- 博客(4)
- 收藏
- 关注
原创 joy靶机靶场渗透
1.扫描主机nmap扫描主机Nmap scan report for 192.168.100.132Host is up (0.00034s latency).Not shown: 988 closed portsPORT STATE SERVICE21/tcp open ftp22/tcp open ssh25/tcp open smtp80/tcp open http110/tcp open pop3139/tcp open netbios-ssn143
2021-02-14 01:39:17
576
原创 development-improved靶场渗透
1.扫描主机root@kali:~# nmap --script vuln 192.168.100.131Starting Nmap 7.80 ( https://nmap.org ) at 2021-02-05 01:08 EST Stats: 0:00:26 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
2021-02-05 23:24:38
814
原创 DIGITALWORLD.LOCAL-BRAVERY靶场
1.发现主机/扫描root@kali:~# nmap -sn 192.168.100.0/24Starting Nmap 7.80 ( https://nmap.org ) at 2021-02-03 10:26 ESTNmap scan report for 192.168.100.1Host is up (0.00051s latency).MAC Address: 00:50:56:C0:00:08 (VMware)Nmap scan report for 192.168.100.2Ho
2021-02-04 00:48:19
650
原创 DC9靶场渗透
1.发现主机/扫描root@kali:~# ifconfigeth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 192.168.100.128 netmask 255.255.255.0 broadcast 192.168.100.255 inet6 fe80::20c:29ff:fe72:6e3e prefixlen 64 scopeid 0x20<link>
2021-02-03 01:51:48
617
1
空空如也
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人