vulnhub
文章平均质量分 59
通过记录练习vulnhub虚拟机过程,不断巩固渗透基础知识技能。
xdeclearn
这个作者很懒,什么都没留下…
展开
-
VIKINGS: 1 vulnhub walkthrough
虚拟机地址 : https://www.vulnhub.com/entry/vikings-1,741/infomationPORT STATE SERVICE22/tcp open ssh80/tcp open http访问web。对目录site进行目录和文件爆破,发现了war.txt。➜ vikings gobuster dir -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u http://原创 2021-09-16 22:45:57 · 1504 阅读 · 0 评论 -
DarkHole: 2 vulnhub walkthrough
主机和端口发现:➜ ~ nmap -sn 192.168.143.0/24Host is up (0.00010s latency).Nmap scan report for 192.168.143.206➜ ~ nmap -T4 -v -p- 192.168.143.206PORT STATE SERVICE22/tcp open ssh80/tcp open http访问web服务,有一个登录页面:尝试注入失败,于是dirb爆破一下目录:发现了git目录,于是使用原创 2021-09-08 21:02:12 · 515 阅读 · 0 评论 -
MOMENTUM: 2 vulnhub walkthrough
信息Momentum2.ova (Size: 698 MB)Download (Mirror): https://download.vulnhub.com/momentum/Momentum2.ovaDownload (Torrent): https://download.vulnhub.com/momentum/Momentum2.ova.torrent ( Magnet)端口扫描和目录扫描PORT STATE SERVICE22/tcp open ssh80/tcp open原创 2021-07-19 21:09:47 · 343 阅读 · 2 评论 -
Orasi: 1 vulnhub walkthrough
下载地址:http://www.vulnhub.com/entry/orasi-1,660/Hint :just one useless little dot0x01 信息收集到获取shell端口扫描:使用anonymous访问ftp,获取到一个文件:url。该文件为一个共享连接库。先看看main函数:于是将insert中的每一个字符转换为acsii码,得到一串字符/sh4d0w$s,看起来像是url。访问80端口,得到一串奇怪的字符,看着有点像口令字典工具crunch的参数,等一下还有用。原创 2021-03-11 16:59:33 · 1349 阅读 · 0 评论 -
Alfa: 1 vulnhub walkthrough
信息页:http://www.vulnhub.com/entry/alfa-1,655/关键字:Enumeration | Web Application | Brute Force | Privilege Escalation0x01 端口扫描PORT STATE SERVICE21/tcp open ftp80/tcp open http139/tcp open netbios-ssn445/tcp open microsoft-ds65111/tc原创 2021-03-10 11:46:37 · 419 阅读 · 0 评论 -
Warzone: 3 (Exogen) vulnhub walkthrough
Warzone: 3 (Exogen)vulnhub地址:http://www.vulnhub.com/entry/warzone-3-exogen,606/0x01 信息收集到获取shellPORT STATE SERVICE VERSION21/tcp open ftp vsftpd 3.0.322/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)4444/tcp op原创 2020-12-03 21:29:12 · 770 阅读 · 0 评论 -
Shuriken: 1 vulnhub walkthrough
Shuriken: 1vulnhub地址:http://www.vulnhub.com/entry/shuriken-1,600/0x01 信息收集到获取shell服务器只开放了80端口,dirb爬取目录。==> DIRECTORY: http://192.168.56.121/css/ ==> DIRECTORY: http://192.168.56.121/img/原创 2020-12-03 13:46:11 · 1172 阅读 · 0 评论 -
Masashi: 1 vulnhub walkthrough
Masashi: 1虚拟机信息:http://www.vulnhub.com/entry/masashi-1,599/0x01. 信息收集获取shellPORT STATE SERVICE VERSION22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)80/tcp open http Apache httpd 2.4.38 ((Debian))tcp端口只开放了22和80,访问80为apache原创 2020-12-02 10:39:16 · 291 阅读 · 1 评论 -
Praying: 1 vulnhub walkthrough
Praying: 1虚拟机信息:http://www.vulnhub.com/entry/praying-1,575/1. 获取shell80/tcp open http Apache httpd 2.4.41 ((Ubuntu))服务器只开放了80端口,访问后为apache默认页面,于是用dirb跑了一下目录,发现了admin目录。==> DIRECTORY: http://192.168.56.105/admin/发现后发现为mantis的登陆页面测原创 2020-11-26 21:54:27 · 389 阅读 · 0 评论 -
GreenOptic: 1 vulnhub walkthrough
GreenOptic: 1下载地址:http://www.vulnhub.com/entry/greenoptic-1,510/1. 端口扫描开放端口信息,系统为centos7。PORT STATE SERVICE VERSION21/tcp open ftp vsftpd 3.0.222/tcp open ssh OpenSSH 7.4 (protocol 2.0)53/tcp open domain ISC BIND 9.11.4-P2原创 2020-11-24 21:09:55 · 709 阅读 · 0 评论 -
Warzone: 2 vulnhub walkthrough
Warzone: 2下载地址: http://www.vulnhub.com/entry/warzone-2,598/获取shell端口扫描结果:PORT STATE SERVICE VERSION21/tcp open ftp vsftpd 3.0.322/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)1337/tcp open tcpwrapped使用anon原创 2020-11-16 15:39:27 · 480 阅读 · 0 评论 -
SECARMY VILLAGE: GRAYHAT CONFERENCE vulnhub walkthrough
SECARMY VILLAGE: GRAYHAT CONFERENCE虚拟机地址:https://download.vulnhub.com/secarmyvillage/SECARMY-VILLAGE-OSCP-GIVEAWAY.ova主机探测、端口扫描这里就省略了,每次都写显得冗余了。flag1访问80端口,没有什么有价值信息,先dirb跑一下目录---- Scanning URL: http://192.168.132.141/ ----==> DIRECTORY: http://19原创 2020-11-14 23:10:04 · 1737 阅读 · 0 评论 -
Money Heist: 1 vulnhub walkthrough
Money Heist: 1虚拟机页面:http://www.vulnhub.com/entry/money-heist-1,592/Description“The Professor” has a plan to pull off the biggest heist in recorded history – to print billions of Flags . To help him carry out the ambitious plan, he recruits eight people原创 2020-10-30 22:31:09 · 669 阅读 · 0 评论 -
Warzone: 1 vulnhub walkthrough
Warzone: 1虚拟机页面:http://www.vulnhub.com/entry/warzone-1,589/DescriptionInfo : Created and Tested in Virtual Box, maybe you need to write codeBased on : CryptoScenario : You are trying to gain access to the enemy systemMission : Your mission is to ge原创 2020-10-27 13:45:49 · 910 阅读 · 0 评论 -
IA: Nemesis (1.0.1) vulnhub walkthrough
文章目录IA: Nemesis (1.0.1)服务探测web渗透测试获取第二个flag提权至root获取第三个flag参考IA: Nemesis (1.0.1)虚拟机页面:http://www.vulnhub.com/entry/ia-nemesis-101,582/DescriptionDifficulty: Intermediate to HardGoal: Get the root shell and read all the 3 flags.Information: You need原创 2020-10-27 13:37:55 · 1205 阅读 · 1 评论