VulnHub靶场系列:Chili
刚刚在VulnHub官网上找了些简单的靶机,感觉这个还挺适合新手的
环境部署:
https://download.vulnhub.com/chili/Chili.ova
实战:
首先使用工具扫描靶机所在网段,得到靶机IP:
root@kali:/# nmap -sP 192.168.200.129/24
Starting Nmap 7.80 ( https://nmap.org ) at 2020-10-05 08:56 CST
Nmap scan report for 192.168.200.1
Host is up (0.00016s latency).
MAC Address: 00:50:56:C0:00:08 (VMware)
Nmap scan report for 192.168.200.2
Host is up (0.00012s latency).
MAC Address: 00:50:56:E6:47:0B (VMware)
Nmap scan report for 192.168.200.128
Host is up (0.00075s latency).
MAC Address: 00:0C:29:4A:31:59 (VMware)
Nmap scan report for 192.168.200.130
Host is up (0.00097s latency).
MAC Address: 00:0C:29:1C:DC:AB (VMware)
Nmap scan report for 192.168.200.254
Host is up (0.00092s latency).
MAC Address: 00:50:56:FA:DC:49 (VMware)
Nmap scan report for 192.168.200.129
Host is up.
Nmap done: 256 IP addresses (6 hosts up) scanned in 27.85 seconds
得到靶机IP后对靶机进行端口扫描:
root@kali:/# nmap -sT -p1-65535 192.168.200.130
Starting Nmap 7.80 ( https://nmap.org ) at 2020-10-05 08:58 CST
Nmap scan report for 192.168.200.130
Host is up (0.00056s latency).
Not shown: 65533 closed ports
PORT STATE SERVICE
21/tcp open ftp
80/tcp open http
MAC Address: 00:0C:29:1C:DC:AB (VMware)
Nmap done: 1 IP address (1 host up) scanned in 1.93 seconds
我们发现靶机开启了21,80端口,我们先对靶机web服务进行访问