写在前面:前人栽树后人乘凉,谢谢网上各位大佬的解题思路作为参考学习;
一、实验准备
1、实验地址: Kioptrix: Level 1.2 (#3) ~ VulnHub
2、下载之后,本地解压,用VMware运行该虚拟机;
3、设置Kioptrix Level 1.2与攻击机网络环境,保证在同一局域网;
4、本实验攻击机使用的是Kali Linux,其IP地址是:10.10.10.131。
另外,本实验需要往攻击机的hosts文件添加一条解析:
echo "靶机ip地址 kioptrix3.com" >> /etc/hosts
二、情报收集
1、扫设备
得到靶机地址:10.10.10.148
┌──(root💀kali)-[~]
└─# nmap -sP 10.10.10.0/24
Starting Nmap 7.92 ( https://nmap.org ) at 2022-08-31 04:39 EDT
Nmap scan report for 10.10.10.1 (10.10.10.1)
Host is up (0.00015s latency).
MAC Address: 00:50:56:C0:00:08 (VMware)
Nmap scan report for 10.10.10.2 (10.10.10.2)
Host is up (0.00023s latency).
MAC Address: 00:50:56:E6:6D:3F (VMware)
Nmap scan report for kioptrix3.com (10.10.10.148)
Host is up (0.00019s latency).
MAC Address: 00:0C:29:00:B2:5F (VMware)
2、扫端口&服务
┌──(root💀kali)-[~]
└─# nmap -sV -p1-65535 10.10.10.148 130 ⨯
Starting Nmap 7.92 ( https://nmap.org ) at 2022-08-31 04:41 EDT
Nmap scan report for kioptrix3.com (10.10.10.148)
Host is up (0.00049s latency