Решено Вывод лога NMAP

R

rbiter

Народ, как решить такую проблему. Сканирую диапазоны скриптами. Как сделать чтоб nmap отсеивал это:

Bash:
Packet capture filter (device ens18): dst host 185.221.153.243 and (icmp or icmp6 or tcp or udp or sctp)
Packet capture filter (device ens18): dst host 185.221.153.243 and (icmp or icmp6 or tcp or udp or sctp)
Nmap scan report for 52.160.44.152
Host is up, received user-set (0.19s latency).
Scanned at 2018-03-30 13:49:24 MSK for 34s

PORT    STATE SERVICE      REASON
135/tcp open  msrpc        syn-ack ttl 99
139/tcp open  netbios-ssn  syn-ack ttl 99
445/tcp open  microsoft-ds syn-ack ttl 99

Host script results:
| smb-vuln-cve-2017-7494:
|_  ERROR: Could not negotiate a connection:SMB: ERROR: Server disconnected the connection
|_smb-vuln-ms17-010: Could not connect to 'IPC$'
А записывал только это:
Bash:
Nmap scan report for 52.160.110.160
Host is up, received user-set (0.19s latency).
Scanned at 2018-03-30 15:12:57 MSK for 32s

PORT    STATE SERVICE      REASON
135/tcp open  msrpc        syn-ack ttl 99
139/tcp open  netbios-ssn  syn-ack ttl 99
445/tcp open  microsoft-ds syn-ack ttl 99

Host script results:
| smb-vuln-cve-2017-7494:
|_  ERROR: Either versioning failed or samba does not exist on the port!
| smb-vuln-ms17-010:
|   VULNERABLE:
|   Remote Code Execution vulnerability in Microsoft SMBv1 servers (ms17-010)
|     State: VULNERABLE
|     IDs:  CVE:CVE-2017-0143
|     Risk factor: HIGH
|       A critical remote code execution vulnerability exists in Microsoft SMBv1
|        servers (ms17-010).
|
|     Disclosure date: 2017-03-14
|     References:
|       https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
|       https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
|_      https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0143
Может кто помочь? за ранее спасибо
 
Мы в соцсетях: