vulnhub
文章平均质量分 67
赛博雨天
这个作者很懒,什么都没留下…
展开
-
工具使用-pwncat
pwncat是一个命令和控制框架,可以将基本的反向或绑定shell转化为一个功能齐全的利用平台。然后,它将尝试在远程主机上启动一个伪终端,并为您提供原始终端访问。原创 2024-02-27 21:29:34 · 1241 阅读 · 0 评论 -
vulnhub-Tiki - 类oscp靶机攻略1
本文为类oscp靶机打靶1原创 2022-07-14 21:50:57 · 1308 阅读 · 0 评论 -
vulnhub-Chill Hack: 1
靶机描述下载 https://www.vulnhub.com/entry/chill-hack-1,622/清单信息搜集nmap命令执行漏洞端口转发图片隐写压缩包密码破解提权docker 组信息搜集靶机IP端口扫描nmap 192.168.31.35PORT STATE SERVICE21/tcp open ftp22/tcp open ssh80/tcp open http目录扫描dirb http://192.168.31.35原创 2021-02-06 17:31:57 · 230 阅读 · 0 评论 -
vulnhub-ino
靶机描述Level: Easyflags: user, rootDescription: This machine require a low skill to get user flag, a little more skill to escalate to root!Author: foxloxAbout VM: VirtualBox ready, the adapter is currently Bridged, DHCP activeYou can contact me by email原创 2020-12-27 12:25:08 · 481 阅读 · 0 评论 -
vulnhub-Cybox: 1.1
靶机描述http://blog.yutian233.xyz/index.php/archives/72/Will you be able to compromise the internal server of the CYBOX company?Difficulty: MediumObjective: Get user.txt and root.txtThis works better with VirtualBox rather than VMware.Contact: @takit原创 2020-12-25 16:09:27 · 1135 阅读 · 0 评论 -
vulnhub-DevGuru:1
靶机描述DevGuru is a fictional web development company hiring you for a pentest assessment. You have been tasked with finding vulnerabilities on their corporate website and obtaining root.OSCP like ~ Real life basedDifficulty: Intermediate (Depends on exp原创 2020-12-24 13:50:42 · 956 阅读 · 0 评论 -
vulnhub-dc6-DC6
靶机描述DESCRIPTIONDC-6 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.This isn't an overly difficult challenge so should be great for beginners.The ultimate goal of this challenge is t原创 2020-10-06 20:26:01 · 368 阅读 · 0 评论 -
vulnhub-Mercury
靶机描述Difficulty: EasyMercury is an easier box, with no bruteforcing required. There are two flags on the box: a user and root flag which include an md5 hash. This has been tested on VirtualBox so may not work correctly on VMware. Any questions/issues or原创 2020-09-27 20:01:38 · 610 阅读 · 0 评论 -
vulnhub-BBS (CUTE): 1.0.1-cute
http://blog.yutian233.xyz/index.php/archives/63/靶机描述Machine name: BBS (Bulletin Board System)Level: Easy->Intermediateflags: user, rootDescription: really technical machine, if you are ready for certifications it will be a good tool to test your原创 2020-09-25 13:09:28 · 643 阅读 · 0 评论 -
vulnhub-DEVCONTAINER: 1-DEVCONTAINER
靶机描述Goal: 2 flagasDifficulty: Easy-intermediateInformation: Your feedback is appreciate:Twitter: @0x04E1This works better with VirtualBox rather than VMware下载 https://www.vulnhub.com/entry/devcontainer-1,548/清单信息搜集netdiscovernmapdir利用文原创 2020-09-16 16:13:30 · 560 阅读 · 0 评论 -
vulnhub-funbox-2-funxbox-rookie rookie wp
靶机描述Boot2Root ! This can be a real life scenario if rockies becomes admins. Easy going in round about 15 mins. Bit more, if you are find and stuck in the rabbit-hole first.This VM is created/tested with Virtualbox. Maybe it works with vmware.If you ne原创 2020-09-14 19:11:32 · 520 阅读 · 0 评论 -
vulnhub-Potato-wp
靶机描述blog http://blog.yutian233.xyz/VM name : PotatoType: Boot to RootDHCP : EnabledDifficulty : Easy to mediumGoal: 2 flags (user.txt and root.txt)This VM has been tested with VirtualBox下载 https://www.vulnhub.com/entry/potato-1,529/清单信息搜集ne原创 2020-09-13 12:23:22 · 630 阅读 · 0 评论 -
vulnhub-KB-VULN: 1
靶机描述This is an easy box, pretty basic stuff.It's vmware based, i dont know if it works on VB you can test it if you want.There are 2 flags under /home/$user/user.txt & /root/root.txt.No stupid ctfy/guessy stuff.For any help/hint feel free to D原创 2020-09-12 19:13:38 · 541 阅读 · 0 评论 -
vulnhub-Jarbas-wp
靶机描述http://blog.yutian233.xyz/index.php/If you want to keep your hacking studies, please try out this machine!Jarbas 1.0 – A tribute to a nostalgic Brazilian search engine in the end of 90’s.Objective: Get root shell!下载 https://www.vulnhub.com/entr原创 2020-09-04 17:29:31 · 361 阅读 · 0 评论 -
vulnhub-Tre-Tre1-wp
靶机描述Machine Name: TreAuthor: SunCSR TeamDifficulty: IntermediateTested: VMware Workstation 15.x Pro (This works better with VMware rather than VirtualBox)DHCP: EnabledGoal: Get the root shell i.e.(root@localhost:~#) and then obtain flag under /root).原创 2020-09-01 20:25:28 · 421 阅读 · 0 评论 -
vulnhub-dc3-渗透靶机-wp
靶机描述DESCRIPTIONDC-3 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.As with the previous DC releases, this one is designed with beginners in mind, although this time around, there is o原创 2020-08-31 11:44:44 · 542 阅读 · 0 评论 -
vulnhub-sahu-wp
靶机描述Sahu is a Virtualbox VM Built on Ubuntu 64 bit , The Goal Of this Machine is to get root And Read the root.txt file with Some Good Enumeration SkillsDifficulty : BeginnerGoal : Boot To Root## Changelog: v1.1 - 2020-03-04 v1.0 - 2020-02-01下载 ht原创 2020-08-30 11:59:02 · 251 阅读 · 0 评论 -
vulnhub-So Simple 1
靶机描述This is an easy level VM with some rabbitholes. Enumeration is key to find your way in. There are three flags (2 user and 1 root flag).The VM is tested on Virtualbox. After the startup it shows the IP address.Share your rootflag with me on Twitter原创 2020-08-10 10:50:00 · 1536 阅读 · 0 评论 -
vulnhub-FunBox-wp
靶机描述Boot2Root ! This is a reallife szenario, but easy going. You have to enumerate and understand the szenario to get the root-flag in round about 20min.This VM is created/tested with Virtualbox. Maybe it works with vmware.If you need hints, call me o原创 2020-08-08 16:20:52 · 558 阅读 · 1 评论 -
vulnhub-midnight-wp
博客地址 http://blog.yutian233.xyz/靶机描述Difficulty: IntermediateImportant!: Before auditing this machine make sure you add the host "sunset-midnight" to your /etc/hosts file, otherwise it may not work as expected.It is recommended to run this machine in V原创 2020-08-05 17:51:02 · 464 阅读 · 0 评论 -
vulnhub-Photographerr-渗透笔记
靶机描述博客地址 http://blog.yutian233.xyz/This machine was developed to prepare for OSCP. It is boot2root, tested on VirtualBox (but works on VMWare) and has two flags: user.txt and proof.txt.https://www.vulnhub.com/entry/photographer-1,519/端口扫描nmap -A -p原创 2020-08-04 17:04:30 · 893 阅读 · 0 评论 -
vulnhub-maskcrafter-渗透笔记
介绍Target audience: Beginnershttps://www.vulnhub.com/entry/maskcrafter-11,445/ 主机发现信息搜集使用nmap扫描开放21端口 可以匿名登陆ftp登陆可看到目录下有俩个文件[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-nFPWvnPS-1589467129182)(https://s1.ax1x.com/2020/05/07/YmNnTx.png#vwid=551&原创 2020-07-14 17:19:13 · 201 阅读 · 0 评论 -
vulnhub-sunset: decoy-wp
靶机信息blog:http://blog.yutian233.xyz/Easy/Intermediate (May variate depending on your background)It is recommended to run this machine in Virtualbox.This works better with VirtualBox rather than VMwarehttps://www.vulnhub.com/entry/sunset-decoy,505/原创 2020-07-14 17:12:27 · 433 阅读 · 0 评论