20\0\0\0\0\
SF:0\0\0\x03\0\x01\x1c\0\0\0\0");
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 79.27 seconds