jdwp-info
脚本使用类型:
portrule
脚本所属分类:
default, safe, discovery
脚本下载地址: http://nmap.org/svn/scripts/jdwp-info.nse
Attempts to exploit java's remote debugging port. When remote debugging port is left open, it is possible to inject java bytecode and achieve remote code execution. This script injects and execute a Java class file that returns remote system information.
执行格式
nmap -sV -sC <target>
Author: Aleksandar Nikolic
License: VER007 整理 http://www.ver007.com
nmap -sT <target> -p <port> --script=+jdwp-info