39.99.141.81:8080 open 39.99.141.81:80 open [*] alive ports len is: 2 start vulscan [*] WebTitle http://39.99.141.81:8080 code:403 len:548 title:None [*] WebTitle http://39.99.141.81 code:200 len:54646 title:XR SHOP [+] PocScan http://39.99.141.81/www.zip poc-yaml-backup-file
扫出来两个网站,还有一个www泄露,在tools里面有一个任意文件读取
1 2 3 4 5 6 7 8 9
<?php $logfile = rawurldecode( $_GET['logfile'] ); // Make sure the file is exist. if ( file_exists( $logfile ) ) { // Get the content and echo it. $text = file_get_contents( $logfile ); echo( $text ); } exit;
172.22.14.7:445 open 172.22.14.7:8080 open 172.22.14.31:1521 open 172.22.14.7:3306 open 172.22.14.46:445 open 172.22.14.31:445 open 172.22.14.11:445 open 172.22.14.46:139 open 172.22.14.31:139 open 172.22.14.11:139 open 172.22.14.7:139 open 172.22.14.46:135 open 172.22.14.31:135 open 172.22.14.11:135 open 172.22.14.7:135 open 172.22.14.46:80 open 172.22.14.16:80 open 172.22.14.7:80 open 172.22.14.16:22 open 172.22.14.16:8060 open 172.22.14.11:88 open 172.22.14.16:9094 open [*] alive ports len is: 22 start vulscan [*] WebTitle http://172.22.14.7:8080 code:403 len:548 title:None [*] NetInfo [*]172.22.14.31 [->]XR-ORACLE [->]172.22.14.31 [*] NetInfo [*]172.22.14.11 [->]XR-DC [->]172.22.14.11 [*] NetBios 172.22.14.46 XIAORANG\XR-0923 [*] NetInfo [*]172.22.14.7 [->]XR-JENKINS [->]172.22.14.7 [*] NetInfo [*]172.22.14.46 [->]XR-0923 [->]172.22.14.46 [*] NetBios 172.22.14.11 [+] DC:XIAORANG\XR-DC [*] WebTitle http://172.22.14.46 code:200 len:703 title:IIS Windows Server [*] WebTitle http://172.22.14.16:8060 code:404 len:555 title:404 Not Found [*] NetBios 172.22.14.31 WORKGROUP\XR-ORACLE [*] WebTitle http://172.22.14.16 code:302 len:99 title:None 跳转url: http://172.22.14.16/users/sign_in [*] WebTitle http://172.22.14.7 code:200 len:54603 title:XR SHOP [*] WebTitle http://172.22.14.16/users/sign_in code:200 len:34961 title:Sign in · GitLab [+] PocScan http://172.22.14.7/www.zip poc-yaml-backup-file