hack the box - tier0

Tier0

Meow

Recommended Academy Modules

INTRO TO ACADEMY

STARTING POINT

Tier 0 Machines

Tags

Enumeration

Telnet

External

Penetration Tester Level 1

SOFT RESETReset Machine

OPEN

Walkthrough

CONNECT

Connect to Starting Point VPN before starting the machine

Spawn Machine

Click to Spawn the machine

Task 1

What does the acronym VM stand for?

******* ******e

Virtual Machine

Hide Answer

Task 2

What tool do we use to interact with the operating system in order to issue commands via the command line, such as the one to start our VPN connection? It’s also known as a console or shell.

*******l

terminal

Hide Answer

Task 3

What service do we use to form our VPN connection into HTB labs?

******n

openvpn

Hide Answer

Task 4

What is the abbreviated name for a ‘tunnel interface’ in the output of your VPN boot-up sequence output?


tun

Hide Answer

Task 5

What tool do we use to test our connection to the target with an ICMP echo request?

***g

ping

Hide Answer

Task 6

What is the name of the most common tool for finding open ports on a target?

***p

nmap

Hide Answer

Task 7

What service do we identify on port 23/tcp during our scans?

*****t

telnet

Hide Answer

Task 8

What username is able to log into the target over telnet with a blank password?

***t

root

Hide Answer

Submit Flag

Submit root flag


b40abdfe23665f766f9c61ecba8a4c19

Fawn

Recommended Academy Modules

INTRO TO ACADEMY

STARTING POINT

Tier 0 Machines

Tags

Enumeration

Telnet

External

Penetration Tester Level 1

SOFT RESETReset Machine

OPEN

Walkthrough

CONNECT

Connect to Starting Point VPN before starting the machine

Spawn Machine

Click to Spawn the machine

Task 1

What does the acronym VM stand for?

******* ******e

Virtual Machine

Hide Answer

Task 2

What tool do we use to interact with the operating system in order to issue commands via the command line, such as the one to start our VPN connection? It’s also known as a console or shell.

*******l

terminal

Hide Answer

Task 3

What service do we use to form our VPN connection into HTB labs?

******n

openvpn

Hide Answer

Task 4

What is the abbreviated name for a ‘tunnel interface’ in the output of your VPN boot-up sequence output?


tun

Hide Answer

Task 5

What tool do we use to test our connection to the target with an ICMP echo request?

***g

ping

Hide Answer

Task 6

What is the name of the most common tool for finding open ports on a target?

***p

nmap

Hide Answer

Task 7

What service do we identify on port 23/tcp during our scans?

*****t

telnet

Hide Answer

Task 8

What username is able to log into the target over telnet with a blank password?

***t

root

Hide Answer

Submit Flag

Submit root flag


b40abdfe23665f766f9c61ecba8a4c19

┌──(kwkl㉿kwkl)-[~]
└─$ sudo openvpn /home/kwkl/桌面/starting_point_hashdea6(2).ovpn
[sudo] kwkl 的密码:
2022-10-20 21:37:28 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2022-10-20 21:37:28 OpenVPN 2.5.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul  5 2022
2022-10-20 21:37:28 library versions: OpenSSL 3.0.5 5 Jul 2022, LZO 2.10
2022-10-20 21:37:28 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-10-20 21:37:28 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-10-20 21:37:28 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-10-20 21:37:28 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-10-20 21:37:28 TCP/UDP: Preserving recently used remote address: [AF_INET]23.19.225.248:443
2022-10-20 21:37:28 Socket Buffers: R=[131072->131072] S=[16384->16384]
2022-10-20 21:37:28 Attempting to establish TCP connection with [AF_INET]23.19.225.248:443 [nonblock]
2022-10-20 21:37:28 TCP connection established with [AF_INET]23.19.225.248:443
2022-10-20 21:37:28 TCP_CLIENT link local: (not bound)
2022-10-20 21:37:28 TCP_CLIENT link remote: [AF_INET]23.19.225.248:443
2022-10-20 21:37:29 TLS: Initial packet from [AF_INET]23.19.225.248:443, sid=b1569284 0357cadc
2022-10-20 21:37:29 VERIFY OK: depth=1, CN=HackTheBox
2022-10-20 21:37:29 VERIFY KU OK
2022-10-20 21:37:29 Validating certificate extended key usage
2022-10-20 21:37:29 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2022-10-20 21:37:29 VERIFY EKU OK
2022-10-20 21:37:29 VERIFY OK: depth=0, CN=htb
2022-10-20 21:37:31 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-10-20 21:37:31 [htb] Peer Connection Initiated with [AF_INET]23.19.225.248:443
2022-10-20 21:37:31 PUSH: Received control message: 'PUSH_REPLY,route 10.10.10.0 255.255.254.0,route 10.129.0.0 255.255.0.0,route-ipv6 dead:beef::/64,tun-ipv6,route-gateway 10.10.16.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:4::1085/64 dead:beef:4::1,ifconfig 10.10.16.135 255.255.254.0,peer-id 0,cipher AES-256-CBC'
2022-10-20 21:37:31 OPTIONS IMPORT: timers and/or timeouts modified
2022-10-20 21:37:31 OPTIONS IMPORT: --ifconfig/up options modified
2022-10-20 21:37:31 OPTIONS IMPORT: route options modified
2022-10-20 21:37:31 OPTIONS IMPORT: route-related options modified
2022-10-20 21:37:31 OPTIONS IMPORT: peer-id set
2022-10-20 21:37:31 OPTIONS IMPORT: adjusting link_mtu to 1627
2022-10-20 21:37:31 OPTIONS IMPORT: data channel crypto options modified
2022-10-20 21:37:31 Data Channel: using negotiated cipher 'AES-256-CBC'
2022-10-20 21:37:31 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
2022-10-20 21:37:31 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-10-20 21:37:31 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
2022-10-20 21:37:31 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-10-20 21:37:31 net_route_v4_best_gw query: dst 0.0.0.0
2022-10-20 21:37:31 net_route_v4_best_gw result: via 10.10.10.2 dev eth0
2022-10-20 21:37:31 ROUTE_GATEWAY 10.10.10.2/255.255.255.0 IFACE=eth0 HWADDR=00:0c:29:8a:ff:f9
2022-10-20 21:37:31 GDG6: remote_host_ipv6=n/a
2022-10-20 21:37:31 net_route_v6_best_gw query: dst ::
2022-10-20 21:37:31 sitnl_send: rtnl: generic error (-101): Network is unreachable
2022-10-20 21:37:31 ROUTE6: default_gateway=UNDEF
2022-10-20 21:37:31 TUN/TAP device tun0 opened
2022-10-20 21:37:31 net_iface_mtu_set: mtu 1500 for tun0
2022-10-20 21:37:31 net_iface_up: set tun0 up
2022-10-20 21:37:31 net_addr_v4_add: 10.10.16.135/23 dev tun0
2022-10-20 21:37:31 net_iface_mtu_set: mtu 1500 for tun0
2022-10-20 21:37:31 net_iface_up: set tun0 up
2022-10-20 21:37:31 net_addr_v6_add: dead:beef:4::1085/64 dev tun0
2022-10-20 21:37:31 net_route_v4_add: 10.10.10.0/23 via 10.10.16.1 dev [NULL] table 0 metric -1
2022-10-20 21:37:31 net_route_v4_add: 10.129.0.0/16 via 10.10.16.1 dev [NULL] table 0 metric -1
2022-10-20 21:37:31 add_route_ipv6(dead:beef::/64 -> dead:beef:4::1 metric -1) dev tun0
2022-10-20 21:37:31 net_route_v6_add: dead:beef::/64 via :: dev tun0 table 0 metric -1
2022-10-20 21:37:31 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2022-10-20 21:37:31 Initialization Sequence Completed


┌──(kwkl㉿kwkl)-[~]
└─$ sudo nmap -T4 10.129.106.33                                                                                                                                             1[sudo] kwkl 的密码:
对不起,请重试。
[sudo] kwkl 的密码:
Starting Nmap 7.91 ( https://nmap.org ) at 2022-10-20 21:41 HKT
Nmap scan report for 10.129.106.33
Host is up (0.98s latency).
Not shown: 999 closed ports
PORT   STATE SERVICE
21/tcp open  ftp

Nmap done: 1 IP address (1 host up) scanned in 6.09 seconds
                                                                                                                                                                                
┌──(kwkl㉿kwkl)-[~]
└─$ sudo nmap -A -v -sS -sV -p 21 10.129.106.33                       
Starting Nmap 7.91 ( https://nmap.org ) at 2022-10-20 21:43 HKT
NSE: Loaded 153 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 21:43
Completed NSE at 21:43, 0.00s elapsed
Initiating NSE at 21:43
Completed NSE at 21:43, 0.00s elapsed
Initiating NSE at 21:43
Completed NSE at 21:43, 0.00s elapsed
Initiating Ping Scan at 21:43
Scanning 10.129.106.33 [4 ports]
Completed Ping Scan at 21:43, 0.40s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 21:43
Completed Parallel DNS resolution of 1 host. at 21:43, 0.02s elapsed
Initiating SYN Stealth Scan at 21:43
Scanning 10.129.106.33 [1 port]
Discovered open port 21/tcp on 10.129.106.33
Completed SYN Stealth Scan at 21:43, 0.76s elapsed (1 total ports)
Initiating Service scan at 21:43
Scanning 1 service on 10.129.106.33
Completed Service scan at 21:43, 0.91s elapsed (1 service on 1 host)
Initiating OS detection (try #1) against 10.129.106.33
Retrying OS detection (try #2) against 10.129.106.33
Initiating Traceroute at 21:43
Completed Traceroute at 21:43, 0.65s elapsed
Initiating Parallel DNS resolution of 2 hosts. at 21:43
Completed Parallel DNS resolution of 2 hosts. at 21:43, 0.02s elapsed
NSE: Script scanning 10.129.106.33.
Initiating NSE at 21:43
NSE: [ftp-bounce] PORT response: 500 Illegal PORT command.
Completed NSE at 21:43, 9.03s elapsed
Initiating NSE at 21:43
Completed NSE at 21:44, 5.53s elapsed
Initiating NSE at 21:44
Completed NSE at 21:44, 0.00s elapsed
Nmap scan report for 10.129.106.33
Host is up (0.74s latency).

PORT   STATE SERVICE VERSION
21/tcp open  ftp     vsftpd 3.0.3
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_-rw-r--r--    1 0        0              32 Jun 04  2021 flag.txt
| ftp-syst: 
|   STAT: 
| FTP server status:
|      Connected to ::ffff:10.10.16.135
|      Logged in as ftp
|      TYPE: ASCII
|      No session bandwidth limit
|      Session timeout in seconds is 300
|      Control connection is plain text
|      Data connections will be plain text
|      At session startup, client count was 1
|      vsFTPd 3.0.3 - secure, fast, stable
|_End of status
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 4.15 - 5.6 (95%), Linux 5.3 - 5.4 (95%), Linux 2.6.32 (95%), Linux 5.0 - 5.3 (95%), Linux 3.1 (95%), Linux 3.2 (95%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), ASUS RT-N56U WAP (Linux 3.4) (93%), Linux 3.16 (93%), Linux 5.0 (93%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 17.444 days (since Mon Oct  3 11:04:53 2022)
Network Distance: 2 hops
TCP Sequence Prediction: Difficulty=262 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: OS: Unix

TRACEROUTE (using port 21/tcp)
HOP RTT       ADDRESS
1   636.50 ms 10.10.16.1
2   324.93 ms 10.129.106.33

NSE: Script Post-scanning.
Initiating NSE at 21:44
Completed NSE at 21:44, 0.00s elapsed
Initiating NSE at 21:44
Completed NSE at 21:44, 0.00s elapsed
Initiating NSE at 21:44
Completed NSE at 21:44, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 33.38 seconds
           Raw packets sent: 59 (4.192KB) | Rcvd: 38 (2.952KB)
                                                                                                                                                                                
┌──(kwkl㉿kwkl)-[~]
└─$ ftp 10.129.106.33
Connected to 10.129.106.33.
220 (vsFTPd 3.0.3)
Name (10.129.106.33:kwkl): anonymous
331 Please specify the password.
Password:
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> 
ftp> 
ftp> ls
200 PORT command successful. Consider using PASV.
150 Here comes the directory listing.
-rw-r--r--    1 0        0              32 Jun 04  2021 flag.txt
226 Directory send OK.
ftp> get flag.txt
local: flag.txt remote: flag.txt
200 PORT command successful. Consider using PASV.
150 Opening BINARY mode data connection for flag.txt (32 bytes).
226 Transfer complete.
32 bytes received in 0.00 secs (236.7424 kB/s)
ftp> 

                                                                                                                                                                                
┌──(kwkl㉿kwkl)-[~]
└─$ cat flag.txt          
035db21c881520061c53e0536e44f815                                                                                                                                                                                
┌──(kwkl㉿kwkl)-[~]
└─$ 

Dancing

CONNECT

Connect to Starting Point VPN before starting the machine

Spawn Machine

Click to Spawn the machine

Task 1

What does the 3-letter acronym SMB stand for?

****** ******* ****k

server message block

Hide Answer

Task 2

What port does SMB use to operate at?


445

Hide Answer

Task 3

What is the service name for port 445 that came up in our Nmap scan?

*********-*s

microsoft-ds

Hide Answer

Task 4

What is the ‘flag’ or ‘switch’ we can use with the SMB tool to ‘list’ the contents of the share?

**

-L

Hide Answer

Task 5

How many shares are there on Dancing?

4

Hide Answer

Task 6

What is the name of the share we are able to access in the end with a blank password?

*********s

WorkShares

Hide Answer

Task 7

What is the command we can use within the SMB shell to download the files we find?


get

Hide Answer

Submit Flag

Submit root flag


5f61c10dffbc77a704d76016a22f1664

Hide Answer

                                                                                                                                                                                
┌──(kwkl㉿kwkl)-[~]
└─$ sudo nmap -A -v -sS -sV -p 445  10.129.72.163                                                                                                                     1301[sudo] kwkl 的密码:
Starting Nmap 7.91 ( https://nmap.org ) at 2022-10-20 22:28 HKT
NSE: Loaded 153 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 22:28
Completed NSE at 22:28, 0.00s elapsed
Initiating NSE at 22:28
Completed NSE at 22:28, 0.00s elapsed
Initiating NSE at 22:28
Completed NSE at 22:28, 0.00s elapsed
Initiating Ping Scan at 22:28
Scanning 10.129.72.163 [4 ports]
Completed Ping Scan at 22:28, 0.45s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 22:28
Completed Parallel DNS resolution of 1 host. at 22:28, 0.01s elapsed
Initiating SYN Stealth Scan at 22:28
Scanning 10.129.72.163 [1 port]
Discovered open port 445/tcp on 10.129.72.163
Completed SYN Stealth Scan at 22:28, 0.77s elapsed (1 total ports)
Initiating Service scan at 22:28
Scanning 1 service on 10.129.72.163
Completed Service scan at 22:29, 38.16s elapsed (1 service on 1 host)
Initiating OS detection (try #1) against 10.129.72.163
Retrying OS detection (try #2) against 10.129.72.163
Initiating Traceroute at 22:29
Completed Traceroute at 22:29, 0.92s elapsed
Initiating Parallel DNS resolution of 2 hosts. at 22:29
Completed Parallel DNS resolution of 2 hosts. at 22:29, 0.15s elapsed
NSE: Script scanning 10.129.72.163.
Initiating NSE at 22:29
Completed NSE at 22:29, 11.79s elapsed
Initiating NSE at 22:29
Completed NSE at 22:29, 1.32s elapsed
Initiating NSE at 22:29
Completed NSE at 22:29, 0.00s elapsed
Nmap scan report for 10.129.72.163
Host is up (0.72s latency).

PORT    STATE SERVICE       VERSION
445/tcp open  microsoft-ds?
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Microsoft Windows Server 2016 (92%), Microsoft Windows Longhorn (92%), Microsoft Windows 10 1709 - 1909 (91%), Microsoft Windows Server 2012 R2 (90%), Microsoft Windows Server 2012 (90%), Microsoft Windows Server 2008 SP2 (90%), Microsoft Windows Vista SP1 (89%), Microsoft Windows XP SP3 (89%), Microsoft Windows 10 1709 - 1803 (88%), Microsoft Windows 10 1809 - 1909 (88%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
TCP Sequence Prediction: Difficulty=261 (Good luck!)
IP ID Sequence Generation: Randomized

Host script results:
|_clock-skew: 3h59m58s
| smb2-security-mode: 
|   2.02: 
|_    Message signing enabled but not required
| smb2-time: 
|   date: 2022-10-20T18:29:30
|_  start_date: N/A

TRACEROUTE (using port 445/tcp)
HOP RTT       ADDRESS
1   914.16 ms 10.10.16.1
2   552.97 ms 10.129.72.163

NSE: Script Post-scanning.
Initiating NSE at 22:29
Completed NSE at 22:29, 0.00s elapsed
Initiating NSE at 22:29
Completed NSE at 22:29, 0.00s elapsed
Initiating NSE at 22:29
Completed NSE at 22:29, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 60.24 seconds
           Raw packets sent: 47 (3.472KB) | Rcvd: 48 (3.328KB)
                                                                                                                                                                                
┌──(kwkl㉿kwkl)-[~]
└─$     


┌──(kwkl㉿kwkl)-[~]
└─$ sudo masscan -e tun0 -p-  --max-rate 500 10.129.72.163                                                                                                            1481 ⚙
Starting masscan 1.3.2 (http://bit.ly/14GZzcT) at 2022-10-20 14:08:27 GMT
Initiating SYN Stealth Scan
Scanning 1 hosts [65535 ports/host]
Discovered open port 139/tcp on 10.129.72.163                                  
Discovered open port 49667/tcp on 10.129.72.163                                
Discovered open port 5985/tcp on 10.129.72.163                                 
Discovered open port 445/tcp on 10.129.72.163                                  
Discovered open port 135/tcp on 10.129.72.163                                  
Discovered open port 49664/tcp on 10.129.72.163                                
Discovered open port 49665/tcp on 10.129.72.163                                
Discovered open port 49668/tcp on 10.129.72.163                                
Discovered open port 49669/tcp on 10.129.72.163                                
Discovered open port 47001/tcp on 10.129.72.163                                
Discovered open port 49666/tcp on 10.129.72.163                                
                                                    
            
┌──(kwkl㉿kwkl)-[~]
└─$ smbclient \\\\10.129.72.163\\WorkShares                                                                                                                                 1 ⚙
Password for [WORKGROUP\kwkl]:
Try "help" to get a list of possible commands.
smb: \> dir
  .                                   D        0  Mon Mar 29 16:22:01 2021
  ..                                  D        0  Mon Mar 29 16:22:01 2021
  Amy.J                               D        0  Mon Mar 29 17:08:24 2021
  James.P                             D        0  Thu Jun  3 16:38:03 2021


                5114111 blocks of size 4096. 1751240 blocks available
smb: \> 
smb: \> cd Amy.J
smb: \Amy.J\> dir
  .                                   D        0  Mon Mar 29 17:08:24 2021
  ..                                  D        0  Mon Mar 29 17:08:24 2021
  worknotes.txt                       A       94  Fri Mar 26 19:00:37 2021
get work
                5114111 blocks of size 4096. 1751224 blocks available
smb: \Amy.J\> get worknotes.txt
getting file \Amy.J\worknotes.txt of size 94 as worknotes.txt (0.0 KiloBytes/sec) (average 0.0 KiloBytes/sec)
smb: \Amy.J\> cd ..
smb: \> cd James.P
smb: \James.P\> dir
  .                                   D        0  Thu Jun  3 16:38:03 2021
  ..                                  D        0  Thu Jun  3 16:38:03 2021
  flag.txt                            A       32  Mon Mar 29 17:26:57 2021
get 
                5114111 blocks of size 4096. 1751225 blocks available
smb: \James.P\> get flag.txt
getting file \James.P\flag.txt of size 32 as flag.txt (0.0 KiloBytes/sec) (average 0.0 KiloBytes/sec)
smb: \James.P\> 


┌──(kwkl㉿kwkl)-[~]
└─$ cat worknotes.txt     
- start apache server on the linux machine
- secure the ftp server
- setup winrm on dancing                                                                                                                                                                                 
┌──(kwkl㉿kwkl)-[~]
└─$ cat flag.txt     
5f61c10dffbc77a704d76016a22f1664                                                                                                                                                                                
┌──(kwkl㉿kwkl)-[~]
└─$ 



                                                    

Redeemer

Linux

Redis

Enumeration

Penetration Tester Level 1

Attacks/Anonymous/Guest Access

SOFT RESETReset Machine

OPEN

Walkthrough

CONNECT

Connect to Starting Point VPN before starting the machine

ONLINE

TARGET MACHINE IP ADDRESS

10.129.178.4

CONNECT

Connect to Starting Point VPN before starting the machine

Spawn Machine

Click to Spawn the machine

Task 1

Which TCP port is open on the machine?

***9

6379

Hide Answer

Task 2

Which service is running on the port that is open on the machine?

****s

Redis

Hide Answer

Task 3

What type of database is Redis? Choose from the following options: (i) In-memory Database, (ii) Traditional Database

-**** *******e

In-memory Database

Hide Answer

Task 4

Which command-line utility is used to interact with the Redis server? Enter the program name you would enter into the terminal without any arguments.

*****-**i

redis-cli

Hide Answer

Task 5

Which flag is used with the Redis command-line utility to specify the hostname?

**

-h

Hide Answer

Task 6

Once connected to a Redis server, which command is used to obtain the information and statistics about the Redis server?

***o

info

Hide Answer

Task 7

What is the version of the Redis server being used on the target machine?

..7

5.0.7

Hide Answer

Task 8

Which command is used to select the desired database in Redis?

*****t

select

Hide Answer

Task 9

How many keys are present inside the database with index 0?

4

Hide Answer

Task 10

Which command is used to obtain all the keys in a database?


keys *

Hide Answer

Submit Flag

Submit root flag


03e1d2b376c37ab3f5319922053953eb

Hide Answer

┌──(kwkl㉿kwkl)-[~]
└─$ sudo masscan -e tun0 -p-  --max-rate 500 10.129.178.4                                                                                                             1301[sudo] kwkl 的密码:
Starting masscan 1.3.2 (http://bit.ly/14GZzcT) at 2022-10-21 12:52:37 GMT
Initiating SYN Stealth Scan
Scanning 1 hosts [65535 ports/host]
Discovered open port 6379/tcp on 10.129.178.4                                  
                                                                                                                                                                                
┌──(kwkl㉿kwkl)-[~]
└─$          




┌──(kwkl㉿kwkl)-[~]
└─$ redis-cli -h 10.129.178.4                                                                                                                                               110.129.178.4:6379> 
10.129.178.4:6379> 
10.129.178.4:6379> 
10.129.178.4:6379> ls
(error) ERR unknown command `ls`, with args beginning with: 
(0.59s)
10.129.178.4:6379> help
redis-cli 6.0.16
To get help about Redis commands type:
      "help @<group>" to get a list of commands in <group>
      "help <command>" for help on <command>
      "help <tab>" to get a list of possible help topics
      "quit" to exit

To set redis-cli preferences:
      ":set hints" enable online hints
      ":set nohints" disable online hints
Set your preferences in ~/.redisclirc
10.129.178.4:6379> info
# Server
redis_version:5.0.7
redis_git_sha1:00000000
redis_git_dirty:0
redis_build_id:66bd629f924ac924
redis_mode:standalone
os:Linux 5.4.0-77-generic x86_64
arch_bits:64
multiplexing_api:epoll
atomicvar_api:atomic-builtin
gcc_version:9.3.0
process_id:752
run_id:4fa4207320be9d46612aa006067e817ea8207688
tcp_port:6379
uptime_in_seconds:648
uptime_in_days:0
hz:10
configured_hz:10
lru_clock:5412954
executable:/usr/bin/redis-server
config_file:/etc/redis/redis.conf

# Clients
connected_clients:1
client_recent_max_input_buffer:2
client_recent_max_output_buffer:0
blocked_clients:0

# Memory
used_memory:859624
used_memory_human:839.48K
used_memory_rss:5951488
used_memory_rss_human:5.68M
used_memory_peak:859624
used_memory_peak_human:839.48K
used_memory_peak_perc:100.12%
used_memory_overhead:846142
used_memory_startup:796224
used_memory_dataset:13482
used_memory_dataset_perc:21.26%
allocator_allocated:1570200
allocator_active:1892352
allocator_resident:9101312
total_system_memory:2084024320
total_system_memory_human:1.94G
used_memory_lua:41984
used_memory_lua_human:41.00K
used_memory_scripts:0
used_memory_scripts_human:0B
number_of_cached_scripts:0
maxmemory:0
maxmemory_human:0B
maxmemory_policy:noeviction
allocator_frag_ratio:1.21
allocator_frag_bytes:322152
allocator_rss_ratio:4.81
allocator_rss_bytes:7208960
rss_overhead_ratio:0.65
rss_overhead_bytes:-3149824
mem_fragmentation_ratio:7.28
mem_fragmentation_bytes:5133872
mem_not_counted_for_evict:0
mem_replication_backlog:0
mem_clients_slaves:0
mem_clients_normal:49694
mem_aof_buffer:0
mem_allocator:jemalloc-5.2.1
active_defrag_running:0
lazyfree_pending_objects:0

# Persistence
loading:0
rdb_changes_since_last_save:4
rdb_bgsave_in_progress:0
rdb_last_save_time:1666356690
rdb_last_bgsave_status:ok
rdb_last_bgsave_time_sec:-1
rdb_current_bgsave_time_sec:-1
rdb_last_cow_size:0
aof_enabled:0
aof_rewrite_in_progress:0
aof_rewrite_scheduled:0
aof_last_rewrite_time_sec:-1
aof_current_rewrite_time_sec:-1
aof_last_bgrewrite_status:ok
aof_last_write_status:ok
aof_last_cow_size:0

# Stats
total_connections_received:5
total_commands_processed:5
instantaneous_ops_per_sec:0
total_net_input_bytes:291
total_net_output_bytes:11543
instantaneous_input_kbps:0.00
instantaneous_output_kbps:0.00
rejected_connections:0
sync_full:0
sync_partial_ok:0
sync_partial_err:0
expired_keys:0
expired_stale_perc:0.00
expired_time_cap_reached_count:0
evicted_keys:0
keyspace_hits:0
keyspace_misses:0
pubsub_channels:0
pubsub_patterns:0
latest_fork_usec:0
migrate_cached_sockets:0
slave_expires_tracked_keys:0
active_defrag_hits:0
active_defrag_misses:0
active_defrag_key_hits:0
active_defrag_key_misses:0

# Replication
role:master
connected_slaves:0
master_replid:27b5bfac54d7be8af8ca561c34cb3b241ce66f6e
master_replid2:0000000000000000000000000000000000000000
master_repl_offset:0
second_repl_offset:-1
repl_backlog_active:0
repl_backlog_size:1048576
repl_backlog_first_byte_offset:0
repl_backlog_histlen:0

# CPU
used_cpu_sys:0.544686
used_cpu_user:0.645040
used_cpu_sys_children:0.000000
used_cpu_user_children:0.000000

# Cluster
cluster_enabled:0

# Keyspace
db0:keys=4,expires=0,avg_ttl=0
(0.68s)
10.129.178.4:6379> select 0
OK
10.129.178.4:6379> keys *
1) "stor"
2) "numb"
3) "flag"
4) "temp"
10.129.178.4:6379> select flag
(error) ERR invalid DB index
10.129.178.4:6379> get flag
"03e1d2b376c37ab3f5319922053953eb"
10.129.178.4:6379> 


  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值