CyberSploit2-writeup
0x00 发现目标
导入CyberSploit2.ova文件,配置好网络模式为桥接模式
nmap扫描局域网nmap -sn 16.16.16.0/24
发现目标IP是16.16.16.171
使用nmap扫描下端口nmap -sV 16.16.16.171
root@kali:~# nmap -sV 16.16.16.171
Starting Nmap 7.80 ( https://nmap.org ) at 2020-08-18 11:48 CST
Nmap scan report for 16.16.16.171
Host is up (0.00013s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.0 (protocol 2.0)
80/tcp open http Apache httpd 2.4.37 ((centos))
MAC Address: F8:FF:C2:4C:7B:F3 (Unknown)
发现是开了80端口的,我们使用Firefox打开看一下