摘要:
Socket Programming 1. Scan the target Vulnerable Server. And test it by telnet. 2. Write the scanner source code. 3. Execute the code. And the result 阅读全文
摘要:
SickOS 1.2 Walkthrough Preparation: Down load the SickOS virtual machines from the following website: https://www.vulnhub.com/entry/sickos-12,144/ 1. 阅读全文
摘要:
DroopyCTF Walkthrough Preparation: Download the DroopyCTF virtual machine from the following website: https://www.vulnhub.com/entry/droopy-v02,143/ 1. 阅读全文
摘要:
BTRSys v2.1 Walkthrough Preparation: Download the BTRSys virtual machine from the following website: https://www.vulnhub.com/entry/btrsys-v21,196/ 1. 阅读全文
摘要:
Kioptrix Level 1.1 Walkthrough Preparation: Download the virtual machine from the following website: https://www.vulnhub.com/entry/kioptrix-level-11-2 阅读全文
摘要:
Pivoting 1. Edit the virtual network settings of the Vmware. 2. Set the Network Adapter(s) of Kali Linux, IE8-Win7 and Kioptrix Level 1 as showed in t 阅读全文
摘要:
Post-Exploit Password Attacks 1. Crack using the tool - john (Too slow in real world) Locate the rockyou file. Conbine the files and save as unshadow. 阅读全文
摘要:
Windows Post Exploitation Target Server: IE8-Win 7 VM 1. Download and upload the fgdump, PwDump7, wce and netcat into the IEUser folder on Windows 7. 阅读全文