摘要: 0x01 介绍 靶机地址: https://www.vulnhub.com/entry/dc-9,412/ DESCRIPTION DC-9 is another purposely built vulnerable lab with the intent of gaining experience 阅读全文
posted @ 2022-03-29 18:07 pill0w 阅读(304) 评论(0) 推荐(0)
摘要: 0x01 介绍 靶机地址: https://www.vulnhub.com/entry/dc-8,367/ DESCRIPTION DC-8 is another purposely built vulnerable lab with the intent of gaining experience 阅读全文
posted @ 2022-03-29 18:07 pill0w 阅读(325) 评论(0) 推荐(0)
摘要: 0x01 介绍 靶机地址: https://www.vulnhub.com/entry/dc-7,356/ DESCRIPTION DC-7 is another purposely built vulnerable lab with the intent of gaining experience 阅读全文
posted @ 2022-03-29 18:07 pill0w 阅读(268) 评论(0) 推荐(0)
摘要: 0x01 介绍 靶机地址: https://www.vulnhub.com/entry/dc-6,315/ DESCRIPTION DC-6 is another purposely built vulnerable lab with the intent of gaining experience 阅读全文
posted @ 2022-03-29 18:07 pill0w 阅读(168) 评论(0) 推荐(0)
摘要: 0x01 部署 靶机地址: https://www.vulnhub.com/entry/dc-5,314/ DESCRIPTION DC-5 is another purposely built vulnerable lab with the intent of gaining experience 阅读全文
posted @ 2022-03-29 18:07 pill0w 阅读(156) 评论(0) 推荐(0)
摘要: 0x01 部署 靶机地址: https://www.vulnhub.com/entry/dc-4,313/ DESCRIPTION DC-4 is another purposely built vulnerable lab with the intent of gaining experience 阅读全文
posted @ 2022-03-29 18:07 pill0w 阅读(120) 评论(0) 推荐(0)
摘要: 0x01 部署 靶机地址: https://www.vulnhub.com/entry/dc-3,312/ DESCRIPTION DC-3 is another purposely built vulnerable lab with the intent of gaining experience 阅读全文
posted @ 2022-03-29 18:07 pill0w 阅读(110) 评论(0) 推荐(0)
摘要: 0x01 部署 靶机地址: https://www.vulnhub.com/entry/dc-2,311/ DESCRIPTION Much like DC-1, DC-2 is another purposely built vulnerable lab for the purpose of ga 阅读全文
posted @ 2022-03-29 18:07 pill0w 阅读(127) 评论(0) 推荐(0)
摘要: 0x01 部署 靶机地址: https://www.vulnhub.com/entry/dc-1,292/ 根据靶机说明,需要找到5个flag 下载镜像, 使用vmware打开, 网络选择NAT模式 0x02 信息收集 nmap扫描网段 nmap -sP 192.168.190.0/24 发现目标I 阅读全文
posted @ 2022-03-29 18:07 pill0w 阅读(122) 评论(0) 推荐(0)
摘要: SSRF 内网访问 直接构造访问请求,获取flag /?url=127.0.0.1/flag.php 伪协议读取文件 根据题目提示使用file://协议,尝试一般web目录/var/www/html/ 端口扫描 提示端口范围8000到9000 /?url=127.0.0.1:8000 使用burps 阅读全文
posted @ 2022-03-29 18:07 pill0w 阅读(428) 评论(0) 推荐(0)
摘要: 扫描目标IP ┌──(root💀kali)-[/home/kali] └─# nmap -sS 192.168.197.0/24 127 ⨯ Starting Nmap 7.92 ( https://nmap.org ) at 2022-03-11 04:41 EST Nmap scan repo 阅读全文
posted @ 2022-03-29 17:35 pill0w 阅读(1436) 评论(0) 推荐(0)
摘要: 目标IP: 192.168.56.105 nmap扫描 ─$ nmap -T5 -A -v -p- 192.168.56.105 Starting Nmap 7.92 ( https://nmap.org ) at 2022-03-21 02:14 EDT NSE: Loaded 155 scrip 阅读全文
posted @ 2022-03-29 17:04 pill0w 阅读(84) 评论(0) 推荐(0)