┌──(kali㉿kali)-[~/BaJi/broken] └─$ sudo nmap --script=vuln -p22,80 192.168.75.66 Starting Nmap 7.95 ( https://nmap.org ) at 2025-08-05 11:39 EDT Nmap scan report for 192.168.75.66 Host is up (0.00049s latency).
PORT STATE SERVICE 22/tcp open ssh 80/tcp open http | http-sql-injection: | Possible sqli for queries: | http://192.168.75.66:80/?C=D%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=N%3BO%3DD%27%20OR%20sqlspider | http://192.168.75.66:80/?C=M%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=S%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=N%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=D%3BO%3DD%27%20OR%20sqlspider | http://192.168.75.66:80/?C=S%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=M%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=N%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=D%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=S%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=M%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=N%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=D%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=S%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=M%3BO%3DD%27%20OR%20sqlspider | http://192.168.75.66:80/?C=N%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=D%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=S%3BO%3DD%27%20OR%20sqlspider | http://192.168.75.66:80/?C=M%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=D%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=N%3BO%3DD%27%20OR%20sqlspider | http://192.168.75.66:80/?C=M%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=S%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=N%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=D%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=S%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=M%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=N%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=D%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=S%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=M%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=N%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=D%3BO%3DA%27%20OR%20sqlspider | http://192.168.75.66:80/?C=S%3BO%3DA%27%20OR%20sqlspider |_ http://192.168.75.66:80/?C=M%3BO%3DA%27%20OR%20sqlspider |_http-dombased-xss: Couldn't find any DOM based XSS. |_http-csrf: Couldn't find any CSRF vulnerabilities. | http-enum: |_ /: Root directory w/ listing on 'apache/2.4.18 (ubuntu)' | http-slowloris-check: | VULNERABLE: | Slowloris DOS attack | State: LIKELY VULNERABLE | IDs: CVE:CVE-2007-6750 | Slowloris tries to keep many connections to the target web server open and hold | them open as long as possible. It accomplishes this by opening connections to | the target web server and sending a partial request. By doing so, it starves | the http server's resources causing Denial Of Service. | | Disclosure date: 2009-09-17 | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750 |_ http://ha.ckers.org/slowloris/ |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. MAC Address: 00:0C:29:05:05:03 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 320.98 seconds