┌──(kali㉿kali)-[~/Tools/w3af] └─$ curl --head http://192.168.0.102 HTTP/1.1 200 OK Content-Length: 1193 Content-Type: text/html Content-Location: http://192.168.0.102/iisstart.htm Last-Modified: Fri, 21 Feb 2003 12:15:52 GMT Accept-Ranges: bytes ETag: "0ce1f9a2d9c21:242" Server: Microsoft-IIS/6.0 MicrosoftOfficeWebServer: 5.0_Pub X-Powered-By: ASP.NET Date: Mon, 03 Oct 2022 14:29:35 GMT
IIS 版本和操作系统对应表
IIS Version
Windows Server Version
IIS 5.0
Windows 2000
IIS 5.1
Windows XP
IIS 6.0
Windows 2003
IIS 7.0
Windows 2008、Windows Vista
IIS 7.5
Windows 2008 R2、Windows 7
使用 nmap 命令
查看服务版本
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
┌──(kali㉿kali)-[~] └─$ nmap 192.168.0.102 -p 80 -A Starting Nmap 7.92 ( https://nmap.org ) at 2022-10-03 09:42 EDT Nmap scan report for 192.168.0.102 (192.168.0.102) Host is up (0.00056s latency).
PORT STATE SERVICE VERSION 80/tcp open http Microsoft IIS httpd 6.0 |_http-title: \xBD\xA8\xC9\xE8\xD6\xD0 | http-methods: |_ Potentially risky methods: TRACE |_http-server-header: Microsoft-IIS/6.0 Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 6.39 seconds
-p <port ranges>: Only scan specified ports
-A: Enable OS detection, version detection, script scanning, and traceroute
──(kali㉿kali)-[~] └─$ sudo nmap 192.168.0.102 -O [sudo] password for kali: Starting Nmap 7.92 ( https://nmap.org ) at 2022-10-03 09:42 EDT Nmap scan report for 192.168.0.102 (192.168.0.102) Host is up (0.00033s latency). Not shown: 994 closed tcp ports (reset) PORT STATE SERVICE 80/tcp open http 135/tcp open msrpc 139/tcp open netbios-ssn 445/tcp open microsoft-ds 1025/tcp open NFS-or-IIS 1046/tcp open wfremotertm MAC Address: 00:0C:29:86:F6:23 (VMware) Device type: general purpose Running: Microsoft Windows XP|2003 OS CPE: cpe:/o:microsoft:windows_xp::sp2 cpe:/o:microsoft:windows_server_2003::sp1 cpe:/o:microsoft:windows_server_2003::sp2 OS details: Microsoft Windows XP SP2 or Windows Server 2003 SP1 or SP2 Network Distance: 1 hop
OS detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 2.46 seconds
OS DETECTION: -O: Enable OS detection –osscan-limit: Limit OS detection to promising targets –osscan-guess: Guess OS more aggressively