3、靶机精讲 之 Misdirection
// C段
sudo nmap -sn 192.168.28.0/24
//全部端口扫描
sudo nmap -sT --min-rate 10000 -p- 192.168.28.34 -oA nmapscan/ports
//详细信息扫描
sudo nmap -sT -sV -sC -O -p22,80,3306,8080 192.168.28.34 -oA nmapscan/detail
//默认脚本扫描【漏洞脚本扫描】
sudo nmap --script=vuln -p22,80,3306,8080 192.168.28.34 -oA nmapscan/vuln
详细信息扫描
默认脚本扫描
目录爆破
sudo gobuster dir -u http://192.168.28.34 -w /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt
sudo gobuster dir -u http://192.168.28.34:8080/ -w /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt
反弹Shell
提权的操作
获得系统初始权限的shell