NMAP
root@oco:~$ nmap -sV --script="http-vuln*,vulners" -oA vuln_scan 10.10.10.10 -p {identifiedPorts, ...}
* the vulners script queries the Vulners DB based on version info from -sV
root@oco:~$ nmap -sV -sC --script=http-enum -oA filename_nmap_http_enum 10.129.42.190
Starting Nmap 7.80 ( https://nmap.org ) at 2020-12-16 23:41 EST
Nmap scan report for 10.129.42.190
Host is up (0.11s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 (Ubuntu Linux; protocol 2.0)
80/tcp open http Apache httpd <REDACTED> ((Ubuntu))
|_http-server-header: Apache/<REDACTED> (Ubuntu)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 19.23 seconds
Last updated