靶机
正道是沧桑
一枚搞安全的萌新
展开
-
KioptrixVM3-writeup
KioptrixVM3-writeup0x00 信息收集nmap -A -T4 -p 1-65535 16.16.16.180 Starting Nmap 7.80 ( https://nmap.org ) at 2020-08-20 15:16 CST原创 2020-08-20 23:57:43 · 414 阅读 · 0 评论 -
Kioptrix_Level_1-writeup
Kioptrix_Level_1-writeup0x00 信息收集目标机器IP16.16.16.176kali攻击机16.16.16.177//nmap扫描端口服务nmap -A -Pn 16.16.16.176Starting Nmap 7.80 ( https://nmap.org ) at 2020-08-19 13:43 CSTNmap scan report for 16.16.16.176Host is up (0.00081s latency).Not原创 2020-08-19 18:03:04 · 566 阅读 · 0 评论 -
Photographer-writeup
Photographer-writeup0x00 信息收集首先使用nmap扫描一下端口及服务nmap -sV -Pn 192.168.1.21Starting Nmap 7.80 ( https://nmap.org ) at 2020-08-18 15:56 CSTNmap scan report for 192.168.1.21Host is up (0.00044s latency).Not shown: 996 closed portsPORT STATE SERVICE原创 2020-08-18 23:37:32 · 256 阅读 · 0 评论 -
CyberSploit2-writeup
CyberSploit2-writeup0x00 发现目标导入CyberSploit2.ova文件,配置好网络模式为桥接模式nmap扫描局域网nmap -sn 16.16.16.0/24发现目标IP是16.16.16.171使用nmap扫描下端口nmap -sV 16.16.16.171root@kali:~# nmap -sV 16.16.16.171Starting Nmap 7.80 ( https://nmap.org ) at 2020-08-18 11:48 CSTNmap sca原创 2020-08-18 15:18:58 · 238 阅读 · 0 评论 -
funbox-vulnhub靶机-writeup
FunBoxWriteup##0x00 找到目标主机使用nmap扫描网段,发现目标nmap -sn 16.16.16.0/24 //发现目标机器IP为16.16.16.157nmap -A 16.16.16.157 -v //直接nmap全扫PORT STATE SERVICE VERSION21/tcp open ftp ProFTPD22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4 (Ubuntu Linux; protocol 2原创 2020-08-14 17:43:44 · 1519 阅读 · 0 评论 -
HackInOS靶机渗透writeup
HackInOS靶机渗透writeup0x00准备测试环境导入下载好的HackInOS.ova文件后,将网络设置成桥接模式,并使用DHCP分配IP。成功后打开的靶机图如下0x01渗透过程使用nmap扫描确定目标机器IPnmap -sn 16.16.16.0/24//确定目标机器IP为16.16.16.156,并发现8000端口提供web服务使用浏览器插件header editor将localhost替换成16.16.16.156即可正常打开页面。通过fuzzing遍历目原创 2020-08-13 11:32:21 · 995 阅读 · 0 评论